The request to your API comes back with 403: insufficient privileges. You check the code. The OAuth scopes are wrong. The meeting tomorrow depends on fixing it now.
Microsoft Entra OAuth scopes control exactly what your application can access in Microsoft’s identity platform. They define permissions for APIs, protect user data, and keep integrations secure. If a scope is missing or misconfigured, tokens will fail, access will break, and debug time will spike. Tight management of these scopes is the difference between a clean deployment and a production fire.
To manage Microsoft Entra OAuth scopes, start in the Azure portal under App registrations. Each registered app lists its API permissions. These permissions, also called delegated or application scopes, map directly to Entra’s access control model. Delegated scopes apply when a signed-in user is present. Application scopes allow background services to act without a user.
When requesting tokens from Microsoft’s identity endpoint, include the correct scope parameter in the authorization request. For Microsoft Graph, for example, User.Read grants basic profile info, while Mail.Send grants the right to send email. Always request only the minimal scopes your code needs. Overbroad scopes increase security risk and trigger admin consent reviews.