this feature is in public preview now. https://docs.microsoft.com/en-us/graph/api/resources/trustframeworkpolicy?view=graph-rest-beta.
We are working on managing policy keys programmatically.
Due to various technical limitations, the first iteration of the customer-owned domains functionality will not be available for a few more months. We will provide an update as soon as we can get a more specific ETA.
At the moment our recommended method for checking the identity of the current user is to check several attributes added to incoming requests. This is to allow your application to go completely in and out of memory on lower priced tiers without “always-on.” Check out the tutorial below for the header names.
We would like to have language specific auth functionality like this in the future. I am placing this item in “unplanned” to be used in future planning sessions.
thanks for your feedback!
Azure App Service TeamBrett Styles commented
It really limits the usefulness of the API if a REST endpoint gives all users the same access rights and scope. The scenario where it returns data specific to the logged in user or group (user v admin etc) currently means two API apps one Admin and one user exposing the same REST endpoint.
The gateway already intercepts the request to validate the token when accessing the endpoint so handing that token on to the WebApi to run an OAuth2 authorize cycle to the gateway would at least give us a way to access the claims principal.