- Getting started
- Notifications
- Flex licensing
- Troubleshooting
- Connector Builder
- Act! 365
- Active Directory - Preview
- ActiveCampaign
- Adobe Acrobat Sign
- Adobe PDF Services
- Amazon Bedrock
- Amazon Connect
- Amazon Polly
- Amazon SES
- Amazon Transcribe
- Amazon Web Services
- Anthropic Claude
- Asana
- AWeber
- Azure AI Document Intelligence
- Azure Maps
- BambooHR
- Box
- Brevo
- Calendly
- Campaign Monitor
- Cisco Webex Teams
- Citrix Hypervisor
- Citrix ShareFile
- Clearbit
- Confluence Cloud
- Constant Contact
- Customer.io
- Datadog
- DeepSeek
- Deputy
- DocuSign
- Drip
- Dropbox
- Egnyte
- Eventbrite
- Exchange Server - Preview
- Exchangerates
- Expensify
- Facebook
- Freshbooks
- Freshdesk
- Freshsales
- Freshservice
- GetResponse
- GitHub
- Gmail
- Google Cloud Platform
- Google Docs
- Google Drive
- Google Maps
- Google Sheets
- Google Speech-to-Text
- Google Text-to-Speech
- Google Vertex
- Google Vision
- Google Workspace
- GoToWebinar
- Greenhouse
- Hootsuite
- HTTP Webhook - Preview
- Hubspot CRM
- HubSpot Marketing
- HyperV - Preview
- Icertis
- iContact
- Insightly CRM
- Intercom
- Jina.ai
- Jira
- Keap
- Klaviyo
- LinkedIn
- Mailchimp
- MailerLite
- Mailgun
- Mailjet
- Marketo
- Microsoft 365
- Microsoft Azure
- Microsoft Azure Active Directory
- Microsoft Azure OpenAI
- Microsoft Dynamics 365 CRM
- Microsoft OneDrive & Sharepoint
- Microsoft Outlook 365
- About the Microsoft Outlook 365 connector
- Microsoft Outlook 365 authentication
- Microsoft Outlook 365 events
- Microsoft Sentiment
- Microsoft Teams
- Microsoft Translator
- Microsoft Vision
- Miro
- NetIQ eDirectory
- Okta
- OpenAI
- OpenAI V1 Compliant LLM
- Oracle Eloqua
- Oracle NetSuite
- PayPal
- PDFMonkey
- Perplexity
- Pinecone
- Pipedrive
- QuickBooksOnline
- Quip
- Salesforce
- Salesforce Marketing Cloud
- SAP BAPI
- SAP Cloud for Customer
- SAP Concur
- SAP OData
- SendGrid
- ServiceNow
- Shopify
- Slack
- SmartRecruiters
- Smartsheet
- Snowflake
- Stripe
- Sugar Enterprise
- Sugar Professional
- Sugar Sell
- Sugar Serve
- System Center - Preview
- TangoCard
- Todoist
- Trello
- Twilio
- UiPath GenAI Activities
- VMware ESXi vSphere
- watsonx.ai
- WhatsApp Business
- WooCommerce
- Workable
- Workday
- Workday REST
- X (formerly Twitter)
- YouTube
- Zendesk
- Zoho Campaigns
- Zoho Desk
- Zoho Mail
- ZoomInfo

Integration Service for Automation Suite User Guide
In Integration Service, when you create a connection to one of our Microsoft Graph-based connectors, you can choose between the following authentication options:
- Client Certificate Authentication – connects using a client certificate instead of a client secret.
- OAuth 2.0 Client credentials – uses a service account and, optionally, connects to your shared mailbox.
- Bring your own OAuth 2.0 app – connects to a private application you create, and, optionally, to your shared mailbox.
In case you encounter any errors during the sign-in process, it is recommended to contact your Microsoft Outlook 365 administrator. For more information, refer to the Office 365 Outlook connector documentation.
Scopes
Mail.Read, User.Read.All,
or User.Read.
User.Read, User.Read.All, Mail.Read, Mail.Read.Shared, Mail.ReadWrite, Mail.ReadWrite.Shared, Mail.Send, Mail.Send.Shared, MailboxSettings.ReadWrite, Calendars.Read, Calendars.Read.Shared, Calendars.ReadWrite, Calendars.ReadWrite.Shared, profile, openid, email, and offline_access.
To add more granular permissions, refer to the activities documentation.
Adding the Microsoft Outlook 365 connection
To create a connection to your Microsoft Outlook 365 instance, proceed as follows:
- In Automation Cloud, select Integration Service from the rail menu.
- From the Connectors list, select Microsoft Outlook 365, or use the search bar to find the connector.
- Select Connect to Microsoft Outlook 365, which redirects you to the connection page.
- Select the Client Certificate Authentication authentication type.
- Configure the following:
- Client ID - The ID from the Overview section of your Microsoft Azure application registration.
- Password for the certificate - The password you set during the certificate creation.
- OAuth base64 client certificate - The
client certificate is generated in a
.pfxfile format, which you must convert to Base64-encoded format and provide it in this field. - Tenant ID - The Microsoft Azure tenant ID for an app from the Overview section of your Microsoft Azure application registration.
- Environment - Optionally, select an
environment from the dropdown list:
- Office 365 (default)
- US Government L4 - Public Sector domain
- US Government L5 - Public Sector domain
- China
Select Office 365 (default) for all regions, and only switch to Government or China for cloud deployments. For more details on environments, check Microsoft Graph and Graph Explorer service root endpoints.
