Home > Settings > Manage Customer App Profiles

Export to PDF

Manage Customer App Profiles

On the Settings > Additional > Customer app profile page, the app profiles that you created for your customers’ services are displayed. You can perform the following actions to manage customer app profiles:

- **Create** **app profile** – To get started with Nitro, Azure security management, Baseline management, Workspace management, Risk management, Change communication management, and User and device management, an app profile for your customer’s organization is required. You can also create app profiles for customer’s AvePoint services, including Cloud Backup for Microsoft 365, Policies for Microsoft 365, Insights, and Fly. For detailed instructions, refer to [Create a Customer App Profile](#missing-link). - **Re-authorize app** – The app profiles with the **Expired** status must be re-authorized. To re-authorize the app for an app profile, select the app profile and click **Re-authorize app**. Enter the credentials of the customer’s tenant account, review the required permissions, and click **Accept**. > ***Note**: Currently, only modern app profiles can be re-authorized on this page. Classic app profiles and custom app profiles need to be re-authorized in AvePoint Online Services. For detailed instructions, refer to . - **Delete** – To delete the app profiles, select the app profiles and click **Delete**. > ***Note**: If the app type of an app profile is not supported for creation in **Customer app profile**, the app profile cannot be deleted.

Create a Customer App Profile

On the Customer app profile page, click Create app profile and follow the steps below to create an app profile for a customer organization:

  1. Select customer and tenant – Select the customer and tenant for which you want to create app profiles. Click Next.

  2. Select services – Select either an Elements premium service or AOS services for which you want to create app profiles. Click Next.

    • Elements premium services

      • Other premium services – Premium services include Workspace management, Risk management, Change management communication, and User and device management.

      • Baseline management

      • Azure security management

      • Nitro

    • AOS Services

      *Note: Only services that have been added for the customer can be displayed here.

      • Cloud Backup for Microsoft 365

      • Policies for Microsoft 365

      • Insights

      • Fly

  3. Choose setup method (For AOS services only) – Now, only modern mode is supported. In this mode, the related apps are listed in a service-based view, and you can consent to apps separately for the selected services.

  4. Consent to apps – Refer to the instructions below to consent:

    • For other premium services, Azure security management, and Nitro, click Save and authenticate. Enter the credentials of the customer’s Microsoft 365 Global Administrator account. Review the permissions requested by this app and click Accept.

      • For Other premium services, the app type should be APElements Security and Analysis.

      • For Nitro, the app type should be APElements Automation.

      • For Azure security management, the app type should be APElements Azure Security Management.

      For the required permissions by the apps, refer to the app permissions sections below.

    • For Baseline management, you can select a setup method based on your scenario:

      Modern mode is the recommended mode, which uses AvePoint’s default app, APElements Baseline Management. Click Authenticate. The APElements Baseline Management app will be automatically created in the Microsoft Entra ID. For the required permissions by the app, refer to the app permissions sections below.

      Custom app profile is recommended for organizations who have identified use cases with extremely limited required permissions. Instead of using AvePoint’s default app, you can configure the tenant’s custom app and create a custom app profile.

      Before creating a custom app profile, you must create a custom app with delegated permissions in Microsoft Entra ID, add the API permissions required by Baseline management to the app, and grant admin consent to the app. For the detailed instructions on creating a custom app with delegated permission, refer to . For the required permissions by the app, refer to the app permissions sections below.

      *Note: Redirect URI and ID tokens are required by a custom Azure app with delegated permissions. When editing the Redirect URIs setting, enter the following URL based on your Elements environments:

      Refer to the following steps to create a custom app profile:

      1. Click Authenticate.

      2. Complete the following information on the Create app profile window:

        • App profile name – Enter a name for the app profile.

        • Application ID – Enter the application ID of the application that has been created in Microsoft Entra ID.

        • Certificate file (.pfx) – Click Browse and select your app’s private certificate (the .pfx file).

