Integrating the product with Exchange Online using MSGraph and OAuth with lesser permissions

Microsoft Azure Active Directory is now Microsoft Entra ID

The product previously used Exchange Web Services (EWS) and Azure app-only OAuth authentication for Exchange Online integration. It has now transitioned to Microsoft Graph (MSGraph) for Exchange Online. The recommended approach for configuring this integration is through the Exchange Feature in K2 Management. This topic provides manual steps to set up MSGraph with OAuth using user-delegated permissions.

Use the information in this topic to manually set up an app in Azure with the required minimum permissions, and configure product integration. The final section of this topic is a demonstration of the steps needed to test the integration.

This article requires knowledge of Azure, SQL, and K2 OAuth configuration.

Prerequisites

  • The minimum TLS settings required for the product to send mail. See the product and TLS 1.2 Support article for information.
  • Ensure your local Active Directory (AD) Service account (this is the user account that runs the K2 Server) email address is the same as the Service account email address in Microsoft 365 (Office 365/AAD). If you already have Entra ID configured, you can skip this.

    Other than the Service Account, this article uses a recipient, Jane Doe, with the email address: janed@{your domain name}.onmicrosoft.com in the testing section. To use this recipient and follow the testing section exactly, make sure you have this email address in local AD and in AAD, otherwise use one of your own user accounts.