<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>azure ad multi tenant users &#8211; Sibeesh Passion</title>
	<atom:link href="https://sibeeshpassion.com/tag/azure-ad-multi-tenant-users/feed/" rel="self" type="application/rss+xml" />
	<link>https://sibeeshpassion.com</link>
	<description>My passion towards life</description>
	<lastBuildDate>Mon, 08 Feb 2021 18:24:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2017/04/Sibeesh_Passion_Logo_Small.png</url>
	<title>azure ad multi tenant users &#8211; Sibeesh Passion</title>
	<link>https://sibeeshpassion.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Create Azure AD Application with Configurations Using PowerShell</title>
		<link>https://sibeeshpassion.com/create-azure-ad-application-with-configurations-using-powershell/</link>
					<comments>https://sibeeshpassion.com/create-azure-ad-application-with-configurations-using-powershell/#disqus_thread</comments>
		
		<dc:creator><![CDATA[SibeeshVenu]]></dc:creator>
		<pubDate>Mon, 08 Feb 2021 18:24:23 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[azure ad app powershell]]></category>
		<category><![CDATA[azure ad app registration]]></category>
		<category><![CDATA[azure ad app registration using powershell]]></category>
		<category><![CDATA[azure ad application permissions]]></category>
		<category><![CDATA[azure ad multi tenant users]]></category>
		<category><![CDATA[create azure ad app powershell]]></category>
		<guid isPermaLink="false">https://sibeeshpassion.com/?p=14315</guid>

					<description><![CDATA[There are different ways that you can create an Azure AD application aka Azure AD app registration. Sometimes, you may have to create it using the portal or by using PowerShell modules. Let's see how to create one using PowerShell.]]></description>
										<content:encoded><![CDATA[
<p>There are different ways that you can create an Azure AD application aka Azure AD app registration. Sometimes, you may have to create it using the portal or by using PowerShell modules. When you use PowerShell to do this, you can save the script and reuse the same in the future, one of the many advantages of using this approach is that it will help you remove human errors. Let&#8217;s see how we can do this. </p>



<h2 class="wp-block-heading">Creating Azure AD application </h2>



<p>Before we run the command to create the application, make sure that you have installed the AzureAD module. Open your PowerShell ISE with administrator access, and then type the preceding command. </p>



<pre class="wp-block-code"><code>PS C:\WINDOWS\system32&gt; Install-Module AzureAD</code></pre>



<p>This will install the module for you. You can see this in the modules list in the ISE. Click on the refresh button if you don&#8217;t see it.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Install-AzureAD-Module.jpg"><img fetchpriority="high" decoding="async" width="649" height="323" src="/wp-content/uploads/2021/02/Install-AzureAD-Module.jpg" alt="" class="wp-image-14316" srcset="/wp-content/uploads/2021/02/Install-AzureAD-Module.jpg 649w, /wp-content/uploads/2021/02/Install-AzureAD-Module-300x149.jpg 300w" sizes="(max-width: 649px) 100vw, 649px" /></a><figcaption>Install AzureAD Module</figcaption></figure></div>



<p>Now run the command &#8220;Connect-AzureAD&#8221; to connect to your Azure Account. If you have multiple directories with your account, then you must connect it with the tenant parameter. You can get the tenant id from the Tenant Properties window. Switch to the directory in the Azure Portal and search for the Tenant Properties in the search bar. Copy the Tenant ID from there and run it with the preceding command. </p>



<pre class="wp-block-code"><code>Connect-AzureAD -TenantId YourTenantIDHere</code></pre>



<p>Login again if you are asked again. And you are ready to run the command to create the AD application. </p>



<script src="https://gist.github.com/SibeeshVenu/776c866e848b686b02f0971cc8866695.js"></script>



<p>Here the parameter &#8220;-Oauth2AllowImplicitFlow&#8221; is to enable the OAuth flow and the -AvailableToOtherTenants is to make sure that my app is available to other tenants. You can see more options <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/powershell/module/azuread/new-azureadapplication?WT.mc_id=AZ-MVP-5001828" target="_blank">here</a>. </p>



