From ca8e9139982417daf63ad3b6c9c66cfc9c2bb302 Mon Sep 17 00:00:00 2001 From: Chris Caron Date: Sun, 6 Oct 2024 13:59:25 -0400 Subject: [PATCH] Updated Notify_office365 (markdown) --- Notify_office365.md | 38 +++++++++++++++++++------------------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/Notify_office365.md b/Notify_office365.md index 229931e..09a4855 100644 --- a/Notify_office365.md +++ b/Notify_office365.md @@ -5,7 +5,25 @@ * **Message Format**: Text * **Message Limit**: 32768 Characters per message -**Note:** At this time, this plugin requires that you have administrative permissions on your Azure email infrastructure. +## Account Setup + +You will need to have a valid Microsoft Personal Account AND you will require Administrative access unfortunately (to access the **Mail.Send** Application Permission). More details can be [found here](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) about registering your app with Azure. + +1. From the [**Azure Portal**](https://portal.zure.com/) go to **Microsoft Active Directory** -> **App Registrations** ([alt link](https://apps.dev.microsoft.com/portal/register-app)) + - Use the search bar at the top of the Azure Portal and type "Azure Active Directory." if you do not see it in front of you. + - If you still can't access anything, it's possible your organisation restricts you from doing so. You may need to reach out to them in order to proceed. +1. Click **new** -> _give any name (your choice) in Name field_ -> select _personal Microsoft accounts only_ --> **Register** +1. From here (the **Overview** panel) you can acquire both the Directory (`tenant`) ID and the Application (`client_id') you will need. +1. To create your `client_secret` , go to **Active Directory** -> **Certificate & Tokens** -> **New client secret** + * The `client_secret` is an auto-generated string which may have `@` and/or `?` character(s) in it. You will need to encode these characters to when pasting this into your Apprise URL. See the note section above for more details on how to do this. +1. Now need to set permission **Active directory** -> **API permissions** -> **Add permission**. +1. Click on **Microsoft Graph** +1. Click on **Application Permissions** and search for **Mail.Send**; You will want to check this box too on the match found. +1. Set the Redirect URI (Web) to the following: `https://login.microsoftonline.com/common/oauth2/nativeclient` + 1. You can do this from the **Authentication** -> **Add a platform** + 1. Choose **Web Application**. + 1. Enter the URI `https://login.microsoftonline.com/common/oauth2/nativeclient` +1. Now you're good to go. :slightly_smiling_face: ## Syntax: @@ -30,24 +48,6 @@ * `?` with `%3F` * `@` with `%40` -### Tenant ID, Client ID, and Secret ID Acquisition -You will need to have a valid Microsoft Personal Account AND you will require Administrative access unfortunately (to access the **Mail.Send** Application Permission). More details can be [found here](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds) about registering your app with Azure. - -But basically it amounts to: - -1. From the **Azure Portal** go to **Microsoft Active Directory** -> **App Registrations** ([alt link](https://apps.dev.microsoft.com/portal/register-app)) -1. Click **new** -> _give any name (your choice) in Name field_ -> select _personal Microsoft accounts only_ --> **Register** -1. From here (the **Overview** panel) you can acquire both the Directory (`tenant`) ID and the Application (`client_id') you will need. -1. To create your `client_secret` , go to **Active Directory** -> **Certificate & Tokens** -> **New client secret** - * The `client_secret` is an auto-generated string which may have `@` and/or `?` character(s) in it. You will need to encode these characters to when pasting this into your Apprise URL. See the note section above for more details on how to do this. -1. Now need to set permission **Active directory** -> **API permissions** -> **Add permission**. -1. Click on **Microsoft Graph** -1. Click on **Application Permissions** and search for **Mail.Send**; You will want to check this box too on the match found. -1. Set the Redirect URI (Web) to the following: `https://login.microsoftonline.com/common/oauth2/nativeclient` - 1. You can do this from the **Authentication** -> **Add a platform** - 1. Choose **Web Application**. - 1. Enter the URI `https://login.microsoftonline.com/common/oauth2/nativeclient` -1. Now you're good to go. :slightly_smiling_face: #### Example Send a email notification to our your Office 365 account: