This article summarizes the available options for authorizing the Office 365 Mail connector with a regular O365 user account rather than a Global Administrator account. Note that all options require some initial configuration steps that must be completed by a Global Administrator account. See the Office 365 Mail Authorization documentation for additional details.
- Workflows
- Office 365 Mail connector
- Office 365 Mail for Okta Workflows app
- Office 365 Mail for Okta Preview app
When attempting to create or authorize an Office 365 Mail connection as a regular user account, the following message might be received, indicating that approval is required and the connection cannot be authorized:
To authorize the Office 365 Mail connector as a regular user account, there are three different options.
Option 1 - Grant consent on behalf of the organization using a Global Administrator account
This option requires a Global Administrator to grant tenant-wide admin consent when initially creating the O365 Mail connection:
-
Create the Office 365 Mail connection using a Global Administrator account and check the Consent on behalf of your organization checkbox:
-
Click Accept, and when the Office 365 Mail for Okta Workflows or Office 365 Mail for Okta Preview app is installed in Azure Active Directory, tenant-wide admin consent will be granted, and any user will be able to create a new connection or reauthorize an existing connection.
-
If admin consent was not granted when the connection was first created, there might be no prompt with the consent screen again. A Global Administrator can grant admin consent in the Azure Portal as follows:
-
Navigate to Microsoft Entra ID > Enterprise Applications.
-
Click on the Office 365 Mail for Okta Workflows or Office 365 Mail for Okta Preview app.
-
Under the Security section, select Permissions.
-
On the Admin consent tab, click the Grant admin consent for {tenantName} button.
-
Option 2 - Enable the admin consent workflow in Microsoft Entra ID
This option allows the user to request admin approval for tenant-wide admin consent from the consent screen when creating the connection:
-
Login to the Azure Portal using a Global Administrator account.
-
Navigate to Microsoft Entra ID > Enterprise applications.
-
Under the Security section, select Consent and permissions.
-
Click Admin consent settings and set Users can request admin consent to apps they are unable to consent to to Yes, and click Save.
-
Specify the Users, Groups, and Roles that can review consent requests.
-
In workflows, create a new Office 365 Mail connection using a regular O365 user account.
-
At the consent screen, an Approval required message will appear.
-
Enter a justification for requesting the app.
-
Click the Request approval button.
-
-
A Request sent message will appear (note that the connection will not be created).
-
When the request is actioned by the admin, an email notification indicating the action taken will be received.
-
If the request was approved, tenant-wide admin consent has been granted, and any user will be able to create a new connection or reauthorize an existing connection. For additional information on enabling the admin consent workflow, see the Microsoft documentation Configure the admin consent workflow.
Option 3 - Allow Consent for applications
This option allows granting tenant-wide admin consent for specific apps with selected permissions or for all apps:
-
Log in to the Azure Portal using a Global Administrator account.
-
Navigate to Microsoft Entra ID > Enterprise applications.
-
Under the Security section, select Consent and permissions.
-
Click User consent settings and choose the desired User consent for applications option.
-
If using the Allow user consent for apps from verified publishers, for selected permissions (Recommended) setting, add the following permissions to the Low Permission classification:
-
Mail.ReadWrite
-
Mail.ReadWrite.Shared
-
Mail.Send
-
Mail.Send.Shared
-
offline_access
-
-
Click Save to save the changes.
-
Any user will be able to create a new connection or reauthorize an existing connection and successfully consent to permissions.
For additional information on allowing user consent for applications, see the Microsoft documentation Configure how users consent to applications.
