Home > Manage Service Accounts > Manage Microsoft 365 Service Account Profiles
Export to PDFThe services that support the Microsoft 365 service account authentication method are listed below:
*Note: The AvePoint Online Services common service option is only supported for service providers to create service account profiles.
The Tenant Owner and Service Administrators can manage service account profiles by navigating to Management > Service account. On the Service account page, you can perform the following actions:
*Note: If your organization has configured service account pools in the AOS classic UI (before June 2023 release), you can manage these settings by referring to the instructions in the appendix: Manage Account Pool (Obsolete).
To create a service account profile, click Create. Then, configure the following settings in the Create service account profile pane.
*Note: If you have configured service account profiles in the classic UI, these service account profiles can still be used to scan objects and invite users in the new UI.
Profile name – Enter a name for the service account profile.
Description – Enter an optional description.
Select tenant – Select a tenant from the drop-down list.
Select service – Select at least one service from the drop-down list.
Username – Specify an account with the permissions required by your tenant’s cloud services. The permissions of the Microsoft 365 service account vary with the different cloud services your tenant is using. Refer to the Required Permissions of Cloud Services section below for more information.
Note the following:
AvePoint does not recommend that a personal active user account be used as the service account. We recommend you use a separate service account to manage all administration.
If you run a scan profile to scan SharePoint sites / Microsoft 365 Groups, the specified service account will be automatically added as one of the Term Store Administrators.
The specified Microsoft 365 account cannot have multi-factor authentication (MFA) enabled. If your organization has MFA enabled, you can refer to additional details in the following section: Helpful Notes for Passing the Validation Test of a Service Account.
Password – Enter the login password of the account above.
*Note: The password is validated via Microsoft 365 API. Due to a Microsoft 365 API limitation, you may encounter the following issue: the password is checked as invalid here, but you can use this password to log into Microsoft 365 successfully. To resolve the issue, you must change your password in Microsoft 365, and then enter the new password here. For details about the password limitations and requirements, refer to Password Limitations and Requirements of Microsoft 365 Accounts.
Click Save to save your configurations, or click Cancel to go back to the Service account page without saving any configurations.
If you encounter the error Your organization has set access policies that block the validation and the service account profile cannot be saved, refer to the solutions in the Helpful Notes for Passing the Validation Test of a Service Account section below for troubleshooting.
The table below details the password limitations and requirements of Microsoft 365 accounts. Note that the password limitations and requirements are from Microsoft 365.
| Property | Requirements |
|---|---|
| Characters Allowed | ● A-Z● a-z● 0-9● @ # $ % ^ & * - _ ! + = [] {} |
| Characters Not Allowed | ● Unicode characters● Spaces● Strong passwords only: Cannot contain a dot character (.) immediately preceding the @ symbol. |
| Password Restrictions | ● Eight (8) characters to the minimum and sixteen (16) characters to the maximum● Strong passwords only: Three of the following are required:○ Lowercase characters○ Uppercase characters○ Numbers (0-9)○ Symbols (see the symbols listed in Characters Allowed above) |
| Password Expiry | By default, password expiry is enabled.If you want to disable it, navigate to Microsoft 365 > Admin center > Settings > Security & privacy > Password policy, click Edit, and then click the Off button. |
| Password Expiry Duration | By default, a password will expire in 90 days.If you want to change the duration, navigate to Microsoft 365 > Admin center > Settings > Security & privacy > Password policy, click Edit, and then modify the number in the Days before passwords expire field. |
| Password Expiry Notification | By default, a password expiry notification will be sent to users 14 days before the password expires.If you want to change the notification time, navigate to Microsoft 365 > Admin center > Settings > Security & privacy > Password policy, click Edit, and then modify the number in the Days before a user is notified about expiration field. |
If your organization uses multi-factor authentication (MFA), or if you encounter the error Your organization has set access policies that block the validation, causing that the service account profile cannot be saved, refer to the solutions below for troubleshooting:
The following services support using a Microsoft 365 service account for authentication. The permissions of the Microsoft 365 service account vary with the different cloud services your tenant is using. Refer to the information in the links below to prepare a Microsoft 365 account and assign the required roles to this account.
*Note: The information in this section is only for customers who have configured service account pools in the AOS classic UI (before June 2023 release).
SharePoint Online has a built-in throttling feature that prevents one account from processing several requests simultaneously. To avoid getting throttled or blocked in SharePoint Online, you can use an account pool that contains multiple Microsoft 365 accounts.
When AvePoint Online Services (AOS) registers SharePoint Online site collections and OneDrive, AOS grants the site collection administrator permission to the group set in the account pool for Sites, Mailboxes, Groups, and Teams / Project Sites / Exchange Public Folders, and the Microsoft 365 accounts in the account pool will inherit the site collection administrator permission from the group. With the credentials of these accounts, AvePoint services can work smoothly. For example, Cloud Backup for Microsoft 365 can manage a large amount of data simultaneously, and Cloud Governance can process multiple requests simultaneously.
For an overview of what services can use a Microsoft 365 account pool, refer to the What Services Can Use a Microsoft 365 Account Pool? section.
To build an account pool in AvePoint Online Services, create a group in Microsoft 365 first. The group type can be Microsoft 365 Group, mail-enabled security group, or security group. This group should contain a certain number of users, and these users can be unlicensed in Microsoft 365.
The table below lists the required information for each object type.
| Object Type | Need Account Pool? | Need Username? | Need Password? | Need SharePoint Administrator Role? | Need License? |
|---|---|---|---|---|---|
| SharePoint Online Site Collections | Yes | Yes | Yes | No | No |
| OneDrive | Yes | Yes | Yes | No | No |
| Microsoft 365 Group Team Sites | Yes | Yes | Yes | No | No |
| Exchange Online Mailboxes | Yes | Yes | Yes | No | No |
| Microsoft 365 Group Mailboxes | Yes | Yes | Yes | No | No |
| Microsoft 365 Groups | Yes | Yes | Yes | No | YesHave the SharePoint Online and Exchange Online product licenses assigned in Microsoft 365. |
| Microsoft Teams | Yes | Yes | Yes | No | YesHave the Exchange Online and Microsoft Teams product licenses assigned in Microsoft 365. |
| Project Online Site Collections | Yes | Yes | Yes | No | YesHave one of the following Project Online product licenses assigned in Microsoft 365: Essentials, Professionals, or Premium. |
| Exchange Online Public Folders | Yes | Yes | No | No | YesHave the Exchange Online product license assigned in Microsoft 365. |
| Microsoft 365 Users | Yes | Yes | Yes | No* | YesHave one of the following Microsoft Entra ID product licenses assigned in Microsoft 365: Premium P1 or Premium P2. |
| Viva Engage Communities | No | No | No | No | No |
Note the following:
The Tenant Owner and Service Administrators can then manage the account pool by navigating to Management > Service account, and then clicking the classic UI link to open the Manage Account Pool page in a new tab. Follow the instructions below to configure settings on the Manage Account Pool page:
Select a Tenant – Select a tenant from the drop-down list. The tenant is retrieved from the previously configured app profile or Microsoft 365 service account profile.
Configure the account pool for Sites, Mailboxes, Groups, and Teams, Project Sites, or Exchange Public Folders according to the objects you will back up or manage via services for Microsoft 365.
*Note: The Sites, Mailboxes, Groups, and Teams tab includes different object types for the following cloud services:
For the EnPower service, this tab includes SharePoint sites, OneDrive, Microsoft 365 Group team sites, Exchange Online mailboxes, and Microsoft 365 mailboxes.
For the Fly service, this tab includes SharePoint sites, OneDrive, Microsoft 365 Group team sites, Exchange Online mailboxes, Microsoft 365 Groups, and Microsoft Teams.
For other services, this tab includes SharePoint sites, OneDrive, and Microsoft 365 Group team sites.
Click a tab and configure the following settings:
Group Name – Enter the name of the group you prepared.
Click Validate next to the group name. Group members will be displayed in the Group Users field. For the minimum number of users who must be included in the group, refer to the How Many Accounts Should be Added into an Account Pool? section.
Note the following:
If a user account exists in a service account profile, this service account will be used for managing operations in your AvePoint Online Services tenant and will also be used to execute application-level jobs.
For backing up Exchange Online Public Folders, you do not need to provide the password of the account because of the impersonation technology. You can view more information about impersonation by clicking the following link: .
If the account of a user has multi-factor authentication (MFA) enabled in Microsoft 365, turn on the toggle to enable MFA, and then enter the app password of this account.
To protect Planner data, the account must be both owner and member of the scanned Microsoft 365 Groups and Teams.
If the account of a user has multi-factor authentication enabled through a conditional access policy configured in Microsoft Entra, the account cannot be added to the account pool.
