API permissions for the Connector for Microsoft 365 and Teams

You must set the following API permissions in Microsoft Azure to use the Connector for Microsoft 365 and Teams.

Permission types

The permissions are of the "Delegated" and "Application" types. The actions associated with the permissions of the "Delegated" type are performed by a (personal) Microsoft 365 user. The actions associated with the permissions of the "Application" type are performed by a Microsoft 365 service account.

Often there is the same permission for both the "Delegated" and "Application" types. Depending on the use case, it may be desired for an action to be performed by a personal user or by a service account. Accordingly, you can select in Intrexx whether Intrexx should log in to Microsoft 365 via a (personal) user or via a service account.

For detailed information, see section New registration - static user accounts and New registration - service accounts.

Note that for "Application" type permissions, an AzureAD administrator must give administrator approval.

API permissions - Sorted alphabetically

 

API/Permission name

Type

Description

Admin consent

1Calendars.ReadDelegatedRead access to user calendarsNo
2Calendars.Read.SharedDelegatedRead users and shared calendarsNo
3Calendars.ReadWriteDelegatedHas full access to user calendars.No
4Calendars.ReadWriteApplicationRead and write calendars in all mailboxesYes
5Channel.CreateDelegatedCreate channelsYes
6Channel.ReadBasic.AllDelegatedRead the names and descriptions of channelsNo
7Channel.ReadBasic.AllApplicationRead the names and descriptions of all channelsYes
8ChannelMessage.Read.AllDelegatedRead user channel messagesYes
9ChannelMessage.SendDelegatedSend channel messagesNo
10Chat.CreateDelegatedCreate chatsNo
11Chat.ReadDelegatedRead user chat messagesNo
12Chat.Read.AllApplicationRead all chat messagesYes
13Chat.ReadBasicDelegatedRead names and members of user chat threadsNo
14Chat.ReadWriteDelegatedRead and write user chat messagesNo
15Directory.Read.AllApplicationRead directory dataYes
16emailDelegatedShow user email addressNo
17Files.ReadWrite.AllDelegatedFull access to all files that the user can accessNo
18Group.CreateApplicationCreate groupsYes
19Group.ReadWrite.AllApplicationRead and write all groupsYes
20GroupMember.Read.AllApplication Read all group membershipsYes
21GroupMember.ReadWrite.AllApplicationRead and write all group membershipsYes
22Mail.ReadWrite *DelegatedRead and write access to user emailsNo
23Mail.Send *DelegatedSend emails under a different user nameNo
24

offline_access

(OpenID Permissions)

DelegatedKeep access to data for which you have given accessNo
25Presence.ReadDelegatedRead user's presence informationNo
26Presence.ReadWrite.All *ApplicationRead and write presence information for all usersYes
27profileDelegatedShow basic profile of usersNo
28Sites.Read.AllDelegatedRead elements in all site collectionsNo
29Sites.Read.AllApplicationRead items in all site collections Yes
30Sites.ReadWrite.All *DelegatedEdit or delete elements in all site collectionsNo
31Team.CreateDelegatedCreate teamsNo
32Team.CreateApplicationCreate teamsYes
33Team.ReadBasic.AllDelegatedRead the names and descriptions of teamsNo
34Team.ReadBasic.AllApplicationGet a list of all teamsYes
35TeamMember.ReadWrite.AllDelegatedAdd and remove members from teamsYes
36User.Read.AllApplicationRead all users' full profilesYes

*optional

API Permissions - Sorted by Type

 

API/Permission name

Type

Description

Admin consent

1Group.CreateApplicationCreate groupsYes
2Team.ReadBasic.AllApplicationGet a list of all teamsYes
3Team.CreateApplicationCreate teamsYes
4Sites.Read.AllApplicationRead items in all site collections Yes
5Presence.ReadWrite.All *ApplicationRead and write presence information for all usersYes
6GroupMember.ReadWrite.AllApplicationRead and write all group membershipsYes
7GroupMember.Read.AllApplication Read all group membershipsYes
8Group.ReadWrite.AllApplicationRead and write all groupsYes
9Directory.Read.AllApplicationRead directory dataYes
10Chat.Read.AllApplicationRead all chat messagesYes
11User.Read.AllApplicationRead all users' full profilesYes
12Calendars.ReadWriteApplicationRead and write calendars in all mailboxesYes
13Channel.ReadBasic.AllApplicationRead the names and descriptions of all channelsYes
14Chat.CreateDelegatedCreate chatsNo
15Calendars.Read.SharedDelegatedRead users and shared calendarsNo
16Team.ReadBasic.AllDelegatedRead the names and descriptions of teamsNo
17Calendars.ReadWriteDelegatedHas full access to user calendars.No
18Team.CreateDelegatedCreate teamsNo
19Sites.ReadWrite.All *DelegatedEdit or delete elements in all site collectionsNo
20Sites.Read.AllDelegatedRead elements in all site collectionsNo
21profileDelegatedShow basic profile of usersNo
22Channel.CreateDelegatedCreate channelsYes
23Presence.ReadDelegatedRead user's presence informationNo
24

offline_access

(OpenID Permissions)

DelegatedKeep access to data for which you have given accessNo
25Mail.Send *DelegatedSend emails under a different user nameNo
26Mail.ReadWrite *DelegatedRead and write access to user emailsNo
27Channel.ReadBasic.AllDelegatedRead the names and descriptions of channelsNo
28ChannelMessage.Read.AllDelegatedRead user channel messagesYes
29TeamMember.ReadWrite.AllDelegatedAdd and remove members from teamsYes
30Files.ReadWrite.AllDelegatedFull access to all files that the user can accessNo
31emailDelegatedShow user email addressNo
32ChannelMessage.SendDelegatedSend channel messagesNo
33Chat.ReadWriteDelegatedRead and write user chat messagesNo
34Chat.ReadBasicDelegatedRead names and members of user chat threadsNo
35Chat.ReadDelegatedRead user chat messagesNo
36Calendars.ReadDelegatedRead access to user calendarsNo

*optional

Specify API permissions in Intrexx

In the Connector for Microsoft 365 and Teams "Authentication" menu item you must enter the permissions (scope) with which Intrexx users or Intrexx service accounts are to access Microsoft 365. You can store the permissions individually there. The individual permissions must be separated by a space.

You can also store in Connector for Microsoft 365 and Teams "https://graph.microsoft.com/.default". Then the Intrexx users or Intrexx service accounts access Microsoft 365 with the permissions you have granted in Microsoft Azure.

For detailed information, see section New registration - Authentication.