Microsoft 365
The following instructions assume your organization is using the Microsoft 365 service.
Registering an app in Azure Portal
1
Log in to the Azure Portal https://portal.azure.com
and click the "App registrations" button.
2
Click the "New registration" button
3
Fill the app registration form:
- Enter the name of the new application e.g. OTRS Mailing app
- in "Supported account types" section select "Accounts in this organizational directory only (CompanyName only - Single tenant)"
- in "Redirect URI" field just select "Public client/native (mobile & desktop)" and leave the text box blank.
4
Click on "Register".
5
Please save Application (client) ID value - you will need it later.
Authentication
1
Go to the "Authentication", click on "Add a platform" button and select "Web"
2
Enter only the "Redirect URIs" in the following schema:
${HttpType}://${FQDN}/${ScriptAlias}/get-oauth2-token-by-authorization-code.pl
e.g. https://support.example.com/otrs/get-oauth2-token-by-authorization-code.pl
Please note that only https protocol is supported here.
3
Click on "Configure".
4
Now you can add more Redirect URIs e.g. test instance URI:
5
Click on "Save".
Certificates & Secrets
1
Go to the "Certificates & Secrets", click on "New client secret" button and select expiration date for the client secret.
2
Click on "Add".
3
Please save the secret Value - you will need it later. Please note it will not be visible later.
API Permissions
Important! If you use more than one e-mail account in OTRS, you can consider creating a technical account that will "mediate" access to other e-mail accounts. The technical account must have full access rights to all other e-mail accounts configured in OTRS.
You can check the delegation settings at https://admin.exchange.microsoft.com
Recipients -> Mailboxes -> select User -> Delegation -> Read and manage (Full Access) (if you also intend to send messages using the account, you should also delegate Send as permissions)
You must generate a token with the use of this specific technical account - otherwise, access to the accounts other than the one used to generate the token will not be possible.
1
Go to the "API Permissions", click on "Add a permission" button and select "Microsoft Graph"
2
Select "Delegated permissions"
3
Find permissions and add them to your application
The final list of required permissions is:
4
Click "Grant admin consent for CompanyName"