Setup
...
Microsoft Exchange Online
Entra ID Application Registration
3 min
to manage exchange online (exo) through microsoft graph for exchange online powershell, activate requires an application registration in {{microsoft entra id}} with the right permissions this guide walks you through creating and configuring that registration—ensuring secure, delegated access that keeps everything running smoothly behind the scenes create a new app registration login to azure portal as an appropriate administrator create new application registration, name this \<activate instance name > exo or according to your organisation naming standards api permissions when using app only authentication to perform exchange online powershell or graph api operations , you must 1\ assign the correct azure ad directory role for access to mailboxes , shared mailboxes , or exo powershell, you must assign one of the following azure ad roles to the application scenario required azure ad role read only mailbox access (graph) exchange administrator or global reader full access to mailboxes (graph or powershell) exchange administrator exo powershell app only exchange administrator (with appid granted applicationaccesspolicy if scoping is used) assign this via azure portal > entra id > roles and administrators find exchange administrator click add assignments select your app’s service principal 2\ ensure exchange online application permissions are granted go to azure portal > app registrations > your app > api permissions ensure you have exchange manageasapp permission added under apis my organization uses > office 365 exchange online > application permissions also, click grant admin consent for \<tenant> after adding this permission