Home > App Management > Manage App Profiles for Microsoft Tenants > Re-authorize App Profiles for Microsoft Tenants
Export to PDFRe-authorize app profiles for Microsoft tenants in the following scenarios:
The app profiles which are in the Invalid status must be re-authorized.
If you want to change the account used to consent to an app, you can re-authorize the related app profile.
If an app has been updated to add new API permissions required by new features, the related app profile must be re-authorized.
If your tenant has an app with delegated permissions, note the following:
According to Microsoft’s non-interactive user sign-ins, the sign-in logs show the original IP used for the original token issuance, as the IP address of non-interactive sign-ins performed by confidential clients (AvePoint Online Services) doesn’t match the actual original IP of the event when a Microsoft user signed in and consented to an app. If you create an app with delegated permissions, you must add the original IP address to your Microsoft tenant’s conditional access policies (if any). Otherwise, the apps with delegated permissions will be Invalid. After you add the original IP address to your conditional access policies, you can manually re-authorize the app profile to update its status or wait for AvePoint Online Services to automatically update its status.
For an app with delegated permissions, the related app profile needs to be re-authorized when its consent user’s Microsoft 365 account is in any of the following scenarios:
If multi-factor authentication (MFA) is enabled on the consent user's Microsoft 365 account after the user has given consent to the custom app profile, the app profile needs to be re-authorized.
If the consent user’s Microsoft 365 account is unavailable (e.g. the password was changed or the user left the company), the app profile will be Invalid and need to be re-authorized.
To help you easily find the apps with delegated permissions, the related AvePoint default apps are marked with the icons as below:
Apps that utilize both application and delegated API permissions are marked with the hybrid icon.

Apps that have delegated API permissions only are marked with the purebred icon.

For a Custom Azure app / Custom Azure app with delegated permissions, you also need to re-authorize the app profile if:
You want to change the custom Azure app that connects AvePoint Online Services to your tenant.
The certificate file of the custom Azure app has been changed.
For a Delegated app used by the Cloud Backup for Microsoft 365 service, you also need to re-authorize the app profile if you want to change the functions which will use the app. When you re-authorize the Delegated app, ensure that your organization’s subscription for the Cloud Backup for Microsoft 365 service has included the modules you want to protect. Then, you can select desired functions from the following that are supported by the Delegated app:
Restore Teams channel conversations as posts
Protect Power BI
Protect Power Automate / Power Apps
Restore Planner task comments
If your tenant is using a scan profile configured in the AOS classic UI for protecting Planner data via Cloud Backup for Microsoft 365, you can follow the steps below to update the method of Planner data protection.
In AOS, refer to the instructions below to prepare an app profile based on your scenario:
If you want to use a classic mode app, create/re-authorize an app profile of the Microsoft 365 (All permissions) app type, and ensure that the Microsoft Graph permission Tasks.ReadWrite.All has been added to the app.
If you want to use a modern mode app, create an app profile of the Cloud Backup for Microsoft 365 (All permissions) app type.
If you want to use a custom mode app, create an app profile of the Custom Azure app type and ensure that the Microsoft Graph permission Tasks.ReadWrite.All has been added to the custom app.
Edit the scan profile and save it.
For a scan profile configured in the AOS classic UI for protecting Planner data, the authentication method in the scan profile is a service account profile or app profile with an additional delegated app profile. In the AOS new UI, once this kind of scan profile has been edited, the authentication method will be updated to the app profile. Thus, you can edit and save a scan profile even without any changes.
Go to Cloud Backup for Microsoft 365 to check the backup setting and ensure that the option for Planner data backup has been enabled.
The following apps support user consent, and you can re-authorize these apps with a non-Administrator account in your Microsoft tenant. When you re-authorize one of the following apps, you can choose a consent method between Administrator Consent and User Consent.
When you re-authorize the other apps that are not in the table below, refer to Administrator Consent.