<p>If you are getting an error as &#8220;Message: Hostname in &#8216;http://&#8217; in property identifierUris is not on any verified domain of the company or its subdomain, make sure that you are giving the &#8220;$appUri&#8221; as your Azure AD primary domain or subdomain. You can get this value from the Azure AD applications overview window. </p>



<p>If you get an error as &#8220;Message: The URI scheme in property identifierUris is invalid or unsupported.&#8221;, make sure that you have included &#8220;http://&#8221; with your URI. </p>



<p>If you don&#8217;t see any other errors in your PowerShell, then it is more likely that the application is been created for, go to the Azure AD application registration page and see it yourself. In the overview page of your application, you can see that our application support multiple organization. If you go to the &#8220;Expose an API&#8221; section, that is where you can see your application ID URI configured. Make sure that you have created a service principal for your API application to use in the front end application. </p>



<p>It is also possible to create a secret of our Azure AD application using PowerShell, in one of my application it was required as I am using the Graph to fetch the users from multiple tenants with a Daemon user. You can read more about that <a rel="noreferrer noopener" href="https://sibeeshpassion.com/get-users-from-different-tenants-using-azure-ad-application-permission/" target="_blank">here</a>. Here is the command to add a secret. </p>



<pre class="wp-block-code"><code>$secret = New-AzureADApplicationPasswordCredential -ObjectId $myAdApp.ObjectId -CustomKeyIdentifier "GraphClientSecret"</code></pre>



<p>You can see the value of the secret if you just output the same. And later, you can save this value to your Azure Key Vault and read it in your application. By default, the end date of your secret will be 1 year, and if you want to change it, you need to provide the start date and end date in your command.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/AD-App-Secret-Expiry.jpg"><img decoding="async" width="642" height="324" src="/wp-content/uploads/2021/02/AD-App-Secret-Expiry.jpg" alt="" class="wp-image-14317" srcset="/wp-content/uploads/2021/02/AD-App-Secret-Expiry.jpg 642w, /wp-content/uploads/2021/02/AD-App-Secret-Expiry-300x151.jpg 300w" sizes="(max-width: 642px) 100vw, 642px" /></a><figcaption>AD App Secret Expiry</figcaption></figure></div>



<p>Now, this is how our updated script looks like. </p>



<script src="https://gist.github.com/SibeeshVenu/8e3181b6e32dab2fefc4c2b1e3b406d3.js"></script>



<p>I have one front end application and a backend api application, I need to make sure that the consent screen of the AD application shows the permission required of my backend application too. To do this, we have something called &#8220;-KnownClientApplications&#8221;, we can set this in our script to create the backend ad application. </p>



<p>Here is the entire PowerShell command.</p>



<script src="https://gist.github.com/SibeeshVenu/ea43ca7c4ce95fce204bb46137a3d02a.js"></script>



<p>What this will do its that,</p>



<ul class="wp-block-list"><li>Create an Azure AD application for the front end application</li><li>Create an Azure AD application for API application</li><li>Set both applications available to multiple tenants</li><li>Set the front end application to use OAuth flow</li><li>Add the Application ID of front end application to the KnownClientApplications of API application </li><li>Expose the API application and add an Application ID URL, that can be added as permission to the front end application</li><li>Create an application secret in the API application and set the expiry after 10 years</li></ul>



<p>If everything correct, then you should have the secret values shown in the PowerShell window. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/PowerShell-Result.jpg"><img decoding="async" width="1024" height="437" src="/wp-content/uploads/2021/02/PowerShell-Result-1024x437.jpg" alt="" class="wp-image-14318" srcset="/wp-content/uploads/2021/02/PowerShell-Result-1024x437.jpg 1024w, /wp-content/uploads/2021/02/PowerShell-Result-300x128.jpg 300w, /wp-content/uploads/2021/02/PowerShell-Result-768x328.jpg 768w, /wp-content/uploads/2021/02/PowerShell-Result.jpg 1144w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption>PowerShell Result</figcaption></figure></div>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Congratulations and thanks a lot for being with me this far. Happy Coding!.</p>



<h2 class="wp-block-heading">About the Author</h2>



<p>I am yet another developer who is passionate about writing and video creation. I have written close to 500 blogs on my&nbsp;<a href="https://sibeeshpassion.com/" target="_blank" rel="noreferrer noopener">blog</a>. And I upload videos on my YouTube channels&nbsp;<a href="https://www.youtube.com/njanorumalayali" target="_blank" rel="noreferrer noopener">Njan Oru Malayali</a>&nbsp;and&nbsp;<a href="https://www.youtube.com/SibeeshPassion" target="_blank" rel="noreferrer noopener">Sibeesh Passion</a>. Please feel free to follow me.</p>



<ul class="wp-block-list"><li><a href="https://github.com/SibeeshVenu">GitHub</a></li><li><a href="https://medium.com/@sibeeshvenu">medium</a></li><li><a href="https://twitter.com/sibeeshvenu">Twitter</a></li></ul>



<h2 class="wp-block-heading">Your turn. What do you think?</h2>



<p>Thanks a lot for reading. Did I miss anything that you may think is needed in this article? Could you find this post useful? Kindly do not forget to share your feedback.</p>



<p>Kindest Regards</p>



<p>Sibeesh Venu</p>
]]></content:encoded>
					
					<wfw:commentRss>https://sibeeshpassion.com/create-azure-ad-application-with-configurations-using-powershell/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Get Users From Different Tenants Using Azure AD Application Permission</title>
		<link>https://sibeeshpassion.com/get-users-from-different-tenants-using-azure-ad-application-permission/</link>
					<comments>https://sibeeshpassion.com/get-users-from-different-tenants-using-azure-ad-application-permission/#disqus_thread</comments>
		
		<dc:creator><![CDATA[SibeeshVenu]]></dc:creator>
		<pubDate>Tue, 02 Feb 2021 17:37:17 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[azure active directory]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[azure ad app registration]]></category>
		<category><![CDATA[azure ad application permissions]]></category>
		<category><![CDATA[azure ad graph]]></category>
		<category><![CDATA[azure ad multi tenant users]]></category>
		<category><![CDATA[fetch users from multiple tenants]]></category>
		<category><![CDATA[get users from different tenants using graph]]></category>
		<category><![CDATA[graph]]></category>
		<category><![CDATA[load users from different tenants]]></category>
		<guid isPermaLink="false">https://sibeeshpassion.com/?p=14294</guid>

					<description><![CDATA[In this post, we will see how we can get the users from different tenants using the Azure AD App registration with application permission]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Introduction</h2>



<p>Working with Microsoft Graph is fun, but it can get way too complex when the requirement is getting complex. Recently, I was working with such a requirement. I wanted to load users from different tenants, usually, this is too easy, and you just need an admin user in the tenant to load all the users using Graph API. But, in our case, there is no guarantee that the logged-in user is actually present in that tenant. And when the user tries to get the users from a different tenant, the Graph API returns an Unauthorized error, which is obvious and well handled.</p>



<p>So, we wanted something that can always perform these actions, no matter the logged-in user is present or not in the tenant given. I started with adding the Delegated permission to the Azure AD app registration, and in the end, the result was the same. Then I came to know about the application permission of Azure AD application registration and that sounded worth a try. </p>



<p>Here in this post, I will be sharing how did I achieve this requirement, it is not that problematic as it sounds. </p>



<h2 class="wp-block-heading">Azure AD Application Set Up</h2>



<p>Go to your Azure AD and select the App registration menu from the left pane. This will open the window where you can create and manage your app registrations.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/App-Registration-in-Azure-AD.jpg"><img decoding="async" width="651" height="495" src="/wp-content/uploads/2021/02/App-Registration-in-Azure-AD.jpg" alt="" class="wp-image-14295" srcset="/wp-content/uploads/2021/02/App-Registration-in-Azure-AD.jpg 651w, /wp-content/uploads/2021/02/App-Registration-in-Azure-AD-300x228.jpg 300w" sizes="(max-width: 651px) 100vw, 651px" /></a><figcaption>App Registration in Azure AD</figcaption></figure></div>



<p>When you are registering a new Azure AD application, make sure to select Multi-Tenant Support and give a redirect URL.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Register-Multi-Tenant-AD-Application.jpg"><img decoding="async" width="650" height="551" src="/wp-content/uploads/2021/02/Register-Multi-Tenant-AD-Application.jpg" alt="" class="wp-image-14309" srcset="/wp-content/uploads/2021/02/Register-Multi-Tenant-AD-Application.jpg 650w, /wp-content/uploads/2021/02/Register-Multi-Tenant-AD-Application-300x254.jpg 300w" sizes="(max-width: 650px) 100vw, 650px" /></a><figcaption>Register Multi Tenant AD Application</figcaption></figure></div>



<p>Now let&#8217;s say that you have created your application and now open the application and click on the permission menu from the left-pane. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Configured-Permission-Azure-AD.jpg"><img decoding="async" width="650" height="283" src="/wp-content/uploads/2021/02/Configured-Permission-Azure-AD.jpg" alt="" class="wp-image-14298" srcset="/wp-content/uploads/2021/02/Configured-Permission-Azure-AD.jpg 650w, /wp-content/uploads/2021/02/Configured-Permission-Azure-AD-300x131.jpg 300w" sizes="(max-width: 650px) 100vw, 650px" /></a><figcaption>Configured Permission Azure AD</figcaption></figure></div>



<p>As you can see that, all the permission types are Application, instead of the delegated ones. This will make sure that our application gets the privilege to act without a user, and will act as a Daemon user in the end. Please be careful in giving the application permissions as those are critical and should only be used when it is needed. So, just select only the permissions needed to complete your requirements. </p>



<p>Now, to make it work, we also need to set up a Client Secret in our application, which will then be used when we create a token. To do that, click on the Certificate &amp; Secrets menu from the left pane. And click on the +New client secret. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Certificate-and-Secrets-in-Azure-AD.jpg"><img decoding="async" width="651" height="362" src="/wp-content/uploads/2021/02/Certificate-and-Secrets-in-Azure-AD.jpg" alt="" class="wp-image-14299" srcset="/wp-content/uploads/2021/02/Certificate-and-Secrets-in-Azure-AD.jpg 651w, /wp-content/uploads/2021/02/Certificate-and-Secrets-in-Azure-AD-300x167.jpg 300w" sizes="(max-width: 651px) 100vw, 651px" /></a><figcaption>Certificate and Secrets in Azure AD</figcaption></figure></div>



<p><strong>Remember to make a note of the secret as you will not be able to see the values later</strong>. Now that our application is ready for action, let us write some code. </p>



<h2 class="wp-block-heading">Code to Get Users from Multiple Tenants</h2>



<p>I do this in my .Net Core API application, and I have a module called Admin which does all the Admin related kinds of stuff. Here I have configured my application using a vertical layered architecture, thus this admin module is independent of any other features in our application. Having said that, let&#8217;s look at the code in AdminController. </p>



<script src="https://gist.github.com/SibeeshVenu/03faa0fc5efeea32d00732192db882bb.js"></script>



<p>As you can see that, nothing fancy there. Here I am just calling the method in the Admin Service and some error handlings. Let&#8217;s look at the code in the Admin Service. </p>



<script src="https://gist.github.com/SibeeshVenu/d0483db658f83d51053b70f4e07a8899.js"></script>