          *Note: Ensure this .pfx file is paired with the .cer/.crt file uploaded to Microsoft Entra ID when your organization creates this custom app. If your organization does not have any certificates, you can create self-signed certificates by referring to .

        • Certificate password – Enter the password of the certificate.

      3. Click Consent.

      4. Enter the credentials of the customer’s Microsoft 365 Global Administrator account.

      5. Review the permissions requested by this app and click Accept.

    • For AOS services, click Authenticate next to the app. When creating an app profile for a delegated app used by the Cloud Backup for Microsoft 365 service, you also need to choose the functions that will use this app.

      Enter the credentials of the customer’s Microsoft 365 Global Administrator account. Review the permissions requested by this app and click Accept.

      For the app types of AOS services and required permissions, refer to .

    When you finish creating app profiles, click Save.

  5. After you create app profiles for the apps that will be used to manage Exchange mailboxes and settings / Security and distribution group objects / Microsoft 365 Defender settings, you may need to go to Microsoft Entra admin center (or Microsoft Azure portal) to assign the Exchange Administrator role to the app. For additional details on assigning the role, refer to .

    *Note: For the APElements Baseline Management and APElements Security and Analysis apps required by premium services, the required roles will be automatically assigned to the apps in the Microsoft Entra ID within 24 hours after authorization. However, for AvePoint Online Services, the Exchange Administrator role must be assigned manually.

App Permissions Required by Nitro

The table below lists the permissions that need to be accepted when you authorize the APElements Automation app.

APIPermissionType
Microsoft GraphGroup.Create(Create groups)Application
Microsoft GraphGroupMember.ReadWrite.All(Read and write all group memberships)Application
Microsoft GraphDeviceManagementRBAC.ReadWrite.All(Read and write Microsoft Intune RBAC settings)Application
Microsoft GraphGroup.ReadWrite.All(Read and write all groups)Application
Microsoft GraphRoleManagement.ReadWrite.Directory(Read and write all directory RBAC settings)Application
Microsoft GraphUser.ReadWrite.All(Read and write all users' full profiles)Application
Microsoft GraphDirectory.ReadWrite.All(Read and write directory data)Application
Microsoft GraphPolicy.Read.All(Read your organization's policies)Application
Microsoft GraphPolicy.ReadWrite.ConditionalAccess(Read and write your organization's conditional access policies)Application
Microsoft GraphDomain.ReadWrite.All(Read and write domains)Application
Microsoft GraphPolicy.ReadWrite.Authorization(Read and write your organization's authorization policy)Application
Microsoft GraphDeviceManagementServiceConfig.ReadWrite.All(Read and write Microsoft Intune configuration)Application
Microsoft GraphDeviceManagementConfiguration.ReadWrite.All(Read and write Microsoft Intune device configuration and policies)Application
Microsoft GraphDeviceManagementManagedDevices.ReadWrite.All(Read and write Microsoft Intune devices)Application
Microsoft GraphDeviceManagementApps.ReadWrite.All(Read and write Microsoft Intune apps)Application
SharePointSites.FullControl.All(Have full control of all site collections)Application

App Permissions Required by Baseline Management

The table below lists the permissions that should be accepted when you authorize the APElements Baseline Management app under the modern mode app profile.

For the custom app profile, the permissions required by Baseline management remain identical to those of the modern mode app profile.

Additional role requirements: the app requires the Exchange Administrator, Attribute Definition Reader, and Security Administrator roles. For the modern mode app profile, these roles will be automatically assigned to the app in the Microsoft Entra ID within 24 hours after authorization (no manual action is needed). However, for the custom app profile, you must manually assign these roles to the app before the authorization.

APIPermissionType
Microsoft GraphApplication.ReadWrite.All(Read and write all terms of use agreements)Application
Microsoft GraphCustomSecAttributeDefinition.ReadWrite.All(Read and write custom security attribute definitions)Application
Microsoft GraphDeviceManagementApps.ReadWrite.All(Read and write Microsoft Intune apps)Application
Microsoft GraphDeviceManagementConfiguration.ReadWrite.All(Read and write Microsoft Intune device configuration and policies)Application
Microsoft GraphDeviceManagementManagedDevices.ReadWrite.All(Read and write Microsoft Intune devices)Application
Microsoft GraphDeviceManagementRBAC.ReadWrite.All(Read and write Microsoft Intune RBAC settings)Application
Microsoft GraphDeviceManagementServiceConfig.ReadWrite.All(Read and write Microsoft Intune configuration)Application
Microsoft GraphDirectory.ReadWrite.All(Read and write directory data)Application
Microsoft GraphGroup.Create(Create groups)Application
Microsoft GraphGroup.ReadWrite.All(Read and write all groups)Application
Microsoft GraphGroupMember.ReadWrite.All(Read and write all group memberships)Application
Microsoft GraphIdentityRiskEvent.ReadWrite.All(Read and write all risk detection information)Application
Microsoft GraphIdentityRiskyServicePrincipal.ReadWrite.All(Read and write all identity risky service principal information)Application
Microsoft GraphIdentityRiskyUser.ReadWrite.All(Read and write all risky user information)Application
Microsoft GraphOrganization.ReadWrite.All(Read and write organization information)Application
Microsoft GraphOrganizationalBranding.ReadWrite.All(Read and write organizational branding information)Application
Microsoft GraphPolicy.Read.All(Read your organization's policies)Application
Microsoft GraphPolicy.ReadWrite.AccessReview(Read and write your organization's directory access review default policy)Application
Microsoft GraphPolicy.ReadWrite.ApplicationConfiguration(Read and write your organization's application configuration policies)Application
Microsoft GraphPolicy.ReadWrite.AuthenticationFlows(Read and write authentication flow policies)Application
Microsoft GraphPolicy.ReadWrite.AuthenticationMethod(Read and write all authentication method policies)Application
Microsoft GraphPolicy.ReadWrite.Authorization(Read and write your organization’s authorization policy)Application
Microsoft GraphPolicy.ReadWrite.ConditionalAccess(Read and write your organization's conditional access policies.)Application
Microsoft GraphRoleManagement.ReadWrite.Directory(Read and write all directory RBAC settings)Application
Microsoft GraphUser.ReadWrite.All(Read and write all users’ full profiles)Application
Microsoft GraphApplication.ReadWrite.OwnedBy(Manage apps that this app creates or owns)Application
Microsoft GraphIdentityProvider.ReadWrite.All(Read and write identity providers)Application
Microsoft GraphPolicy.ReadWrite.ExternalIdentities(Read and write your organization's external identities policy)Application
Microsoft GraphRoleManagementPolicy.ReadWrite.Directory(Read, update, and delete all policies for privileged role assignments of your company's directory)Application
Microsoft GraphPolicy.ReadWrite.CrossTenantAccess(Read and write your organization’s cross tenant access policy)Application
Microsoft GraphSharePointTenantSettings.ReadWrite.All(Read and change SharePoint and OneDrive tenant settings)Application
Microsoft GraphOrgSettings-Forms.ReadWrite.All(Read and write organization-wide Microsoft Forms settings)Application
Microsoft GraphOrgSettings-AppsAndServices.ReadWrite.All(Read and write organization-wide apps and services settings)Application
Microsoft GraphOrgSettings-Todo.ReadWrite.All(Read and write organization-wide Microsoft To Do settings)Application
Microsoft GraphReportSettings.ReadWrite.All(Read and write all admin report settings)Application
Microsoft GraphOrgSettings-Microsoft365Install.ReadWrite.All(Read and write organization-wide Microsoft 365 apps installation settings)Application
Microsoft GraphOrgSettings-DynamicsVoice.ReadWrite.All(Read and write organization-wide Dynamics customer voice settings)Application
Microsoft GraphSecurityEvents.Read.All(Read your organization's security events)Application
Microsoft GraphPolicy.ReadWrite.DeviceConfiguration(Read and write your organization's device configuration policies)Delegated
Microsoft GraphDeviceManagementServiceConfig.ReadWrite.All(Read and write Microsoft Intune configuration)Delegated
Microsoft GraphDeviceManagementConfiguration.ReadWrite.All(Read and write Microsoft Intune device configuration and policies)Delegated
Microsoft GraphPolicy.ReadWrite.MobilityManagement(Read and write your organization's mobility management policies)Delegated
Microsoft GraphDirectory.AccessAsUser.All(Access directory as the signed-in user)Delegated
Microsoft GraphGroup.ReadWrite.All(Read and write all groups)Delegated
Office 365 Exchange OnlineExchange.ManageAsApp(Manage Exchange as application)Application
Office 365 Exchange OnlineExchange.Manage(Manage Exchange configuration)Delegated
Skype and Teams Tenant Admin APIapplication_access(application_access)Application
Skype and Teams Tenant Admin APIuser_impersonation(Access Microsoft Teams and Skype for Business data as the signed in user)Delegated
ProjectWorkManagementOrgSettings-Planner.ReadWrite.All(Read and write organization-wide Microsoft Planner settings)Application
SharePointSites.FullControl.All(Have full control of all site collections)Application
PowerApps ServiceUser(Access the PowerApps Service API)Delegated

App Permissions Required by Other Premium Services

The table below lists the permissions that should be accepted when you authorize the APElements Security and Analysis app for the following premium services: Workspace management, Risk management, Change management communication, and User and device management.

Additional role requirements: this app requires the Exchange Administrator and Groups Administrator roles. These roles will be automatically assigned to the app in the Microsoft Entra ID within 24 hours after authorization. No manual action is needed.

APIPermissionType
Azure Rights Management ServicesContent.DelegatedReader(Read protected content on behalf of a user)Application
Azure Rights Management ServicesContent.SuperUser(Read all protected content for this tenant)Application
Azure Service Managementuser_impersonation(Access Azure Resource Manager as organization users)Delegated
Dynamics CRMuser_impersonation(Access Common Data Service as organization users)Delegated
Microsoft GraphAdministrativeUnit.ReadWrite.All(Read and write administrative units)Application
Microsoft GraphAuditLog.Read.All(Read all audit log data)Application
Microsoft GraphCallRecords.Read.All(Read all call records)Application
Microsoft GraphChannel.ReadBasic.All(Read the names and descriptions of all channels)Application
Microsoft GraphChannelMember.Read.All(Read the members of all channels)Application
Microsoft GraphChannelSettings.ReadWrite.All(Read and write the names, descriptions, and settings of all channels)Application
Microsoft GraphDirectory.ReadWrite.All(Read and write directory data)Application
Microsoft GraphFiles.Read.All(Read files in all site collections)Application
Microsoft GraphGroup.ReadWrite.All(Read and write all groups)Application
Microsoft GraphGroupMember.ReadWrite.All(Read and write all group memberships)Application
Microsoft GraphInformationProtectionPolicy.Read.All(Read all published labels and label policies for an organization)Application
Microsoft GraphReports.Read.All(Read all usage reports)Application
Microsoft GraphRoleManagement.ReadWrite.Directory(Read and write all directory RBAC settings)Application
Microsoft GraphSites.ReadWrite.All(Read and write items in all site collections)Application
Microsoft GraphTeam.ReadBasic.All(Get a list of all Teams)Application
Microsoft GraphTeamMember.ReadWrite.All(Add and remove members from all Teams)Application
Microsoft GraphTeamSettings.ReadWrite.All(Read and change all Teams' settings)Application
Microsoft GraphUser.ReadWrite.All(Read and write all users’ full profiles)Application
Microsoft GraphReportSettings.Read.All(Read all admin report settings)Application
Microsoft GraphPolicy.ReadWrite.AuthenticationMethod(Read and write all authentication method policies)Application
Microsoft GraphBitlockerKey.Read.All(Read BitLocker keys)Application
Microsoft GraphDevice.ReadWrite.All(Read and write devices)Application
Microsoft GraphDeviceManagementApps.ReadWrite.All(Read and write Microsoft Intune apps)Application
Microsoft GraphDeviceManagementConfiguration.ReadWrite.All(Read and write Microsoft Intune device configuration and policies)Application
Microsoft GraphDeviceManagementManagedDevices.PrivilegedOperations.All(Perform user-impacting remote actions on Microsoft Intune devices)Application
Microsoft GraphDeviceManagementManagedDevices.ReadWrite.All(Read and write Microsoft Intune devices)Application
