Home > Manage App Profiles > Re-authorize an App Profile > Microsoft Tenant > Administrator Consent
Export to PDFRefer to the following instructions to re-authorize an app profile with a Microsoft 365 Global Administrator or a Privileged Role Administrator account.
Select an app profile and click Re-authorize.
Note the following when you re-authorize different app profiles:
When you re-authorize an AvePoint default service app for Viva Engage, you can also consent to the app with an Engage Administrator (Yammer Administrator in Microsoft Entra ID) account.
When you re-authorize an app profile for the Fly service and consenting to the app with a Privileged Role Administrator account, the account may need additional permissions.
For Fly for Power Platform app, make sure the account has the Power Platform Administrator role.
For Fly app, refer to for details.
For Fly delegated app, refer to for details.
When you re-authorize an app profile for the AvePoint Portal Manager service, the consent user must be a Microsoft 365 Global Administrator or have the Privileged Role Administrator and Teams Service admin role.
When you re-authorize an app profile for the Cloud Backup for Microsoft 365 service, note the following:
When consenting to the Cloud Backup for Microsoft 365 delegated app, you also need to choose the functions that will use this app. The user who consents to the app must have the Microsoft 365 Global Administrator role. For details, refer to the section in the Cloud Backup for Microsoft 365 user guide.
When consenting to a Viva Engage app profile used by Cloud Backup for Microsoft 365, the consent user must have the Verified Admin role and the Yammer Administrator role with the Viva Engage product license.
When consenting to the Cloud Backup Express app profile , the consent user must have the Microsoft 365 Backup Administrator role.
When consenting to an app profile for the Cloud Governance delegated app, the user must have the Microsoft 365 Global Administrator or Exchange Administrator role.
When you re-authorize an app profile for a Custom Azure app / Custom Azure app with delegated permissions app, refer to the following instructions:
Application ID – Enter the application ID of the custom app. To keep using the current app, you can get its application ID in the app profile detail page. If you want to change to another app, enter the application ID of the app that your organization has created. For additional details on creating an app, refer to Create a Custom Azure App.
Certificate file (.pfx) – Click Browse and select your app’s private certificate (the .pfx file).
*Note: Ensure this .pfx file is paired with the .cer/.crt file which is uploaded for this custom app in Microsoft Entra ID. If your organization does not have any certificates, you can create self-signed certificates by referring to Prepare a Certificate for the Custom Azure App.
Certificate password – Enter the password of the certificate.
Click Finish.