Skip to content

Latest commit

 

History

History
39 lines (31 loc) · 3.32 KB

recording-bot-permission.md

File metadata and controls

39 lines (31 loc) · 3.32 KB

Bot Service - Microsoft Entra Id and Micosoft Graph API Calling Permission

An Azure bot service can be created with an existing app registration in the Microsoft Entra Id or can create a new app registration in the Microsoft Entra Id on creation. The app registration can be a single tenant app registration or a multi tenant app registration, also see "Tenancy in Microsoft Entra ID" documentaion. Either way it is required that the Microsoft Entra Id app registration and the bot service are linked.

Also the app registration must have some application permissions exposed by the Microsoft Graph API that allows the recording application to join calls and access the media streams. The following Microsoft Graph API application permissions are relevant for the recording bot:

permission description
Calls.Initiate.All Allows the app to place outbound calls to a single user and transfer calls to users in your organization's directory, without a signed-in user.
Calls.InitiateGroupCall.All Allows the app to place outbound calls to multiple users and add participants to meetings in your organization, without a signed-in user.
Calls.JoinGroupCall.All Allows the app to join group calls and scheduled meetings in your organization, without a signed-in user. The app will be joined with the privileges of a directory user to meetings in your tenant.
Calls.JoinGroupCallasGuest.All Allows the app to anonymously join group calls and scheduled meetings in your organization, without a signed-in user. The app will be joined as a guest to meetings in your tenant.
Calls.AccessMedia.All Allows the app to get direct access to participant media streams in a call, without a signed-in user.

Not all of them are necessary for a compliance recording bots. A compliance recording only requires:

  • Calls.AccessMedia.All
  • Calls.JoinGroupCall.All
  • Calls.JoinGroupCallAsGuest.All

Important

After configuring the application permissions it is required that a Microsoft Entra Id administrator grants the permissions. This also applies for any time the application permissions are changed. Changes made to the application permissions of an app registration will not take effect until a Microsoft Entra Id administarator has consented to them.

It is possible for administrators to grant the application permissions in the Azure portal, but often a better option is to provide a sign-up experience for administrators by using the Microsoft Entra Id /adminconsent endpoint, see instructions on constructing an Admin Consent URL.

Note

Application permissions of a multi tenant app registration must be granted by an administrator of each targeted Microsoft Entra Id tenant.