Microsoft GraphDeviceManagementServiceConfig.ReadWrite.All(Read and write Microsoft Intune configuration)Application
Microsoft GraphPolicy.ReadWrite.DeviceConfiguration(Read and write your organization's device configuration policies)Application
Microsoft GraphUserAuthenticationMethod.ReadWrite.All(Read and write all users' authentication methods)Application
Microsoft GraphPolicy.Read.All(Read your organization's policies)Application
Microsoft GraphDirectory.AccessAsUser.All(Access directory as the signed-in user)Delegated
Microsoft GraphUser.Read.all(Read all users’ full profiles)Delegated
Microsoft GraphTeamSettings.ReadWrite.All(Read and change all teams' settings)Delegated
Microsoft GraphChannelMessage.Send(Send channel messages)Delegated
Microsoft Information Protection Sync ServiceUnifiedPolicy.Tenant.Read(Read all unified policies of the tenant)Application
Office 365 Exchange OnlineExchange.ManageAsApp(Manage Exchange as application)Application
Office 365 Exchange Onlinefull_access_as_app(Use Exchange Web Services with full access to all mailboxes)Application
Office 365 Management APIsActivityFeed.Read(Read activity data for your organization)Application
Power BI ServiceTenant.Read.All(View all content in tenant)Application
Power BI ServiceDashboard.ReadWrite.All(Read and write all dashboards)Delegated
Power BI ServiceDataflow.ReadWrite.All(Read and write all dataflows)Delegated
Power BI ServiceDataset.ReadWrite.All(Read and write all datasets)Delegated
Power BI ServiceReport.ReadWrite.All(Read and write all reports)Delegated
Power BI ServiceTenant.ReadWrite.All(Read and write all content in tenant)Delegated
Power BI ServiceWorkspace.ReadWrite.All(View and write all workspaces)Delegated
PowerApps ServiceUser(Access the PowerApps Service API)Delegated
SharePointSites.FullControl.All(Have full control of all site collections)Application
SharePointUser.ReadWrite.All(Read and write user profiles)Application
SharePointAllSites.FullControl(Have full control of all site collections)Delegated

App Permissions Required by Azure Security Management

The table below lists the permissions that should be accepted when you authorize the APElements Azure Security Management app.

Add this app to the subscriptions that you want to manage and grant this app the Contributor role and below roles.

*Note: The roles must be added after you consent the app and before you save the app profile in Elements.

- Azure Kubernetes service: - If the authentication and authorization of the cluster is **Microsoft Entra ID authentication with Kubernetes RBAC**, the app must be added to the group with admin access within the cluster. - If the authentication and authorization of the cluster is **Microsoft Entra ID authentication with Azure RBAC**, the app must have the **Azure Kubernetes Service RBAC Cluster Admin** role assigned. - Key Vault: - If the permission model is **Azure role-based access control**, the app must have the **Key Vault Administrator** role assigned. - If the permission model is **Vault access policy**, the app must have the **Get** and **List** permissions for keys and secrets.
APIPermissionType
Azure Service ManagementUser_impersonation(Access Azure Resource Manager as organization users)Delegated
Microsoft GraphUser.Read.All(Read all users' full profiles)Delegated