You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The _RoutingHintUPN_ value is an admin email address in the tenant, and is used for efficient routing of requests. The email address of any admin in the organization works for app-only authentication scenarios.
- Connect using an existing service principal and client-secret:
@@ -100,11 +101,11 @@ The following list describes other items that we're working on:
100
101
- Support for more built-in RBAC roles (Exchange Service Admin, Global Reader, Recipient Admin)
101
102
- Custom RBAC and mailbox scoping using Azure AD administrative units.
102
103
- Delegation support in app-only scenarios
103
-
- Support for Security & Compliance Center PowerShell cmdlets.
104
+
104
105
105
106
## Appendix
106
107
107
-
### Step 1: Application registration in Azure AD
108
+
## Step 1: Application registration in Azure AD
108
109
109
110
If you encounter problems, check the [required permssions](https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal#required-permissions) to verify that your account can create the identity.
110
111
@@ -154,7 +155,7 @@ You need to assign the API permission `Exchange.ManageAsApp` so the application
154
155
155
156
7. Close the flyout when you're finished.
156
157
157
-
### Step 3: Generate a self-signed certificate
158
+
## Step 3: Generate a self-signed certificate
158
159
159
160
Create a self-signed x.509 certificate using one of the following methods:
160
161
@@ -166,7 +167,7 @@ Create a self-signed x.509 certificate using one of the following methods:
166
167
167
168
- Use the **makecert.exe** tool from the Windows SDK.
168
169
169
-
###Step 4: Attach the certificate to the Azure AD application
170
+
## Step 4: Attach the certificate to the Azure AD application
170
171
171
172
After you register the certificate with your application, you can use the public key (.pfx file) or the thumbprint for authentication.
172
173
@@ -184,7 +185,7 @@ After you register the certificate with your application, you can use the public
184
185
185
186
6. In the dialog that appears, browse to the self-signed certificate you created in the previous Step, and then click **Add**.
186
187
187
-
###Step 5: Assign a role to the application
188
+
## Step 5: Assign a role to the application
188
189
189
190
Azure AD has more than 50 admin roles available. For app-only authentication in Exchange Online, we currently support the previously mentioned roles:
0 commit comments