Skip to content

Commit 77fe174

Browse files
authored
Merge pull request MicrosoftDocs#5340 from navgupta1208/patch-47
Update app-only-auth-powershell-v2.md
2 parents 74d3f4c + da8d649 commit 77fe174

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

exchange/docs-conceptual/exchange-online/exchange-online-powershell-v2/app-only-auth-powershell-v2.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,14 @@ The following examples show how to use the Exchange Online PowerShell V2 module
3131
- Connect using a local certificate:
3232

3333
```powershell
34-
Connect-ExchangeOnline -CertificateFilePath "C:\Users\johndoe\Desktop\automation-cert.pfx" -AppID "alpha-beta-gamma-123456" -TenantID "contosoelectronics.onmicrosoft.com"
34+
Connect-ExchangeOnline -CertificateFilePath "C:\Users\johndoe\Desktop\automation-cert.pfx" -AppID "alpha-beta-gamma-123456" -TenantID "contosoelectronics.onmicrosoft.com" -RoutingHintUPN "[email protected]"
3535
```
36+
The _RoutingHintUPN_ value is an admin email address in the tenant, and is used for efficient routing of requests. The email address of any admin in the organization works for app-only authentication scenarios.
3637

3738
- Connect using a certificate thumbprint:
3839

3940
```powershell
40-
Connect-ExchangeOnline -CertificateThumbPrint "012THISISADEMOTHUMBPRINT" -AppID "alpha-beta-gamma-123456" -TenantID "contosoelectronics.onmicrosoft.com"
41+
Connect-ExchangeOnline -CertificateThumbPrint "012THISISADEMOTHUMBPRINT" -AppID "alpha-beta-gamma-123456" -TenantID "contosoelectronics.onmicrosoft.com" -RoutingHintUPN "[email protected]"
4142
```
4243

4344
- Connect using an existing service principal and client-secret:
@@ -100,11 +101,11 @@ The following list describes other items that we're working on:
100101
- Support for more built-in RBAC roles (Exchange Service Admin, Global Reader, Recipient Admin)
101102
- Custom RBAC and mailbox scoping using Azure AD administrative units.
102103
- Delegation support in app-only scenarios
103-
- Support for Security & Compliance Center PowerShell cmdlets.
104+
104105
105106
## Appendix
106107
107-
### Step 1: Application registration in Azure AD
108+
## Step 1: Application registration in Azure AD
108109
109110
If you encounter problems, check the [required permssions](https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal#required-permissions) to verify that your account can create the identity.
110111
@@ -154,7 +155,7 @@ You need to assign the API permission `Exchange.ManageAsApp` so the application
154155
155156
7. Close the flyout when you're finished.
156157
157-
### Step 3: Generate a self-signed certificate
158+
## Step 3: Generate a self-signed certificate
158159
159160
Create a self-signed x.509 certificate using one of the following methods:
160161
@@ -166,7 +167,7 @@ Create a self-signed x.509 certificate using one of the following methods:
166167

167168
- Use the **makecert.exe** tool from the Windows SDK.
168169

169-
### Step 4: Attach the certificate to the Azure AD application
170+
## Step 4: Attach the certificate to the Azure AD application
170171

171172
After you register the certificate with your application, you can use the public key (.pfx file) or the thumbprint for authentication.
172173

@@ -184,7 +185,7 @@ After you register the certificate with your application, you can use the public
184185

185186
6. In the dialog that appears, browse to the self-signed certificate you created in the previous Step, and then click **Add**.
186187

187-
### Step 5: Assign a role to the application
188+
## Step 5: Assign a role to the application
188189

189190
Azure AD has more than 50 admin roles available. For app-only authentication in Exchange Online, we currently support the previously mentioned roles:
190191

0 commit comments

Comments
 (0)