User Consent

    The following apps support user consent, and you can re-authorize these apps with a non-Administrator account in your Microsoft tenant.

    *Note: When you re-authorize the other apps that are not in the table below, refer to Administrator Consent.

    ServiceApp type (in AOS)App name (in Microsoft Entra ID)
    InsightsInsights for Microsoft 365AvePoint Insights for Microsoft365
    InsightsInsights for Power PlatformAvePoint Insights for Power Platform
    EnPowerEnPower for Microsoft 365AvePoint EnPower for Microsoft365
    EnPowerEnPower for Power PlatformAvePoint EnPower PowerPlatform Management
    EnPowerEnPower for Teams CallingAvePoint EnPower Teams Calling
    FlyFly for Power PlatformAvePoint Fly for Power Platform
    FlyFly Delegated AppAvePoint Fly Delegated App
    Cloud Backup for IaaS + PaaSCloud Backup for AzureAvePoint Cloud Backup for Azure
    Cloud Backup for IaaS + PaaSDelegated AppAvePoint Online Services – Delegated App
    Cloud Backup for IaaS + PaaSCloud Backup for Azure DevOpsAvePoint Cloud Backup for Azure DevOps
    Cloud GovernanceCloud Governance for Power PlatformAvePoint Cloud Governance for Power Platform
    Cloud GovernanceCloud Governance Delegated AppAvePoint Cloud Governance Delegated App
    MyHubMyHubAvePoint MyHub
    tyGraphtyGraph SuiteAvePoint tyGraph
    tyGraphtyGraph for Viva EngageAvePoint tyGraph for Viva Engage
    Cloud Backup for Microsoft 365Delegated AppAvePoint Online Services – Delegated App
    Cloud Backup for Microsoft 365Cloud Backup ExpressAvePoint Cloud Backup Express
    Cloud GovernanceCloud Backup for Microsoft 365Viva EngageAvePoint Online Services Administration for Viva Engage
    Document Management System OnlineDocument Management System Online (DMS Online)AvePoint Document Management System Online
    AvePoint Portal ManagerAvePoint Portal ManagerAvePoint Portal Manager
    AvePoint Portal ManagerAvePoint Portal Manager for Room - Terminal Interface ViewAvePoint Portal Manager for Room - Terminal Interface View
    EnPowerCloud GovernanceCloud Backup for IaaS + PaaSPolicies for Microsoft 365Insights FlyMyHubtyGraphAvePoint Portal ManagerCustom app with delegated permissions (API Permissions Required by Custom Apps)[custom app name]You can also get its application ID in the app profile detail page.

    Before you choose the User consent method, complete the following preparations:

    1. Ensure that your organization has granted admin consent to the app in Microsoft Entra ID. You can refer to the steps below to grant admin consent to an app:

      1. Log in to Microsoft Entra admin center (or Microsoft Azure portal).

      2. Follow the instructions below to grant admin consent to an AvePoint app or a custom app:

        • To grant admin consent to an AvePoint app, navigate to Microsoft Entra ID > Enterprise applications, click the app, click Permissions in the Security menu, and then click Grant admin consent for [Tenant name].

          Granting admin consent to an app in Enterprise applications.

        • To grant admin consent to a custom app, navigate to Microsoft Entra ID > App registrations, click the app, click API permissions in the Manage menu, and then click Grant admin consent for [Tenant name].

          Granting admin consent to an app in App registrations.

    2. Refer to the following information to prepare required users who consent to the apps:

      • To scan and manage Power Platform objects, the user who provides consent must have the following required license/role:

        • The Power Platform Administrator role must be assigned to the user who provides consent for the app profiles for scanning Environments, Connections, Power Apps, Solutions, Power Automate, or Copilot Studio objects.

        • The Power BI license and Fabric Administrator role must be assigned to the user who provides consent for the app profiles for scanning Power BI objects.

      • To re-authorize an AvePoint default service app for Viva Engage, the user who provides consent must have an Engage Administrator (Yammer Administrator in Microsoft Entra ID) role.

      • To re-authorize the Cloud Backup Express app, the user who provides consent to the app must have the Microsoft 365 Backup Administrator role.

      • To re-authorize a custom app for AvePoint Portal Manager, the user who provides consent to the app must have the Teams Service admins role or a higher privileged role.

      • To re-authorize the Cloud Governance delegated app, the user who provides consent to the app must be a group owner.

    To re-authorize an app profile with the User consent method, refer to the steps below:

    1. Select an app profile and click Re-authorize.

    2. Note the following when you re-authorize different app profiles:

      • When you re-authorize an app profile for a delegated app used by the Cloud Backup for Microsoft 365 service, you also need to choose the functions which will use this app.

      • When you re-authorize an app profile for a Custom Azure app with delegated permissions app, refer to the following instructions:

        1. Application ID – Enter the application ID of the custom app. To keep using the current app, you can get its application ID in the app profile detail page. If you want to change to another app, enter the application ID of the app that your organization has created. For additional details on creating an app, refer to Create a Custom Azure App.

        2. Certificate file (.pfx) – Click Browse and select your app’s private certificate (the .pfx file).

          *Note: Ensure this .pfx file is paired with the .cer/.crt file which is uploaded for this custom app in Microsoft Entra ID. If your organization does not have any certificates, you can create self-signed certificates by referring to Prepare a Certificate for the Custom Azure App.

        3. Certificate password – Enter the password of the certificate.

    3. Select the User consent option.

    4. Click Continue to consent.