Azure AD exception - AADSTS50105 - "The signed in user is not assigned to a role for the application"

47,567

Solution 1

Worked for me :

Settings

Changing the property User assignment required? value to No worked for me. This can be found under Enterprise application --> Name of your registered application --> Properties

Solution 2

I had a similar issue for a different scenario. The reason was, the logged in user was not part of the application user list. This error got resolved as soon as I added that user in the Azure AD target application(The application you referring through the c# code). Also make sure the user is also part of a group.(If not create a group and just add the application users as members in that.)

Share:
47,567
BlueSky
Author by

BlueSky

var whenImSixtyFourTimeSeries = new double[60 * 60 * 24 * 365 * 64];

Updated on July 09, 2022

Comments

  • BlueSky
    BlueSky almost 2 years

    I'm setting up authentication with Azure AD for an ASP.NET Web API 2 REST API. I'd like all clients to be able to use a username & password to authenticate with the REST API. I've setup Azure AD (full steps below, but essentially - created a directory, added a user, added an application, added roles to application in manifest, assigned user to application). However, when I try to test via a Console Application (full code at bottom), I get the exception:

    An unhandled exception of type 'Microsoft.IdentityModel.Clients.ActiveDirectory.AdalServiceException' occurred in Microsoft.IdentityModel.Clients.ActiveDirectory.dll

    Additional information: AADSTS50105: The signed in user '[email protected]' is not assigned to a role for the application '8ed6bbe9-dce7-4bed-83af-aa5472ac4eef'.

    enter image description here

    I'm guessing something needs to be tweaked in the Manifest, but I don't know.

    Here is the code:

    using Microsoft.IdentityModel.Clients.ActiveDirectory;
    using System;
    
    namespace WebApiClientTest
    {
        class Program
        {
            static void Main(string[] args)
            {
                const string authorityUri = "https://login.microsoftonline.com/azureadwebapitest.onmicrosoft.com/";
                const string resource = "https://azureadwebapitest.onmicrosoft.com/test";
                const string clientId = "8ed6bbe9-dce7-4bed-83af-aa5472ac4eef";
                const string userId = "[email protected]";
                const string password = "[REMOVED for StackOverflow post]";
    
                UserCredential credentials = new UserCredential(userId, password);
                AuthenticationContext context = new AuthenticationContext(authorityUri);
                var authresult = context.AcquireToken(resource, clientId, credentials);
                Console.WriteLine("Access token: {0}", authresult.AccessToken);
                Console.ReadLine();
            }
        }
    }
    

    Full repro steps below:

    1. Create new Azure AD Directory:

    enter image description here

    2. Add new Application:

    enter image description here

    enter image description here

    3. Set "User assignment required to access app" to "YES". Set "Read directory data" application permissions. Copy client ID. Save:

    enter image description here

    4. Download manifest. Edit manifest and add two roles. Upload manifest:

    enter image description here

    enter image description here

    5. Go back to directory from step 1 and Add User

    enter image description here

    enter image description here

    enter image description here

    6. Open new browser to https://account.activedirectory.windowsazure.com/ and sign in as user. Change password. Notice no applications available:

    enter image description here

    enter image description here

    7. Go back to Classic Portal. Assign the user to the generalclient role in Application. Notice the user is now assigned to the application

    enter image description here

    enter image description here

    enter image description here

    8. Go back to user account portal and refresh. You might have to refresh a few times or click around. Notice the application is now shown

    enter image description here

    1. It seems at this point, setup should be complete.

    2. Create a new console application.

    3. Install the Nuget package "Microsoft.IdentityModel.Clients.ActiveDirectory"

    4. Copy the code into the console application (top of post), insert your password into the "password" string, and Start Debugging:

    Result:

    An unhandled exception of type 'Microsoft.IdentityModel.Clients.ActiveDirectory.AdalServiceException' occurred in Microsoft.IdentityModel.Clients.ActiveDirectory.dll

    Additional information: AADSTS50105: The signed in user '[email protected]' is not assigned to a role for the application '8ed6bbe9-dce7-4bed-83af-aa5472ac4eef'.

    Expected Result:

    The access token is written to the console output.

  • h-kippo
    h-kippo over 2 years
    It would be worthwhile to mention that this allows anyone in the directory to use this application. In that case it does not make any sense in assigning users or groups to the application.