At line 1 removed one line |
\\ |
At line 4 changed one line |
!!!Microsoft Graph Application registration |
!!!Microsoft Graph Application Registration |
At line 6 changed one line |
It requires Microsoft Graph Application registration. Start at the Microsoft azure portal:\\ |
It requires Microsoft Graph Application registration. Start at the Microsoft Azure portal:\\ |
At line 14 changed one line |
Name it. Select the Multitenant and personal Microsoft accounts type. The redirect url must ends with :register_microsoft_graph_api/. Then click on register.\\ |
Name it. Select the Multitenant and personal Microsoft accounts type. The redirect URL must end with register_microsoft_graph_api/. Then click on register.\\ |
At line 16 changed one line |
[attachments|register_app.png] |
{{{ |
http://localhost:9090/register_microsoft_graph_api/ |
}}} |
At line 18 changed 2 lines |
__API permission :__ You also need to provide permission for the Microsoft Graph. Go to the Api permission. Click on Add permission, select Microsoft Graph. Choose Delegated permission and add the " |
SMTP.Send" or/and "IMAP.AccessAsUser.All" permission:\\ |
[attachments|register_app.png]\\ |
At line 21 added 9 lines |
Under the redirect URL configuration enable the __Access Token__ to be issued by the authorization endpoint:\\ |
\\ |
[attachments|SMTP Microsoft Graph XOAUTH 2 Integration/enable_access_token.png]\\ |
\\ |
[attachments|SMTP Microsoft Graph XOAUTH 2 Integration/ms_client_secet.png]\\ |
\\ |
__API permission:__ You also need to provide permission for the Microsoft Graph. Go to the Api permission. Click on Add permission, and select Microsoft Graph. Choose Delegated permission and add the " |
SMTP. Send" or/and "IMAP.AccessAsUser.All" permission:\\ |
\\ |
At line 24 changed one line |
__Client id : __ You can find it at Azure portal -> App Registration -> Overview:\\ |
__Client id: __ You can find it at Azure portal -> App Registration -> Overview:\\ |
At line 28 changed one line |
__Secret key :__ A new client secret needs to be created as well. Go to the "Certificate & secrets" and generate a new secret key. Click on New client secret:\\ |
__Secret key:__ A new client secret also needs to be created. Go to the "Certificate & secrets" and generate a new secret key. Click on New client secret:\\ |
At line 41 added 4 lines |
__!!!Warning__: Make sure that the user's __SMTP AUTH__ is enabled, otherwise SMTP authentication will fail. See description: [https://learn.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/authenticated-client-smtp-submission].\\ |
__Office 365__:Navigate to the Microsoft 365 Admin Center. [https://admin.microsoft.com/Adminportal/Home?#/homepage]. Select the user and enable authentication for SMTP. SMTP authentication will fail without that permission. XOAUTH authentication requires user-delegated permission. It means the user must be a real user: __users with authentication possibility and with a product license__.\\ |
[attachments|auth_smtp_office_365.png]\\ |
\\ |
At line 46 added 5 lines |
\\ |
Provide the SMTP server used for emailing (like smtp.office365.com)\\ |
Click on the "Get Refresh Token" button.\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect URL specified at Azure Application Registration.__\\ |
Provide the Client Id and Secret (from Azure App Registration) and "common" for the tenant input field.\\ |
At line 34 removed 4 lines |
Provide the smtp server used for emailing (for example : smtp.office365.com)\\ |
Click on Get Refresh Token button.\\ |
Put the Client Id and Secret (from Azure App Registration) and "common" for tenant input field. |
\\ |
At line 40 changed 2 lines |
Click on OK button, allow CrushFTP to have access to send Email. As the end of the result the SMTP Username and Password will filled the Client ID and the Refresh Token.\\ |
It is required to provide the from email address too.\\ |
Click on the OK button, and allow CrushFTP to have access to send email. __Make sure you sign in with the Microsoft Account which has permission to send emails (Configured on Azure's App Registration)!!!__ (SMTP.send is user-specific permission) As the end of the result, the SMTP Username and Password will fill the Client ID and the Refresh Token.\\ |
It is required to provide the email from the address too. __!!!The Email From address must match the signed-in Microsoft user's email address (the Microsoft Account used to gain the refresh token) otherwise, the SMTP authentication will fail.__\\ |
At line 61 added one line |
Make sure the IMAP protocol is enabled for the user. See the description: [https://learn.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/pop3-and-imap4/enable-or-disable-pop3-or-imap4-access].\\ __Office 365__:Navigate to the Microsoft 365 Admin Center. [https://admin.microsoft.com/Adminportal/Home?#/homepage]. Select the user and enable the IMAP protocol at "Manage email apps".\\ |
At line 48 changed 2 lines |
After you got the refresh token, the Mail Username input field need to be modified.\\ |
Put your email address ended with tilde in the beginning of the Mail Username input field.\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect URL specified at Azure Application Registration.__\\ |
Because the email address is essential after you got the refresh token, the Mail Username input field needs to be modified.\\ |
Put your email address ended with a tilde(~) at the beginning of the Mail Username input field.\\ |
At line 67 added 4 lines |
{{{ |
Mail Username : <<your email address>>~<<what was before>> |
}}} |
\\ |