| Service | App type (in AOS) |
|---|---|
| Insights | Insights for Microsoft 365 |
| Insights | Insights for Power Platform |
| EnPower | EnPower for Microsoft 365 |
| EnPower | EnPower for Power Platform |
| EnPower | EnPower for Teams Calling |
| Fly | Fly for Power Platform |
| Fly | Fly Delegated App |
| Cloud Backup for IaaS + PaaS | Cloud Backup for Azure |
| Cloud Backup for IaaS + PaaS | Delegated App |
| Cloud Backup for IaaS + PaaS | Cloud Backup for Azure DevOps |
| Cloud Governance | Cloud Governance for Power Platform |
| Cloud Governance | Cloud Governance Delegated App |
| MyHub | MyHub |
| Policies for Microsoft 365 | Policies for Microsoft 365 |
| tyGraph | tyGraph Suite |
| tyGraph | tyGraph for Viva Engage |
| Cloud Backup for Microsoft 365 | Delegated App |
| Cloud Backup for Microsoft 365 | Cloud Backup Express |
| Cloud GovernanceCloud Backup for Microsoft 365 | Viva Engage |
| Document Management System Online | Document Management System Online (DMS Online) |
| AvePoint Portal Manager | AvePoint Portal Manager |
| AvePoint Portal Manager | AvePoint Portal Manager for Room - Terminal Interface View |
| EnPower / Cloud Governance / Cloud Backup for Microsoft 365 / Cloud Backup for IaaS + PaaS / Insights / Fly / MyHub / tyGraph / AvePoint Portal Manager | Custom app with delegated permissions |
Refer to the sections below to re-authorize an app with an appropriate consent method.
You do not need any permissions or Microsoft licenses other than those listed in this guide.
Refer to the following instructions to re-authorize an app profile with a Microsoft 365 Global Administrator or a Privileged Role Administrator account.
Select an app profile and click Re-authorize.
Note the following when you re-authorize different app profiles:
When you re-authorize an AvePoint default service app for Viva Engage, you can also consent to the app with an Engage Administrator (Yammer Administrator in Microsoft Entra ID) account.
When you re-authorize an app profile for the Fly service and consenting to the app with a Privileged Role Administrator account, the account may need additional permissions.
For Fly for Power Platform app, make sure the account has the Power Platform Administrator role.
For Fly app, refer to Fly App Profile Permissions for details.
For Fly delegated app, refer to Fly Delegated App Profile Permissions for details.
When you re-authorize an app profile for the AvePoint Portal Manager service, the consent user must be a Microsoft 365 Global Administrator or have the Privileged Role Administrator and Teams Service admin role.
When you re-authorize an app profile for the Cloud Backup for Microsoft 365 service, note the following:
When consenting to the Cloud Backup for Microsoft 365 delegated app, you also need to choose the functions that will use this app. The user who consents to the app must have the Microsoft 365 Global Administrator role. For details, refer to the Required Permissions of Microsoft Delegated App section in the Cloud Backup for Microsoft 365 user guide.
When consenting to a Viva Engage app profile used by Cloud Backup for Microsoft 365, the consent user must have the Verified Admin role and the Yammer Administrator role with the Viva Engage product license.
When consenting to the Cloud Backup Express app profile , the consent user must have the Microsoft 365 Backup Administrator role.
When consenting to an app profile for the Cloud Governance delegated app, the user must have the Microsoft 365 Global Administrator or Exchange Administrator role.
When you re-authorize an app profile for a Custom Azure app / Custom Azure app with delegated permissions app, refer to the following instructions:
Application ID – Enter the application ID of the custom app. To keep using the current app, you can get its application ID in the app profile detail page. If you want to change to another app, enter the application ID of the app that your organization has created. For additional details on creating an app, refer to Create a Custom Azure App.
Certificate file (.pfx) – Click Browse and select your app’s private certificate (the .pfx file).
Ensure this .pfx file is paired with the .cer/.crt file which is uploaded for this custom app in Microsoft Entra ID. If your organization does not have any certificates, you can create self-signed certificates by referring to Prepare a Certificate for the Custom Azure App.
Certificate password – Enter the password of the certificate.
Click Finish.
The following apps support user consent, and you can re-authorize these apps with a non-Administrator account in your Microsoft tenant.
When you re-authorize the other apps that are not in the table below, refer to Administrator Consent.
