{"id":4337,"date":"2018-10-17T21:51:26","date_gmt":"2018-10-17T21:51:26","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/aaddevsup\/?p=3945"},"modified":"2018-10-17T21:51:26","modified_gmt":"2018-10-17T21:51:26","slug":"unable-to-modify-user-email-phone-number-password-or-other-personal-information-for-azure-active-directory-users","status":"publish","type":"post","link":"https:\/\/blogs.aaddevsup.xyz\/2018\/10\/unable-to-modify-user-email-phone-number-password-or-other-personal-information-for-azure-active-directory-users\/","title":{"rendered":"Unable to Modify User Email, Phone Number, Password or Other Personal Information for Azure Active Directory Users"},"content":{"rendered":"
This post is in regards to the issues in regards to users having issues modifying Azure Active Directory User attributes such as mail, phone number, resetting passwords, or other personal attributes in user accounts. This will review the reason behind these changes and how to resolve the issue. For many users this was something that was working before and only recently stopped working properly.<\/p>\n
<\/p>\n
There was a recent change to three different attributes that made changing the attributes require the same elevated privileges that password reset requires. The only properties that are being affected are the attributes : mobilePhone, businessPhones\/telephoneNumber, and otherMails attributes.\u00a0U<\/span>ser profile changes can be made with User.ReadWrite.All except for the 3 aforementioned properties. <\/span><\/p>\n <\/p>\n In order to resolve this issue you will need to set the Service Principal or User that is trying to make the change to a\u00a0Helpdesk Admins, User Account Admins and Company Admins depending on the user you are trying to modifies role is. Only these three admins can make changes to these three attributes in Azure Active Directory now.<\/p>\n Please note the level of power you are giving the service principal by setting the service principal or user to one of the aforementioned roles, realize that you are giving the user\/service principal the ability to perform tasks at that level. This should be done with caution.<\/p><\/blockquote>\n <\/p>\n Most users experiencing this issue are Microsoft Graph or Azure Active Directory users that are utilizing the Grant Type Client Credentials in order to make modifications to the three mentioned User Attributes. Having the Directory.readwrite.all permission is now not sufficient to make modifications to these user attributes anymore.<\/strong> You will get a 403 error saying insufficient permissions. In order to resolve this issue you can set the Service Principal\/Enterprise Application as one of the admin roles in the resolution stated in the last paragraph.<\/p>\nFix\/Resolution<\/h1>\n
Microsoft Graph Scenario<\/h2>\n