<p>Here I have some custom error handling and also I am doing some logic related to my requirement, but the important part here is&#8221; <em><code>var&nbsp;users&nbsp;=&nbsp;await&nbsp;_graphFacade.GetUsersUsingGraph(selectedTenant);</code></em>&#8221; Let&#8217; see that now. </p>



<script src="https://gist.github.com/SibeeshVenu/9f8ef9786d7ac321e0524b49d04641ab.js"></script>



<p>I am a fan of keeping things separate, and that is the reason why you are seeing a lot of separations here. I promise that there will only be one more. Here we have a GraphAuthService, and that is when I actually create the graph client and return the provider. Shall we see that now?</p>



<script src="https://gist.github.com/SibeeshVenu/821028ee794b70f893c7e3cab379a0fa.js"></script>



<p>Here we are creating a client credential provider with our tenant given and then create a graph client using that provider. Sounds good? We are getting all the other values from our configuration. In the non-development environment, I am loading the secret from a Key Vault, and for the development environment I load them using the secret.json file, I have already written a blog post about this, you can read it <a rel="noreferrer noopener" href="https://sibeeshpassion.com/why-not-secure-your-keys-and-secrets-asp-net-core-with-azure-key-vault-integration/" target="_blank">here</a>. </p>



<p>As per your need, you should select the authentication provider, <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/graph/sdks/choose-authentication-providers?WT.mc_id=AZ-MVP-5001828&amp;tabs=CS" target="_blank">this post</a> will help you choose one. And we use this client in our façade service to get all the users. You have already seen that. Follow <a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/graph/sdks/sdk-installation?WT.mc_id=AZ-MVP-5001828" target="_blank">this link</a> to install all the dependencies, in short, install both &#8220;Microsoft. Graph&#8221; and &#8220;Microsoft.Graph.Auth&#8221; Nuget packages at least. </p>



<h2 class="wp-block-heading">Execution</h2>



<p>It is mandatory that you should have a UI application where an admin can grant access to our application, you can also prepare a URLS and sent it to your admin to give the consent, but the UI approach is more feasible. I have an application already that does this. Let&#8217;s run it now and see whether we are able to fetch the users from the different tenants or not. </p>



<p>In short, when the consent is given a new service principal of our application will be created in the tenant to which the admin is granted the consent. You can see this in the Enterprise application section in your Azure AD, check the left-side-pane. This is how the consent screen will look like.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Azure-AD-Consent-Screen.jpg"><img decoding="async" width="500" height="919" src="/wp-content/uploads/2021/02/Azure-AD-Consent-Screen.jpg" alt="" class="wp-image-14303" srcset="/wp-content/uploads/2021/02/Azure-AD-Consent-Screen.jpg 500w, /wp-content/uploads/2021/02/Azure-AD-Consent-Screen-163x300.jpg 163w" sizes="(max-width: 500px) 100vw, 500px" /></a><figcaption>Azure AD Consent Screen</figcaption></figure></div>



<p>Now, as you can see that in the above image, whatever permission our application is requesting, is showing in the consent screen, and some admins will not give the consent if they see a lot of permissions there. This is the reason why it is important to choose the permissions that are needed. In my case, I have one Azure app for the front end and one for the backend, that is the reason why my backend application name is mentioned in the consent screen.</p>



<p>You can update the permissions of your application anytime you wish, and delete the consent given by going to the Enterprise application section in the Azure AD (remember that this is something that you do in the tenant where the application consent is given) and click on the Delete button in the Properties window. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Deleting-Service-Principal-Created.jpg"><img decoding="async" width="1024" height="440" src="/wp-content/uploads/2021/02/Deleting-Service-Principal-Created-1024x440.jpg" alt="" class="wp-image-14312" srcset="/wp-content/uploads/2021/02/Deleting-Service-Principal-Created-1024x440.jpg 1024w, /wp-content/uploads/2021/02/Deleting-Service-Principal-Created-300x129.jpg 300w, /wp-content/uploads/2021/02/Deleting-Service-Principal-Created-768x330.jpg 768w, /wp-content/uploads/2021/02/Deleting-Service-Principal-Created-1536x659.jpg 1536w, /wp-content/uploads/2021/02/Deleting-Service-Principal-Created.jpg 1647w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><figcaption>Deleting the Service Principal Created</figcaption></figure></div>



