TeamConnect 8.0 Microsoft Exchange oAuth 2.0 Configuration
Prerequisites
Before using the Mailbox (email) as an Outgoing/Incoming Mail Server, please ensure the following:
- Disable Multi-Factor Authentication (MFA) in both:
- M365 Admin Center / Exchange Center
- Security tab on https://account.microsoft.com
- Remove Microsoft Push/Microsoft Authenticator from the Mailbox. (This is only required for Resource Owner Password Credential Flow.)
Configuring TeamConnect with M365 Exchange Services
| Steps to Follow | Screenshot for Reference |
|---|---|
|
1. Go to https://portal.azure.com/ and sign in with your admin account. In the left hand menu, select Azure Active Directory. Under Manage, select App registrations. (or) You can also select App registrations under Azure services. |
![]() |
|
2. Click on the + New registration button at the top of the page. |
![]() |
|
3. Fill in the following fields:
Click on Register once the fields are filled. |
![]() |
|
4. Go to the API permissions tab in your app registration.Click on + Add a permission. Choose Microsoft APIs and select Microsoft Graph. Then, choose the appropriate permissions:
Click + Add a permission again, then choose:
Once all permissions are added, click Grant admin consent to grant the required permissions for your app. |
|
|
5. Configure Outgoing Email Server Settings
Note: The Test Connection button can be used without clicking Update on this page. Clicking Update will overwrite previous values with the new ones, so please be mindful.
|
|
|
6. Configure Incoming Email Server Settings
Note: The Test Connection button can be used without clicking Update on this page. Clicking Update will overwrite previous values with the new ones, so please be mindful.
Important: Action Required for Upgrading Users with Existing OAuth 2.0 Configurations
When upgrading to TeamConnect 8.0, your existing Incoming Email Server Settings (Incoming Mail Server, Username, Password, and Use SSL Checkbox) are retained automatically.
However, if you have enabled the “Enable Exchange oAuth” on your previous TeamConnect version you must now select “Microsoft Exchange” from the Enable oAuth dropdown after the upgrade to TeamConnect 8.0.
Incoming Mail Server functionality will be impacted if this is not updated post upgrading to TeamConnect 8.0.
|
|
|
7. Get the Application Client ID Value from the Microsoft Azure Portal
|
![]() |
|
8. Get the Application Client Secret Value from the Microsoft Azure Portal
Note: When adding a Client Secret, make sure to copy it immediately and save it. The secret will not be displayed again once the user navigates away from the page and returns to the Client secrets section.
|
![]() |
|
9. Get the Authority URL Value from the Microsoft Azure Portal
|
|
| Your TeamConnect is now configured with M365 Exchange Services. Please start an email approval workflow to test the connection. |
Creating Service Principals in Azure Directory for M365 Exchange
Important Links:
Connecting to Exchange Online
1. Run the latest version of PowerShell as Administrator on Windows.
2. Install the ExchangeOnlineManagement module by running the following command:
Install-Module -Name ExchangeOnlineManagement -RequiredVersion 3.4.0 (select Y for all questions)
3. Import the ExchangeOnlineManagement module by running the following command:
Import-Module ExchangeOnlineManagement
4. Establish a connection to Exchange Online using the following command (replace the email with your own):
Connect-ExchangeOnline -UserPrincipalName [USEREMAIL]
Creating a Service Principal
1. To create a new service principal, run the following command (replace [APPID] with your application ID and [OBJECTID] with your service principal object ID):
New-ServicePrincipal -AppId [APPID] -ServiceId [OBJECTID]
2. To retrieve the Service Principal ID (SID), use the following command:
Get-ServicePrincipal | fl
3. Add mailbox permissions so that the mailbox can act autonomously. Use the following command, replacing [USEREMAIL] with the user email and [SERVICE PRINCIPAL ID] with the Service Principal ID obtained in the previous step:
Add-MailboxPermission -Identity [USEREMAIL] -User [SERVICE PRINCIPAL ID] -AccessRights FullAccess










