Configuration of Microsoft Entra ID (formerly Azure AD)

Please follow the steps below to configure Microsoft Entra ID (formerly Azure AD) for the TYPO3 extension ok_exchange365_mailer. This configuration is necessary to enable secure email sending through Microsoft Exchange 365 using the Graph API. .. note:: This guide assumes you have administrative access to Microsoft Entra ID and the necessary permissions to register applications.

  1. Register an application in Microsoft Entra ID (formerly Azure AD).

    Please go to https://portal.azure.com

    Azure portal home page with app registrations navigation
  2. Register the application in Microsoft Entra ID.

    Register application form with name and supported account types
  3. Register an application.

    Application registration form with redirect URI section
  4. Collect tenant ID and client ID.

    • Tenant ID: This is the unique identifier for your Microsoft Entra ID tenant.
    • Client ID: This is the unique identifier for your registered application.
    Application overview page showing Tenant ID and Client ID values
  5. Create a client secret. - Navigate to the "Certificates & secrets" section of your application. - Click on "New client secret".

    Certificates & secrets page with New client secret button
  6. Add client secret.

    Add client secret dialog with description and expiration settings
    Client secret creation confirmation with expiration date
  7. Copy secret value.

    • Secret Value: This is the value you will use in your TYPO3 configuration to authenticate with Microsoft Entra ID.
    • Secret ID: This is not required for the configuration, only the Secret Value is needed. This will be later on the clientSecret in the TYPO3 configuration.
    Client secret value display with copy button (value visible only once)
  8. Assign API permissions.

    • Navigate to the "API permissions" section of your application.
    • Click on "Add a permission".
    API permissions page with Add a permission button
  9. Select Microsoft Graph.

    Choose "Microsoft Graph" as the API you want to access.

    Request API permissions dialog with Microsoft Graph selection
  10. Select application permissions.

    Choose Application permissions since this application will run without user interaction.

    Permission type selection showing Application permissions option
  11. Add Mail.Send permission.

    • This permission allows the application to send emails on behalf of users in your organization.
    • Choose Mail.Send (Send mail as any user) and "Add permissions".
    Microsoft Graph permissions list with Mail.Send permission highlighted
  12. Add User.ReadBasic.All permission.

    • This permission allows the application to read basic user information, which is often necessary for sending emails on behalf of users.
    • Click on "Add permissions" after selecting the permission.
    Microsoft Graph permissions list with User.ReadBasic.All permission highlighted
  13. Grant admin consent.

    • After adding the permissions, you need to grant admin consent for the permissions to take effect.
    • Click on "Grant admin consent for [Your Organization Name]".
    API permissions page with Grant admin consent button
    Admin consent confirmation dialog for granted permissions