<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Brian Collet</title>
    <description>The latest articles on DEV Community by Brian Collet (@briancollet).</description>
    <link>https://dev.to/briancollet</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F879167%2F995960e8-5448-4aa8-9109-ad2c74994e60.png</url>
      <title>DEV Community: Brian Collet</title>
      <link>https://dev.to/briancollet</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/briancollet"/>
    <language>en</language>
    <item>
      <title>Disabling Highly Privileged Azure AD Users with Azure Logic Apps and Microsoft Graph API</title>
      <dc:creator>Brian Collet</dc:creator>
      <pubDate>Fri, 31 Mar 2023 02:25:07 +0000</pubDate>
      <link>https://dev.to/briancollet/how-to-disable-azure-ad-users-with-azure-logic-apps-and-microsoft-graph-api-48kl</link>
      <guid>https://dev.to/briancollet/how-to-disable-azure-ad-users-with-azure-logic-apps-and-microsoft-graph-api-48kl</guid>
      <description>&lt;p&gt;If you're using Logic Apps to disable users in Azure AD with the Azure AD connector and encounter a &lt;strong&gt;403 forbidden&lt;/strong&gt; error, it might be because the user is part of a role-assignable group. Members of these groups are considered &lt;strong&gt;highly privileged&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;As a result, your Logic App lacks the necessary permissions to disable these users via the Azure AD connector - even if your Azure AD account has an RBAC role such as &lt;strong&gt;Privileged Authentication Administrator&lt;/strong&gt; or &lt;strong&gt;Global Administrator&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;Unfortunately, we can't add Graph permissions directly to the Logic App. But don't worry, with some Jedi mind tricks, you can get around it! 🧙&lt;/p&gt;

&lt;h2&gt;
  
  
  Application Configuration
&lt;/h2&gt;

&lt;p&gt;First, register a new application and define permissions to access and interact with Azure AD via the Graph API. Here's how to do it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the portal, navigate to &lt;strong&gt;App registrations&lt;/strong&gt; &amp;gt; &lt;strong&gt;New registration&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Give it a memorable name and select &lt;strong&gt;Register&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Note the &lt;strong&gt;Application (client) ID&lt;/strong&gt; for later use.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqs0c9suxf5lj4ielj394.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqs0c9suxf5lj4ielj394.png" alt="Create a new app registration"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once the app is registered, add a new client secret and the required API permissions as follows:&lt;/p&gt;

&lt;h2&gt;
  
  
  Adding a client secret
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Select your application.&lt;/li&gt;
&lt;li&gt;Navigate to &lt;strong&gt;Certificates &amp;amp; secrets&lt;/strong&gt; &amp;gt; &lt;strong&gt;Client secrets&lt;/strong&gt; &amp;gt; &lt;strong&gt;New client secret&lt;/strong&gt; &amp;gt; &lt;strong&gt;Add&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Note the &lt;strong&gt;Secret value&lt;/strong&gt; for later use.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1i4i8jk3niv1al8pzig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1i4i8jk3niv1al8pzig.png" alt="Adding a client secret"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Configuring permissions
&lt;/h2&gt;

&lt;p&gt;Next, configure permissions for the application. Review these permissions and others in the Graph documentation &lt;a href="https://learn.microsoft.com/en-us/graph/permissions-reference" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Navigate to &lt;strong&gt;API permissions&lt;/strong&gt; &amp;gt; &lt;strong&gt;Add a permission&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt; Select &lt;strong&gt;Microsoft Graph&lt;/strong&gt; &amp;gt; &lt;strong&gt;Application permissions&lt;/strong&gt; and add the following permissions:

&lt;ul&gt;
&lt;li&gt;  Directory.ReadWrite.All&lt;/li&gt;
&lt;li&gt;  Group.ReadWrite.All&lt;/li&gt;
&lt;li&gt;  User.EnableDisableAccount.All&lt;/li&gt;
&lt;li&gt;  User.ReadWrite.All&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt; Select &lt;strong&gt;Grant admin consent for Default Directory&lt;/strong&gt; and confirm.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2vy07kwh1t0svopk2wde.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2vy07kwh1t0svopk2wde.png" alt="Configuring permissions"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Your application is now configured. To enhance security, let's add the client secret to Key Vault.&lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Key Vault Configuration
&lt;/h2&gt;

&lt;p&gt;Key Vault is an Azure key management solution that provides secure storage and management of keys, certificates, and secrets. Here's how to create a Key Vault:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the portal, navigate to &lt;strong&gt;Key vaults&lt;/strong&gt; &amp;gt; &lt;strong&gt;Create&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select your &lt;strong&gt;Resource group&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Give it a memorable name and select your region.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Standard&lt;/strong&gt; pricing tier should suffice.&lt;/li&gt;
&lt;li&gt;Navigate to &lt;strong&gt;Access Policy&lt;/strong&gt; and set permission model to &lt;strong&gt;Azure role-based access control&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Create the Key Vault.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feg0jy0dn6yb8kcuu29cf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feg0jy0dn6yb8kcuu29cf.png" alt="Creating the Key Vault"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyk6mxu3lcw9cz3zwdnp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyk6mxu3lcw9cz3zwdnp.png" alt="Creating the Key Vault"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that the Key Vault is created, add the application client secret as follows:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Assign yourself permission to the Key Vault (e.g., Key Vault Administrator), see all available roles &lt;a href="https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-guide?tabs=azure-cli#azure-built-in-roles-for-key-vault-data-plane-operations" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Navigate to your Key Vault.&lt;/li&gt;
&lt;li&gt;Navigate to &lt;strong&gt;Secrets&lt;/strong&gt; &amp;gt; &lt;strong&gt;Generate/import&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Give it a memorable name.&lt;/li&gt;
&lt;li&gt;Paste your &lt;strong&gt;client secret value&lt;/strong&gt; from earlier.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Create&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwkseh8ql3u63feew9csf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwkseh8ql3u63feew9csf.png" alt="Add application client secret to Key Vault"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feuionud2e97nnq34rijj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feuionud2e97nnq34rijj.png" alt="Successfully added client secret to Key Vault"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that your client secret is secured, create your Logic App and put all the pieces together!&lt;/p&gt;

&lt;h2&gt;
  
  
  Logic App Configuration
&lt;/h2&gt;

&lt;p&gt;Create a new Logic App resource. Here's how:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select your &lt;strong&gt;Resource group&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Create&lt;/strong&gt;, search for &lt;strong&gt;Logic App&lt;/strong&gt;, and select &lt;strong&gt;Create&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select your preferred &lt;strong&gt;Subscription&lt;/strong&gt;, &lt;strong&gt;Resource group&lt;/strong&gt;, and &lt;strong&gt;Region&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Give it a memorable name.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Review + create&lt;/strong&gt; &amp;gt; &lt;strong&gt;Create&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgwfnrts1m6adq6087mzg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgwfnrts1m6adq6087mzg.png" alt="Creating the Logic App"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Navigate to your new Logic App.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Identity&lt;/strong&gt; &amp;gt; Enable &lt;strong&gt;System assigned managed identity&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Azure role assignments&lt;/strong&gt; &amp;gt; &lt;strong&gt;Add role assignment&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;Scope: Key Vault&lt;/li&gt;
&lt;li&gt;Subscription: Select your subscription&lt;/li&gt;
&lt;li&gt;Resource: Select the Key Vault we created earlier&lt;/li&gt;
&lt;li&gt;Role: I will be using &lt;strong&gt;Key Vaults Secrets User&lt;/strong&gt;, but you can choose any sufficient role from the doiumentation &lt;a href="https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-guide?tabs=azure-cli#azure-built-in-roles-for-key-vault-data-plane-operations" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxsvpc7bhq71nk4dv25dh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxsvpc7bhq71nk4dv25dh.png" alt="Adding RBAC role to Logic App system assigned managed identity"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Workflow Configuration
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Navigate to your new Logic App.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Logic app designer&lt;/strong&gt;, you can start with a &lt;strong&gt;template&lt;/strong&gt; or select &lt;strong&gt;Blank Logic App&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Add the Azure Key Vault &lt;strong&gt;Get secret&lt;/strong&gt; action

