![]() ![]() Double-click Get my messages to open the request.Expand the Delegated folder, and then expand the Mail folder.Inside the Delegated folder are requests for various Microsoft Graph workloads that you can call. You now have a valid access token to use for delegated requests. Select Proceed, and then select the Use Token button.Sign in with your developer tenant administrator account.Scroll down on the right and select Get New Access Token.Leave all the fields as pre-configured, including the Grant type, which is set to Authorization Code. Make sure the call back URL matches with what you provided when you created the application registration. In the Configure New Token section, select the Configuration Options tab. ![]() On the top right, next to the eye icon, verify that M365 Environment is selected in the dropdown and not No environment.īecause this is the first time that you are running a request as a delegated authentication flow, you need to get an access token.In TenantID, set the Current value to the directory (tenant) ID value from step 3.16.In ClientSecret, set the Current value to the client secret value from step 3.18.In ClientID, set the Current value to the application (client) ID value from step 3.16. ![]() In this step, you set up the environment variables in Postman that you use to retrieve an access token. The application can read users in Azure AD. is added as an application permission, which is a permission that does not require a signed-in user. The application can read mail on behalf of the user. Mail.Read is added as a delegated permission, which is a permission that requires a signed-in user. The application now has two permissions configured. Hover over the new client secret Value and copy it you'll need this in step 4.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |