At line 1 removed one line |
\\ |
At line 4 changed one line |
!!!Microsoft Graph Application registration |
!!!Microsoft Graph Application Registration |
At line 6 changed one line |
It requires Microsoft Graph Application registration. Start at the Microsoft azure portal:\\ |
It requires Microsoft Graph Application registration. Start at the Microsoft Azure portal:\\ |
At line 14 changed one line |
Name it. Select the Multitenant and personal Microsoft accounts type. The redirect url must ends with :register_microsoft_graph_api/. Then click on register.\\ |
Name it. Select the Multitenant and personal Microsoft accounts type. The redirect URL must end with register_microsoft_graph_api/. Then click on register.\\ |
At line 16 changed one line |
[attachments|register_app.png] |
[attachments|register_app.png]\\ |
At line 18 changed 2 lines |
Under the redirect url configuration enable the Access Token to be issued by the authorization endpoint: |
\\ |
Under the redirect URL configuration enable the __Access Token__ to be issued by the authorization endpoint:\\ |
At line 21 changed 2 lines |
__API permission :__ You also need to provide permission for the Microsoft Graph. Go to the Api permission. Click on Add permission, select Microsoft Graph. Choose Delegated permission and add the " |
SMTP.Send" or/and "IMAP.AccessAsUser.All" permission:\\ |
[attachments|SMTP Microsoft Graph XOAUTH 2 Integration/enable_access_token.png]\\ |
At line 21 added 3 lines |
__API permission:__ You also need to provide permission for the Microsoft Graph. Go to the Api permission. Click on Add permission, and select Microsoft Graph. Choose Delegated permission and add the " |
SMTP. Send" or/and "IMAP.AccessAsUser.All" permission:\\ |
\\ |
At line 27 changed one line |
__Client id : __ You can find it at Azure portal -> App Registration -> Overview:\\ |
__Client id: __ You can find it at Azure portal -> App Registration -> Overview:\\ |
At line 31 changed one line |
__Secret key :__ A new client secret needs to be created as well. Go to the "Certificate & secrets" and generate a new secret key. Click on New client secret:\\ |
__Secret key:__ A new client secret also needs to be created. Go to the "Certificate & secrets" and generate a new secret key. Click on New client secret:\\ |
At line 35 added 6 lines |
[attachments|ms_client_secet.png]\\ |
\\ |
__!!!Warning__: Make sure that the user's __SMTP AUTH__ is enabled, otherwise SMTP authentication will fail. See description: [https://learn.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/authenticated-client-smtp-submission].\\ |
__Office 365__:Navigate to the Microsoft 365 Admin Center. [https://admin.microsoft.com/Adminportal/Home?#/homepage]. Select the user and enable authentication for SMTP. SMTP authentication will fail without that permission. XOAUTH authentication requires user-delegated permission. It means the user must be a real user: __users with authentication possibility and with a product license__.\\ |
[attachments|auth_smtp_office_365.png]\\ |
\\ |
At line 37 changed 4 lines |
Provide the smtp server used for emailing (for example : smtp.office365.com)\\ |
Click on Get Refresh Token button.\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect url specified at Azure Application Registration.__\\ |
Put the Client Id and Secret (from Azure App Registration) and "common" for tenant input field.\\ |
Provide the SMTP server used for emailing (like smtp.office365.com)\\ |
Click on the "Get Refresh Token" button.\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect URL specified at Azure Application Registration.__\\ |
Provide the Client Id and Secret (from Azure App Registration) and "common" for the tenant input field.\\ |
At line 44 changed 2 lines |
Click on OK button, allow CrushFTP to have access to send Email. As the end of the result the SMTP Username and Password will filled the Client ID and the Refresh Token.\\ |
It is required to provide the from email address too.\\ |
Click on the OK button, and allow CrushFTP to have access to send email. __Make sure you sign in with the Microsoft Account which has permission to send emails (Configured on Azure's App Registration)!!!__ (SMTP.send is user-specific permission) As the end of the result, the SMTP Username and Password will fill the Client ID and the Refresh Token.\\ |
It is required to provide the email from the address too. __!!!The Email From address must match the signed-in Microsoft user's email address (the Microsoft Account used to gain the refresh token) otherwise, the SMTP authentication will fail.__\\ |
At line 57 added one line |
Make sure the IMAP protocol is enabled for the user. See the description: [https://learn.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/pop3-and-imap4/enable-or-disable-pop3-or-imap4-access].\\ __Office 365__:Navigate to the Microsoft 365 Admin Center. [https://admin.microsoft.com/Adminportal/Home?#/homepage]. Select the user and enable the IMAP protocol at "Manage email apps".\\ |
At line 52 changed one line |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect url specified at Azure Application Registration.__\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect URL specified at Azure Application Registration.__\\ |
At line 54 changed one line |
Put your email address ended with tilde(~) in the beginning of the Mail Username input field.\\ |
Put your email address ended with a tilde(~) at the beginning of the Mail Username input field.\\ |