Skip to main content
All CollectionsHistorical ArchiveExtendSync for Outlook NetSuite EditionFAQ
FAQ: Configuring Application Permissions Restriction in Microsoft Exchange Online - Group Edition
FAQ: Configuring Application Permissions Restriction in Microsoft Exchange Online - Group Edition

Outlook NextGen | This is the step-by-step process of Grant Graph API to Selected Users Only

Updated over 5 months ago

These steps are OPTIONAL.

Some Microsoft administrators have expressed a desire to limit application access to a specific set of users.

Microsoft empowers administrators to finely control application permissions for Exchange Online mailboxes, allowing for a more secure environment. This guide will delve into the step-by-step process of implementing a policy restricting application access to specific mailboxes. Following these steps ensures that applications, such as CloudExtend Outlook Autopilot, can only access data for users within the defined policy.

Step 1: Creating a Security Group

  • Log in to Admin Exchange Online.

  • Visit https://admin.exchange.microsoft.com and log in using your administrator credentials.

    Create a New Mail-Enabled Security Group

    1. Navigate to the group management section.

    2. Create a new mail-enabled security group.

    3. Assign a user-friendly name, like CloudExtend Outlook Users (which also serves as the group ID).

    4. Assign a group email for seamless communication within the group.

    5. Add owners to the group for future user management.

    6. Add users to grant access to CloudExtend.

Step 2: Connecting to Exchange Online using PowerShell

  • Open PowerShell as Administrator.

    • Launch PowerShell with administrative privileges.

    • Import ExchangeOnlineManagement Module:

    • Execute the command:

      Import-Module ExchangeOnlineManagement

  • Connect to Exchange Online

    • Use the command by replacing the UserPrincipalName
      Connect-ExchangeOnline -UserPrincipalName admin@cloudextend.dev

    • A login window may pop up; enter your Microsoft account credentials.

Step 3: Creating the Restriction Policy

  • Create a New Policy for CloudExtend

    Use the provided App IDs and the Security Group ID:

    • For CloudExtend: f377cb8a-8902-42a0-8568-3b3bf88d7c0e

    • Set AccessRight to RestrictAccess.

      New-ApplicationAccessPolicy -AppId "f377cb8a-8902-42a0-8568-3b3bf88d7c0e" -PolicyScopeGroupId "CloudExtend Outlook Users" -AccessRight RestrictAccess -Description "Restrict this app to members of distribution group CloudExtend Outlook Users."

Step 4: Testing the Policy

  • Use the following command to check permissions for a given user:

    Test-ApplicationAccessPolicy -Identity user@cloudextend.dev -AppId f377cb8a-8902-42a0-8568-3b3bf88d7c0e

    Sample output when access is granted

AppId : f377cb8a-8902-42a0-8568-3b3bf88d7c0e

Mailbox : a5e26404-f30c-447b-ac11-e918851e179a

MailboxId : a5e26404-f30c-447b-ac11-e918851e179a

MailboxSid : S-1-5-21-442789921-1734088458-2035306496-28762352

AccessCheckResult : Granted

Disclaimer:

  • Please be aware that changes to these settings may take effect after an hour to propagate throughout your Microsoft Exchange Online environment.

  • We recommend reaching out to Microsoft Support for assistance with any issues encountered while connecting to Exchange Online.

  • Before assigning a CloudExtend license to new users, ensure that you first add them to the designated security group.

Did this answer your question?