At line 1 removed one line |
\\ |
At line 4 changed one line |
!!!Microsoft Graph Application registration |
!!!Microsoft Graph Application Registration |
At line 6 changed one line |
It requires Microsoft Graph Application registration. Start at the Microsoft azure portal:\\ |
It requires Microsoft Graph Application registration. Start at the Microsoft Azure portal:\\ |
At line 14 changed one line |
Name it. Select the Multitenant and personal Microsoft accounts type. The redirect url must ends with :register_microsoft_graph_api/. Then click on register.\\ |
Name it. Select the Multitenant and personal Microsoft accounts type. The redirect URL must end with register_microsoft_graph_api/. Then click on register.\\ |
At line 15 added 4 lines |
{{{ |
http://localhost:9090/register_microsoft_graph_api/ |
}}} |
\\ |
At line 18 changed one line |
Under the redirect url configuration enable the __Access Token__ to be issued by the authorization endpoint:\\ |
Under the redirect URL configuration enable the __Access Token__ to be issued by the authorization endpoint:\\ |
At line 22 changed 2 lines |
__API permission :__ You also need to provide permission for the Microsoft Graph. Go to the Api permission. Click on Add permission, select Microsoft Graph. Choose Delegated permission and add the " |
SMTP.Send" or/and "IMAP.AccessAsUser.All" permission:\\ |
[attachments|SMTP Microsoft Graph XOAUTH 2 Integration/ms_client_secet.png]\\ |
At line 27 added 3 lines |
__API permission:__ You also need to provide permission for the Microsoft Graph. Go to the Api permission. Click on Add permission, and select Microsoft Graph. Choose Delegated permission and add the " |
SMTP. Send" or/and "IMAP.AccessAsUser.All" permission:\\ |
\\ |
At line 28 changed one line |
__Client id : __ You can find it at Azure portal -> App Registration -> Overview:\\ |
__Client id: __ You can find it at Azure portal -> App Registration -> Overview:\\ |
At line 32 changed one line |
__Secret key :__ A new client secret needs to be created as well. Go to the "Certificate & secrets" and generate a new secret key. Click on New client secret:\\ |
__Secret key:__ A new client secret also needs to be created. Go to the "Certificate & secrets" and generate a new secret key. Click on New client secret:\\ |
At line 41 added 4 lines |
__!!!Warning__: Make sure that the user's __SMTP AUTH__ is enabled, otherwise SMTP authentication will fail. See description: [https://learn.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/authenticated-client-smtp-submission].\\ |
__Office 365__:Navigate to the Microsoft 365 Admin Center. [https://admin.microsoft.com/Adminportal/Home?#/homepage]. Select the user and enable authentication for SMTP. SMTP authentication will fail without that permission. XOAUTH authentication requires user-delegated permission. It means the user must be a real user: __users with authentication possibility and with a product license__.\\ |
[attachments|auth_smtp_office_365.png]\\ |
\\ |
At line 38 changed 4 lines |
Provide the smtp server used for emailing (for example : smtp.office365.com)\\ |
Click on Get Refresh Token button.\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect url specified at Azure Application Registration.__\\ |
Put the Client Id and Secret (from Azure App Registration) and "common" for tenant input field.\\ |
Provide the SMTP server used for emailing (like smtp.office365.com)\\ |
Click on the "Get Refresh Token" button.\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect URL specified at Azure Application Registration.__\\ |
Provide the Client Id and Secret (from Azure App Registration) and "common" for the tenant input field.\\ |
At line 45 changed 2 lines |
Click on OK button, allow CrushFTP to have access to send Email. __You must sign in with the Microsoft Account which has permission to send email!!!__ As the end of the result the SMTP Username and Password will filled the Client ID and the Refresh Token.\\ |
It is required to provide the from email address too.\\ |
Click on the OK button, and allow CrushFTP to have access to send email. __Make sure you sign in with the Microsoft Account which has permission to send emails (Configured on Azure's App Registration)!!!__ (SMTP.send is user-specific permission) As the end of the result, the SMTP Username and Password will fill the Client ID and the Refresh Token.\\ |
It is required to provide the email from the address too. __!!!The Email From address must match the signed-in Microsoft user's email address (the Microsoft Account used to gain the refresh token) otherwise, the SMTP authentication will fail.__\\ |
At line 61 added one line |
Make sure the IMAP protocol is enabled for the user. See the description: [https://learn.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/pop3-and-imap4/enable-or-disable-pop3-or-imap4-access].\\ __Office 365__:Navigate to the Microsoft 365 Admin Center. [https://admin.microsoft.com/Adminportal/Home?#/homepage]. Select the user and enable the IMAP protocol at "Manage email apps".\\ |
At line 53 changed one line |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect url specified at Azure Application Registration.__\\ |
__In order to get the Refresh token, CrushFTP WebInterface's host and port number must match with the redirect URL specified at Azure Application Registration.__\\ |
At line 55 changed one line |
Put your email address ended with tilde(~) in the beginning of the Mail Username input field.\\ |
Put your email address ended with a tilde(~) at the beginning of the Mail Username input field.\\ |