Custom SharePoint Online Admin Center URL – If you enable MFA for one or more accounts, you must enter your SharePoint Online admin center URL in the text box.
When you finish the configurations for all desired account pools, click Save to save your configurations. If you want to remove the group from the account pool, click Clear next to the group name, and then click Save.
*Note: After an account pool for a tenant is saved, the account pool will take effect on the next scan job.
If you edit the account pool to change the group, a pop-up window will appear recommending you rerun the scan for auto discovery. Rerun the scan profiles to make the changes take effect immediately. If you do not rerun the scan profiles, your changes will be saved but will not take effect until the next scan completes.
The following services will use the Microsoft 365 account pool when the service account authentication method is used in the corresponding scan profile:
If this is the first time you are managing objects, we recommend that the added group in the account pool contains at least seven(7) users for managing every 1000 objects. If it is not the first time you are managing objects, we recommend that the added group in the account pool contain at least three(3) users for managing every 2000 objects.
For example:
*Note: The information in this section is only for customers who have configured MFA service account profiles in the AOS classic UI (before the June 2023 release).
If your organization uses multi-factor authentication (MFA) in Microsoft 365, refer to the following information to configure the required settings based on your scenario:
Navigate to AvePoint Online Services > Management > Service account, and click the MFA service account profile. On the MFA service account profile detail page, click Edit. Then, refer to the following instructions to edit the MFA service account profile:
Profile Name – Enter a name for the service account profile.
Description – Enter an optional description.
Enable MFA – If you want to keep this MFA service account profile in the classic UI, select the Our organization uses multi-factor authentication checkbox, and refer to the following steps to edit this MFA service account profile.
Note that MFA service account profiles have the following limitations:
The Microsoft 365 MFA service account profile cannot be used to invite Microsoft 365 users/groups as AvePoint Online Services users.
If your organization selects Block access for the Apps that don’t use modern authentication setting in the SharePoint admin center, the Microsoft 365 MFA service account profile cannot be used for the Ghost Guest Users rule in Cloud Management Identity Manager.
The Microsoft 365 MFA service account profile does not support some features in Cloud Management. For additional details, refer to . You can convert and deselect the checkbox here.
*Note: If you want to transfer this MFA service account to a common service account profile that can be edited in the AOS new UI, deselect the Our organization uses multi-factor authentication checkbox, and save your edits to this service account profile. Then, you can manage it by referring to instructions in the Manage Service Account Profiles section.
Username – Specify an account with the permissions required by your tenant’s cloud services. The permissions of the Microsoft 365 service account vary with the different cloud services your tenant is using. Refer to the Required Permissions of Cloud Services section for more information.
Note the following:
AvePoint does not recommend that a personal active user account be used as the service account. We recommend you use a separate service account to manage all administration.
With the Enable MFA option selected, you must enter the login ID of a Microsoft 365 Global Administrator account or SharePoint Administrator account.
Password – Enter the app password of the account above. For more information about app passwords, refer to the Microsoft technical article .
Click Validation Test to validate the information above.
Note the following:
When the validation test fails, and the error message indicates that your Microsoft 365 tenant has set access policies or enabled multi-factor authentication (MFA), refer to the Validation Test Troubleshooting section below.
As the Microsoft 365 user has multi-factor authentication (MFA) enabled, the user role information cannot be retrieved due to Microsoft API limitations, and the User Role field will be blank.
The password is validated via Microsoft 365 API. Due to a Microsoft 365 API limitation, you may encounter the following issue: the password is checked as invalid here, but you can use this password to log into Microsoft 365 successfully. To resolve the issue, you must change your password in Microsoft 365, and then enter the new password here. For details about the password limitations and requirements, refer to Password Limitations and Requirements of Microsoft 365 Accounts.
In Advanced Settings, you need to configure a SharePoint Online Admin Center URL. If your organization uses the default SharePoint Online admin center URL in Microsoft 365, select the Our organization uses the default SharePoint Online admin center URL option; if your organization uses a custom SharePoint Online admin center URL in Microsoft 365, select the Our organization uses a custom SharePoint Online admin center URL option, and enter the admin center URL in the text box.
*Note: If the Our organization uses multi-factor authentication checkbox is selected, you must manually enter the SharePoint Online admin center URL in the text box.
Click Save to save your configurations.
When the validation test fails, and you encounter one of the following error messages, refer to the solutions below for troubleshooting.