Skip to main content

M365 Integration & Permissions (Scopes)

Integration Requirements

The integration account requires Global Admin privileges, a valid license with mailbox.

Engage will send emails through your integration account for actions such as password resets, account creations, mailbox delegation, etc.

Permission Scopes

Augmentt uses a least-privilege approach to the permissions it requests for integration. With that said, Augmentt does many things and requires a wide range of scopes to accomplish these.

Below is a list of all the permissions we collect from a user and how Augmentt uses them in product.

Graph API

Scope Name

Permission name

Description

Augmentt Use

Application.ReadWrite.All

Read and write applications

Allows the app to create, read, update and delete applications and service principals on behalf of the signed-in user.

Used to get and store a list of applications in use by the tenant for use in our Conditional Access Policy management within Secure under Admin Mfa and User Mfa configuration section.

AuditLog.Read.All

Read audit log data

Allows the app to read and query your audit log activities, on behalf of the signed-in user.

Used to get the current state of the unified audit log for use for Security Posture within Secure see Unified Audit Log posture item.

Directory.AccessAsUser.All

Access the directory as you

Allows the app to have the same access to information in the directory as the signed-in user.

Impersonation as the user. Gives ability to delete a user or group.

Directory.Read.All

Read directory data

Allows the app to read data in your organization's directory, such as users, groups and apps, without a signed-in user.

Retrieval of users, groups, roles, licenses in use by the tenant.

IdentityRiskEvent.Read.All

Read identity risk event information

Allows the app to read identity risk event information for all users in your organization on behalf of the signed-in user.

We pull risk detections directly from microsoft and process them for alerting. Alerts are displayed in Threat Alerts.

IdentityRiskyUser.Read.All

Read identity risky user information

Allows the app to read identity user risk information for all users in your organization on behalf of the signed-in user.

We pull a list of risky users that are stored and used in Secure in the Threat Report for display under Risk Detections.

Mail.Send

Send mail as you

Allows the app to send mail as users in the organization.

We use this exclusively within User Management in the Reset Password Action for sending password reset to end user on behalf of the admin.

Organization.Read.All

Read organization information

Allows the app to read the organization and related resources, on behalf of the signed-in user. Related resources include things like subscribed SKUs and tenant branding information.

Used for getting Organization related data, Used by Secure for anywhere that uses roles, licenses or groups. Organizational Branding is used for the Login Portal Branding security posture item.

Policy.Read.All

Read your organization’s policies

Allows the app to read your organization's policies on behalf of the signed-in user.

Security Posture for Secure : including Risky Country Policies, Risky Ip Policies.

Policy.ReadWrite.ConditionalAccess

Read and write your organization’s conditional access policies

Allows the app to read and write your organization's conditional access policies on behalf of the signed-in user.

Secure Retrieve a list of Conditional Access policies for Secure for Admin and User MFA configuration.

Secure Edit/Create new/existing Conditional Access policies for Secure through Admin/User mfa configuration.

Engage Augmentt-do-no-modify-policy creation for managing user MFA.

Reports.Read.All

Read all usage reports

Allows an app to read all service usage reports without a signed-in user. Services that provide usage reports include Microsoft 365 and Azure Active Directory.

We pull selfPasswordResetEnabled state for Secure at both the tenant and user level for use in Security Posture > Self Service Password Reset.

SecurityEvents.Read.All

Read your organization’s security events

Allows the app to read your organization’s security events on behalf of the signed-in user.

Used for pulling for Secure : Secure score, getting risky sign-in events

User.Read

Sign you in and read your profile

Allows users to sign-in to the app, and allows the app to read the profile of signed-in users. It also allows the app to read basic company information of signed-in users.

Access the user details, mfa statuses, groups, licences etc for use in Secure and User Management.

User.Read.All

Read all user’s full profiles

Allows the app to read the full set of profile properties, reports, and managers of other users in your organization, on behalf of the signed-in user.

Get a list of users for a tenant, so we can sync them with Augmentt and create employees in the Augmentt platform.

UserAuthenticationMethod.Read.All

Read all user’s authentication methods

Allows the app to read the signed-in user's authentication methods, including phone numbers and Authenticator app settings.

Used to retrieve authentication methods that are in use by the user. Used for secure on the mfa authentication report.

profile

Read your profile

View users' basic profile. Allows the app to see your users' basic profile (name, picture, user name).

Used for initial integration process.

openid

Maintain access to data you have given access to

By using this permission, an app can receive a unique identifier for the user in the form of the sub claim. The permission also gives the app access to the UserInfo endpoint. The openid scope can be used at the Microsoft identity platform token endpoint to acquire ID tokens. The app can use these tokens for authentication.

Used for continuous integration and session management. Signing user in.

email

Read your signed in user’s email address

Allows the app to read your users' primary email address.

Used for initial integration process.

 
Exchange Online (Powershell) API

Scope Name

Description

Augmentt Use

profile

View users' basic profile. Allows the app to see your users' basic profile (name, picture, user name).

Used for initial integration process.

openid

By using this permission, an app can receive a unique identifier for the user in the form of the sub claim. The permission also gives the app access to the UserInfo endpoint. The openid scope can be used at the Microsoft identity platform token endpoint to acquire ID tokens. The app can use these tokens for authentication.

Used for continuous integration and session management. Signing user in.

email

Allows the app to read your users' primary email address.

Used for initial integration process.

user_impersonation

Gives us full access to any and all powershell commands as the signed in user (aka usually the admin).

Used by our powershell scripts to access the below data or take actions.

  • Sharepoint data

  • Shared Mailboxes, Shared Mailbox members

  • Anti-spam policies

  • DLP policies

  • UserGroups Distribution Shared Mailboxes

  • Enable/Disable Azure Per User MFA

  • User authentication list (auth methods per user) -

  • Safe attachment

  • Password Reset Policies

  • Teams data