You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> - Delegated scenarios are supported in Exchange Online. The recommended method for connecting with delegation is using GDAP and App Consent. For more information, see [Use the Exchange Online PowerShell v3 Module with GDAP and App Consent](/powershell/partnercenter/exchange-online-gdap-app). You can also use multi-tenant applications when CSP relationships are not created with the customer. The required steps for using multi-tenant applications are called out within the regular instructions in this article.
53
54
>
@@ -128,11 +129,11 @@ The following examples show how to use the Exchange Online PowerShell module wit
128
129
129
130
## Set up app-only authentication
130
131
131
-
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. For more information, see [Application and service principal objects in Microsoft Entra ID](/azure/active-directory/develop/app-objects-and-service-principals).
132
+
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. For more information, see [Application and service principal objects in Microsoft Entra ID](/entra/identity-platform/app-objects-and-service-principals).
132
133
133
134
For a detailed visual flow about creating applications in Microsoft Entra ID, see <https://aka.ms/azuread-app>.
134
135
135
-
1. [Register the application in Microsoft Entra ID](#step-1-register-the-application-in-azure-ad).
136
+
1. [Register the application in Microsoft Entra ID](#step-1-register-the-application-in-microsoft-entra-id).
136
137
137
138
2. [Assign API permissions to the application](#step-2-assign-api-permissions-to-the-application).
138
139
@@ -149,18 +150,16 @@ For a detailed visual flow about creating applications in Microsoft Entra ID, se
149
150
> [!NOTE]
150
151
> Cryptography: Next Generation (CNG) certificates aren't supported for app-only authentication with Exchange. CNG certificates are created by default in modern versions of Windows. You must use a certificate from a CSP key provider. [This section](#step-3-generate-a-self-signed-certificate) section covers two supported methods to create a CSP certificate.
151
152
152
-
4. [Attach the certificate to the Microsoft Entra application](#step-4-attach-the-certificate-to-the-azure-ad-application)
153
+
4. [Attach the certificate to the Microsoft Entra application](#step-4-attach-the-certificate-to-the-microsoft-entra-application)
153
154
154
-
5. [Assign Microsoft Entra roles to the application](#step-5-assign-azure-ad-roles-to-the-application)
155
+
5. [Assign Microsoft Entra roles to the application](#step-5-assign-microsoft-entra-roles-to-the-application)
155
156
156
157
The application needs to have the appropriate RBAC roles assigned. Because the apps are provisioned in Microsoft Entra ID, you can use any of the supported built-in roles.
### Step 1: Register the application in Microsoft Entra ID
161
160
162
161
> [!NOTE]
163
-
> If you encounter problems, check the [required permissions](/azure/active-directory/develop/howto-create-service-principal-portal#required-permissions) to verify that your account can create the identity.
162
+
> If you encounter problems, check the [required permissions](/entra/identity-platform/howto-create-service-principal-portal#permissions-required-for-registering-an-app) to verify that your account can create the identity.
164
163
165
164
1. Open the Microsoft Entra admin center at <https://portal.azure.com/>.
166
165
@@ -188,7 +187,7 @@ For a detailed visual flow about creating applications in Microsoft Entra ID, se
188
187
- **URI**: Enter the URI where the access token is sent.
189
188
190
189
> [!NOTE]
191
-
> You can't create credentials for [native applications](/azure/active-directory/manage-apps/application-proxy-configure-native-client-application), because you can't use native applications for automated applications.
190
+
> You can't create credentials for [native applications](/entra/identity/app-proxy/application-proxy-configure-native-client-application), because you can't use native applications for automated applications.
192
191
193
192

194
193
@@ -246,7 +245,7 @@ Choose **one** of the following methods in this section to assign API permission
246
245
#### Modify the app manifest to assign API permissions
247
246
248
247
> [!NOTE]
249
-
> The procedures in this section _append_ the existing default permissions on the app (delegated **User.Read** permissions in **Microsoft Graph**) with the required application **Exchange.Manage.AsApp** permissions in **Office 365 Exchange Online**.
248
+
> The procedures in this section _append_ the existing default permissions on the app (delegated **User.Read** permissions in **Microsoft Graph**) with the required application **Exchange.ManageAsApp** permissions in **Office 365 Exchange Online**.
250
249
251
250
1. On the app **Overview** page, select **Manifest** from the **Manage** section.
252
251
@@ -352,8 +351,6 @@ Create a self-signed x.509 certificate using one of the following methods:
### Step 4: Attach the certificate to the Microsoft Entra application
358
355
359
356
After you register the certificate with your application, you can use the private key (`.pfx` file) or the thumbprint for authentication.
@@ -386,17 +383,15 @@ After you register the certificate with your application, you can use the privat
386
383
387
384
### Step 4b: Exchange Online delegated scenarios only: Grant admin consent for the multi-tenant app
388
385
389
-
If you made the application multi-tenant for **Exchange Online** delegated scenarios in [Step 1](#step-1-register-the-application-in-azure-ad), you need to grant admin consent to the Exchange.ManageAsApp permission so the application can run cmdlets in Exchange Online **in each tenant organization**. To do this, generate an admin consent URL for each customer tenant. Before anyone uses the multi-tenant application to connect to Exchange Online in the tenant organization, an admin in the customer tenant should open the following URL:
386
+
If you made the application multi-tenant for **Exchange Online** delegated scenarios in [Step 1](#step-1-register-the-application-in-microsoft-entra-id), you need to grant admin consent to the Exchange.ManageAsApp permission so the application can run cmdlets in Exchange Online **in each tenant organization**. To do this, generate an admin consent URL for each customer tenant. Before anyone uses the multi-tenant application to connect to Exchange Online in the tenant organization, an admin in the customer tenant should open the following URL:
-`<client-id>` is the ID of the multi-tenant application.
395
392
- The default scope is used to grant application permissions.
396
393
397
-
For more information about the URL syntax, see [Request the permissions from a directory admin](/azure/active-directory/develop/v2-admin-consent#request-the-permissions-from-a-directory-admin).
For more information about the URL syntax, see [Request the permissions from a directory admin](/entra/identity-platform/v2-admin-consent#request-the-permissions-from-a-directory-admin).
400
395
401
396
### Step 5: Assign Microsoft Entra roles to the application
402
397
@@ -410,22 +405,20 @@ You have two options:
410
405
>
411
406
> For multi-tenant applications in **Exchange Online** delegated scenarios, you need to assign permissions in each customer tenant.
> <sup>\*</sup> The Global Administrator and Exchange Administrator roles provide the required permissions for any task in Exchange Online PowerShell. For example:
431
424
>
@@ -434,7 +427,7 @@ The supported Microsoft Entra roles are described in the following table:
434
427
>
435
428
> The Security Administrator role does not have the necessary permissions for those same tasks.
436
429
437
-
For general instructions about assigning roles in Microsoft Entra ID, see [View and assign administrator roles in Microsoft Entra ID](/azure/active-directory/roles/manage-roles-portal).
430
+
For general instructions about assigning roles in Microsoft Entra ID, see [Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal).
438
431
439
432
> [!NOTE]
440
433
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
@@ -465,7 +458,7 @@ For general instructions about assigning roles in Microsoft Entra ID, see [View
465
458
466
459

467
460
468
-
4. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-azure-ad).
461
+
4. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-microsoft-entra-id).
469
462
470
463

471
464
@@ -488,11 +481,11 @@ For general instructions about assigning roles in Microsoft Entra ID, see [View
488
481
>
489
482
> This method is supported only when you connect to Exchange Online PowerShell or Security & Compliance PowerShell in [REST API mode](exchange-online-powershell-v2.md#rest-api-connections-in-the-exo-v3-module). Security & Compliance PowerShell supports REST API mode in v3.2.0 or later.
490
483
491
-
For information about creating custom role groups, see [Create role groups in Exchange Online](/exchange/permissions-exo/role-groups#create-role-groups) and [Create Email & collaboration role groups in the Microsoft Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-365-defender-portal). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
484
+
For information about creating custom role groups, see [Create role groups in Exchange Online](/exchange/permissions-exo/role-groups#create-role-groups) and [Create Email & collaboration role groups in the Microsoft Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
492
485
493
486
To assign custom role groups to the application using service principals, do the following steps:
494
487
495
-
1. In [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation), run the following commands to store the details of the Microsoft Entra application that you registered in [Step 1](#step-1-register-the-application-in-azure-ad) in a variable:
488
+
1. In [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation), run the following commands to store the details of the Microsoft Entra application that you registered in [Step 1](#step-1-register-the-application-in-microsoft-entra-id) in a variable:
0 commit comments