Office 365 Receipe
- Official Website: n/a
- Icon Support: no
- Attachment Support: no
- Message Format: Text
- Message Limit: 32768 Characters per message
Note: At this time, this plugin requires that you have administrative permissions on your Azure email infrastructure.
Receipe:
o365://{tenant_id}:{account_email}/{client_id}/{client_secret}/
o365://{tenant_id}:{account_email}/{client_id}/{client_secret}/{targets}
Parameter Breakdown
Variable | Required | Description |
---|---|---|
tenant_id | Yes | The Tenant ID Associated with your Azure Application you created. This can also be referred to as your Directory ID. |
account_email | Yes | The Email Associated with your Azure account. |
client_id | Yes | The Client ID Associated with your Azure Application you created. This can also be referred to as your Application ID. |
client_secret | Yes | You will need to generate one of these; this can be done through the Azure portal (Also documented below). |
from | No | If you want the email address ReplyTo address to be something other then your own email address, then you can specify it here. |
to | No | This will enforce (or set the address) the email is sent To. By default the email is sent to the address identified by the account_email |
Notes:
- If no
targets
are specified, then the notification is just sent to the address identified by{account_email}
Tenant ID, Client ID, and Secret ID Acquisition
You will need to have a valid Microsoft Personal Account AND you will require Administrative access unfortunately (to access the Mail.Send Application Permission). More details can be found here about registering your app with Azure.
But basically it amounts to:
- From the Azure Portal go to Microsoft Active Directory -> App Registrations (alt link)
- Click new -> give any name (your choice) in Name field -> select personal Microsoft accounts only --> Register
- From here (the Overview panel) you can acquire both the Directory (
tenant
) ID and the Application (`client_id') you will need. - To create your
client_secret
, go to Active Directory -> Certificate & Tokens -> New client secret- The
client_secret
is an auto-generated string which may have@
and/or?
character(s) in it. You will need to encode these characters to when pasting this into your Magic Receipe URL. See the note section above for more details on how to do this.
- The
- Now need to set permission Active directory -> API permissions -> Add permission.
- Click on Microsoft Graph
- Click on Application Permissions and search for Mail.Send; You will want to check this box too on the match found.
- Set the Redirect URI (Web) to the following:
https://login.microsoftonline.com/common/oauth2/nativeclient
- You can do this from the Authentication -> Add a platform
- Choose Web Application.
- Enter the URI
https://login.microsoftonline.com/common/oauth2/nativeclient
- Now you're good to go. 🙂