I have two single tenant Azure AD apps A and B. App A represents a service and app B a client. I'm trying to allow B to access A with an AAD JWT token obtained using the AAD OAuth2 client credentials flow. I've defined an appRole
in the manifest for A and am adding that as an API permission for B via App registrations -> API Permissions -> Add a permission -> My APIs -> A -> Application permissions
This requires admin consent even though I am the owner for both apps.
Is there a way to grant this permission without requiring an admin intervention since I own the app exposing the app role? I understand the admin consent requirement when granting permissions to access the directory which may contain sensitive user data but here it is purely a permission between two apps which I am the owner of.
The app role in the manifest for app A is as follows:
{
"allowedMemberTypes": [
"User",
"Application"
],
"description": "...",
"displayName": "MyPermission",
"id": "00000000-aaaa-bbbb-cccc-ddddddddddddd",
"isEnabled": true,
"lang": null,
"origin": "Application",
"value": "MyPermission"
}