- Account - Enter the user principal name (UPN) of the account or shared mailbox that the system should use in the connection. This is required for the connection to be established.
- Select Connect.
- Authenticate with your Microsoft email address and password.
Scopes
Mail.Read and
User.Read.AllUser.Read,
User.Read.All, Mail.Read,
Mail.Read.Shared, Mail.ReadWrite,
Mail.ReadWrite.Shared, Mail.Send,
Mail.Send.Shared, MailboxSettings.ReadWrite,
Calendars.Read, Calendars.Read.Shared,
Calendars.ReadWrite,
Calendars.ReadWrite.Shared, profile,
openid, email, and
offline_access.
To add more granular permissions, refer to the activities documentation.
Adding the Microsoft Outlook 365 connection
To create a connection to your Microsoft Outlook 365 instance, perform the following steps:- In Automation Cloud, select Integration Service from the rail menu.
- From the Connectors list, select Microsoft Outlook 365, or use the search bar to find the connector.
- Select Connect to Microsoft Outlook 365, which redirects you to the connection page.
- Enter the required credentials.
Note:
- You must provide the following: client ID, client secret, tenant ID, and the scopes you may need to interact with different activities. For more details check the previous Scopes section.
- If you are using a
multi-tenant application, keep the default value
commonfor the Tenant ID field. - If you are using a single-tenant application, retrieve the tenant ID from Azure. For more details, check How to find your Microsoft Entra tenant ID.
- Select Connect.
- Authenticate with your Microsoft email address and password.
Overview
To learn how to create an application, go to the official Microsoft documentation and follow the described steps: Register an application with the Microsoft identity platform.
Requirements
When creating your own application to use with Integration Service, you must consider the following requirements:
- You must configure the application as a Multitenant or Single tenant application.
- You must configure a Web application.
- You must configure a Web Redirect URI. The Redirect URI, or callback URL, for your OAuth 2.0 application is provided in the authentication screen when creating a connection: https://{yourDomain}/provisioning_/callback.
- You must set up delegated permissions. For more information, refer to Permissions in the Microsoft official documentation.
- Generate a client secret for your application.
The connector uses Microsoft Graph API. Refer to the Microsoft Graph permissions reference page for details on all permissions.
After you create your application, use the client ID and client secret to create a connection with the Microsoft connectors.
Scopes
- The connector requires the
following minimum scopes for creating a connection:
openid,offline_access,Mail.Read. - Outlook triggers require the
following minimum scopes:
- For shared mailbox
triggers:
openid,offline_access,Mail.Read,Mail.Read.Shared. - For events on calendars:
Calendars.Read. - For events on shared
calendars:
Calendars.Read.Shared.
- For shared mailbox
triggers:
User.Read,
User.Read.All, Mail.Read,
Mail.Read.Shared, Mail.ReadWrite,
Mail.ReadWrite.Shared, Mail.Send,
Mail.Send.Shared, MailboxSettings.ReadWrite,
Calendars.Read, Calendars.Read.Shared,
Calendars.ReadWrite,
Calendars.ReadWrite.Shared, profile,
openid, email, and
offline_access.
To add more granular permissions, refer to the activities documentation.
Adding the Microsoft Outlook 365 connection
To create a connection to your Microsoft Outlook 365 instance, proceed as follows:
- In Automation Cloud, select Integration Service from the rail menu.
- From the Connectors list, select Microsoft Outlook 365, or use the search bar to find the connector.
- Select Connect to Microsoft Outlook 365, which redirects you to the connection page.
- Select the Bring your own OAuth 2.0 app authentication type.
- Configure the following:
- Client ID - The client ID from the Overview section of your Microsoft Azure application registration.
- Client secret - The client secret from the Certificates & secrets section of your Microsoft Azure application.
- Tenant ID - The Microsoft Azure Tenant ID for an app from the
Overview section.
Note:
- If you use a
multi-tenant application, keep the default value
common. - If you use a single-tenant application, retrieve the tenant ID from Azure. For more details, check How to find your Microsoft Entra tenant ID.
- If you use a
multi-tenant application, keep the default value
- Environment -
Optionally, select an environment from the dropdown list:
- Office 365 (default)
- US Government L4 - Public Sector domain
- US Government L5 - Public Sector domain
- China
Select Office 365 (default) for all regions, and only switch to Government or China for cloud deployments. For more details on environments, check Microsoft Graph and Graph Explorer service root endpoints.
- Account - Represents the account used to impersonate a user. Specify the user principal name (UPN) of the account or shared mailbox to be used in connection. This is required for the connection to be established.
- Select Connect.
- Authenticate with your Microsoft email address and password.
Refresh tokens for OAuth applications
Refresh tokens for OAuth applications can be invalidated or revoked at any time by Microsoft. This can happen for different reasons, such as timeouts and revocations. For details, see Microsoft's official documentation.
Make sure to follow best practices from Microsoft when creating your OAuth applications. For full details on how to create a Microsoft OAuth app, see the Microsoft documentation.
This issue affects not only the OneDrive & SharePoint connector, but all Microsoft Graph-based connectors, such as Outlook or Teams.
- Overview
- Admin consent
- Client Certificate Authentication
- Scopes
- Adding the Microsoft Outlook 365 connection
- OAuth 2.0 Client credentials
- Scopes
- Adding the Microsoft Outlook 365 connection
- Bring your own OAuth 2.0 app
- Overview
- Scopes
- Adding the Microsoft Outlook 365 connection
- Refresh tokens for OAuth applications