| Service | App type (in AOS) | App name (in Microsoft Entra ID) |
|---|---|---|
| Insights | Insights for Microsoft 365 | AvePoint Insights for Microsoft365 |
| Insights | Insights for Power Platform | AvePoint Insights for Power Platform |
| EnPower | EnPower for Microsoft 365 | AvePoint EnPower for Microsoft365 |
| EnPower | EnPower for Power Platform | AvePoint EnPower PowerPlatform Management |
| EnPower | EnPower for Teams Calling | AvePoint EnPower Teams Calling |
| Fly | Fly for Power Platform | AvePoint Fly for Power Platform |
| Fly | Fly Delegated App | AvePoint Fly Delegated App |
| Cloud Backup for IaaS + PaaS | Cloud Backup for Azure | AvePoint Cloud Backup for Azure |
| Cloud Backup for IaaS + PaaS | Delegated App | AvePoint Online Services – Delegated App |
| Cloud Backup for IaaS + PaaS | Cloud Backup for Azure DevOps | AvePoint Cloud Backup for Azure DevOps |
| Cloud Governance | Cloud Governance for Power Platform | AvePoint Cloud Governance for Power Platform |
| Cloud Governance | Cloud Governance Delegated App | AvePoint Cloud Governance Delegated App |
| MyHub | MyHub | AvePoint MyHub |
| Policies for Microsoft 365 | Policies for Microsoft 365 | AvePoint Policies for Microsoft365 |
| tyGraph | tyGraph Suite | AvePoint tyGraph |
| tyGraph | tyGraph for Viva Engage | AvePoint tyGraph for Viva Engage |
| Cloud Backup for Microsoft 365 | Delegated App | AvePoint Online Services – Delegated App |
| Cloud Backup for Microsoft 365 | Cloud Backup Express | AvePoint Cloud Backup Express |
| Cloud GovernanceCloud Backup for Microsoft 365 | Viva Engage | AvePoint Online Services Administration for Viva Engage |
| Document Management System Online | Document Management System Online (DMS Online) | AvePoint Document Management System Online |
| AvePoint Portal Manager | AvePoint Portal Manager | AvePoint Portal Manager |
| AvePoint Portal Manager | AvePoint Portal Manager for Room - Terminal Interface View | AvePoint Portal Manager for Room - Terminal Interface View |
| EnPowerCloud GovernanceCloud Backup for Microsoft 365Cloud Backup for IaaS + PaaSInsights FlyMyHubtyGraphAvePoint Portal Manager | Custom app with delegated permissions (API Permissions Required by Custom Apps) | [custom app name]You can also get its application ID in the app profile detail page. |
Before you choose the User consent method, complete the following preparations:
Ensure that your organization has granted admin consent to the app in Microsoft Entra ID. You can refer to the steps below to grant admin consent to an app:
Log in to Microsoft Entra admin center (or Microsoft Azure portal).
Follow the instructions below to grant admin consent to an AvePoint app or a custom app:
To grant admin consent to an AvePoint app, navigate to Microsoft Entra ID > Enterprise applications, click the app, click Permissions in the Security menu, and then click Grant admin consent for [Tenant name].

To grant admin consent to a custom app, navigate to Microsoft Entra ID > App registrations, click the app, click API permissions in the Manage menu, and then click Grant admin consent for [Tenant name].

Refer to the following information to prepare required users who consent to the apps:
To scan and manage Power Platform objects, the user who provides consent must have the following required license/role:
The Power Platform Administrator role must be assigned to the user who provides consent for the app profiles for scanning Environments, Connections, Power Apps, Solutions, Power Automate, or Copilot Studio objects.
The Power BI license and Fabric Administrator role must be assigned to the user who provides consent for the app profiles for scanning Power BI objects.
To re-authorize an AvePoint default service app for Viva Engage, the user who provides consent must have an Engage Administrator (Yammer Administrator in Microsoft Entra ID) role.
To re-authorize the Cloud Backup Express app, the user who provides consent to the app must have the Microsoft 365 Backup Administrator role.
To re-authorize a custom app for AvePoint Portal Manager, the user who provides consent to the app must have the Teams Service admins role or a higher privileged role.
To re-authorize the Cloud Governance delegated app, the user who provides consent to the app must be a group owner.
lf your organization intends to modify these two settings, Outside Senders and Subscribe Members, they must ensure that the consent user is added into the group owners of all groups for which these two settings are to be modified.
To re-authorize an app profile with the User consent method, refer to the steps below:
Select an app profile and click Re-authorize.
Note the following when you re-authorize different app profiles:
When you re-authorize an app profile for a delegated app used by the Cloud Backup for Microsoft 365 service, you also need to choose the functions which will use this app.
When you re-authorize an app profile for a Custom Azure app with delegated permissions app, refer to the following instructions:
Application ID – Enter the application ID of the custom app. To keep using the current app, you can get its application ID in the app profile detail page. If you want to change to another app, enter the application ID of the app that your organization has created. For additional details on creating an app, refer to Create a Custom Azure App.
Certificate file (.pfx) – Click Browse and select your app’s private certificate (the .pfx file).
Ensure this .pfx file is paired with the .cer/.crt file which is uploaded for this custom app in Microsoft Entra ID. If your organization does not have any certificates, you can create self-signed certificates by referring to Prepare a Certificate for the Custom Azure App.
Certificate password – Enter the password of the certificate.
Select the User consent option.
Click Continue to consent.