<p> Now I have updated my application API permission to use only &#8220;User.Read.All&#8221; permission and let&#8217;s see the consent screen now. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/App-Permissions-Consent-Screen-After-Update.jpg"><img decoding="async" width="500" height="869" src="/wp-content/uploads/2021/02/App-Permissions-Consent-Screen-After-Update.jpg" alt="" class="wp-image-14313" srcset="/wp-content/uploads/2021/02/App-Permissions-Consent-Screen-After-Update.jpg 500w, /wp-content/uploads/2021/02/App-Permissions-Consent-Screen-After-Update-173x300.jpg 173w" sizes="(max-width: 500px) 100vw, 500px" /></a><figcaption>App Permissions Consent Screen After Update</figcaption></figure></div>



<p>As my requirement is to fetch only the users, this would still work as it is and here are the debug screenshots to show you that this is actually working. </p>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Users-from-Tenant-1.jpg"><img decoding="async" width="801" height="209" src="/wp-content/uploads/2021/02/Users-from-Tenant-1.jpg" alt="" class="wp-image-14301" srcset="/wp-content/uploads/2021/02/Users-from-Tenant-1.jpg 801w, /wp-content/uploads/2021/02/Users-from-Tenant-1-300x78.jpg 300w, /wp-content/uploads/2021/02/Users-from-Tenant-1-768x200.jpg 768w" sizes="(max-width: 801px) 100vw, 801px" /></a><figcaption>Users from Tenant 1</figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-large"><a href="/wp-content/uploads/2021/02/Users-from-Tenant-2.jpg"><img decoding="async" width="799" height="209" src="/wp-content/uploads/2021/02/Users-from-Tenant-2.jpg" alt="" class="wp-image-14302" srcset="/wp-content/uploads/2021/02/Users-from-Tenant-2.jpg 799w, /wp-content/uploads/2021/02/Users-from-Tenant-2-300x78.jpg 300w, /wp-content/uploads/2021/02/Users-from-Tenant-2-768x201.jpg 768w" sizes="(max-width: 799px) 100vw, 799px" /></a><figcaption>Users from Tenant 2</figcaption></figure></div>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Congratulations and thanks a lot for being with me this far. In this post, we have seen that how we can get the users from different tenants using the Azure AD App registration with application permission. Happy Coding!.</p>



<h2 class="wp-block-heading">About the Author</h2>



<p>I am yet another developer who is passionate about writing and video creation. I have written close to 500 blogs on my&nbsp;<a href="https://sibeeshpassion.com/" target="_blank" rel="noreferrer noopener">blog</a>. And I upload videos on my YouTube channels&nbsp;<a href="https://www.youtube.com/njanorumalayali" target="_blank" rel="noreferrer noopener">Njan Oru Malayali</a>&nbsp;and&nbsp;<a href="https://www.youtube.com/SibeeshPassion" target="_blank" rel="noreferrer noopener">Sibeesh Passion</a>. Please feel free to follow me.</p>



<ul class="wp-block-list"><li><a href="https://github.com/SibeeshVenu">GitHub</a></li><li><a href="https://medium.com/@sibeeshvenu">medium</a></li><li><a href="https://twitter.com/sibeeshvenu">Twitter</a></li></ul>



<h2 class="wp-block-heading">Your turn. What do you think?</h2>



<p>Thanks a lot for reading. Did I miss anything that you may think is needed in this article? Could you find this post useful? Kindly do not forget to share your feedback.</p>



<p>Kindest Regards</p>



<p>Sibeesh Venu</p>
]]></content:encoded>
					
					<wfw:commentRss>https://sibeeshpassion.com/get-users-from-different-tenants-using-azure-ad-application-permission/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