&lt;ul&gt;
&lt;li&gt;Give your connection a memorable name&lt;/li&gt;
&lt;li&gt;Authentication type: &lt;strong&gt;Managed identity&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Vault Name: Enter the name of your Key Vault resource&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5g9362lm2ee5f0ti026k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5g9362lm2ee5f0ti026k.png" alt="Add Azure Key Vault Get secret action to Logic App workflow"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After the API connection is authenticated, select the name of your secret.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F63rky1735t7xszy7qt6w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F63rky1735t7xszy7qt6w.png" alt="Select the name of your secret"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Add an HTTP action and configure like so:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Method: POST&lt;/li&gt;
&lt;li&gt;URI (Make sure to remove the braces and populate with your values): 

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://login.microsoftonline.com/%7BINSERT-YOUR-TENANT-ID%7D/oauth2/v2.0/token" rel="noopener noreferrer"&gt;https://login.microsoftonline.com/{INSERT-YOUR-TENANT-ID}/oauth2/v2.0/token&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Headers:

&lt;ul&gt;
&lt;li&gt;Content-Type: application/x-www-form-urlencoded&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Body (Make sure to remove the braces and populate with your values):
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;

&amp;lt;p&amp;gt;client_id={INSERT-YOUR-APPLICATION-CLIENT-ID}&amp;amp;amp;scope=https%3A%2F%2Fgraph.microsoft.com%2F.default&amp;amp;amp;client_secret={INSERT-YOUR-APPLICATION-SECRET-VALUE}&amp;amp;amp;grant_type=client_credentials&amp;lt;/p&amp;gt;

&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class="highlight"&amp;gt;&amp;lt;pre class="highlight plaintext"&amp;gt;&amp;lt;code&amp;gt;
![Add HTTP action](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/jrd6jtw91fkf27nskanm.png)

This first HTTP request will be to acquire our authentication token. The documentation regarding this process can be found [here](https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#first-case-access-token-request-with-a-shared-secret).

Now we need to parse the JSON response in order to use the token in our call to Graph.

Add a Parse JSON action and configure like so:
    - Content: Body (from previous HTTP action)
    - Schema:
```json


{
    "properties": {
        "access_token": {
            "type": "string"
        },
        "expires_in": {
            "type": "integer"
        },
        "ext_expires_in": {
            "type": "integer"
        },
        "token_type": {
            "type": "string"
        }
    },
    "type": "object"
}


&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/div&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;img src="https://dev-to-uploads.s3.amazonaws.com/uploads/articles/787r409bg93799rp3at9.png" alt="Add a Parse JSON action"&amp;gt;&amp;lt;/p&amp;gt;

&amp;lt;p&amp;gt;Now the part you've been waiting for - disabling the user!&amp;lt;/p&amp;gt;

&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;
&amp;lt;p&amp;gt;Add another HTTP action, and configure like so: &amp;lt;/p&amp;gt;

&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Method: PATCH&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;URI (Make sure to remove the braces):

&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;
&amp;lt;a href="https://graph.microsoft.com/v1.0/users/%7BINSERT-AZURE-AD-USER-UPN-HERE%7D"&amp;gt;https://graph.microsoft.com/v1.0/users/{INSERT-AZURE-AD-USER-UPN-HERE}&amp;lt;/a&amp;gt; &amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Headers:

&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Content-Type: application/json; charset=utf-8&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Body:
```json
&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;

&amp;lt;p&amp;gt;{&amp;lt;br&amp;gt;
  "accountEnabled": "false"&amp;lt;br&amp;gt;
}&amp;lt;/p&amp;gt;
&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;

&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;div class="highlight"&amp;gt;&amp;lt;pre class="highlight plaintext"&amp;gt;&amp;lt;code&amp;gt;    - Select **Add new parameter** &amp;amp;gt; **Authentication**
        - Authentication type: Raw
        - Value: access_token (from Parse JSON action)

![Add HTTP action to disable user](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1063w42ydm7pgbfzp7m4.png)

- Save your workflow and **Run Trigger** to test.

![Save your workflow and run trigger to test.](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/26w0uaarqy3c6ite0ics.png)

- Verify the account was disabled.

![Verify the account was disabled](https://dev-to-uploads.s3.amazonaws.com/uploads/articles/g1viq4bk9qa2ktua5ec0.png)

Thank you so much for taking the time to read my blog post. I hope you found it informative and helpful. If you have questions or feedback, please don't hesitate to reach out.
&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;&amp;lt;/div&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>azure</category>
      <category>logicapps</category>
      <category>microsoftgraph</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
