Home > Get Started > Create App Profile

Export to PDF

Create App Profile

To use EnPower, you must create the required app profiles for authentication and data retrieval. Refer to the table below for the app requirements of each management service.

Management serviceAppSetup methodDescription
Microsoft 365 managementEnPower for Microsoft 365Modern modeThe service app provided with all permissions required by the Microsoft 365 management in EnPower.
Microsoft 365 managementReporting for Microsoft 365Modern modeThe app with permissions required by all dynamic workflows triggered by events and those triggered by activity-related conditions.
Microsoft 365 managementAzure appCustom modeThe custom app to which you can select the permissions to grant. You can use the custom Azure app to meet your compliance policy. Refer to Permissions for Microsoft 365 Management for the permissions required by each Microsoft 365 management.*Note: After the app creation, an impersonation profile is required for mailbox and Group management functionalities. For details on the impersonation profile management refer to Settings.
Power Platform managementEnPower for Power PlatformModern modeThe service app provided with all permissions required by the Power Platform management in EnPower.
Power Platform managementReporting for Microsoft 365Modern modeThe app with permissions required by all dynamic workflows triggered by events and those triggered by activity-related conditions.
Power Platform managementAzure app with delegated permissionsCustom modeThe custom app to which you can select the permissions to grant. You can use the custom Azure app with delegated permissions to meet your compliance policy. Refer to Permissions for Power Platform Management for the permissions required by each Power Platform management.
Calling managementEnPower for Teams CallingModern modeThe service app provided with all permissions required by the Calling management in EnPower.
Calling managementReporting for Microsoft 365Modern modeThe app with permissions required by the report data collection for Calling related reports in EnPower.
Azure Resource ManagementEnPower for Azure ResourcesModern modeThe service app provided with all permissions required by the Azure Resource Management in EnPower.
Azure Resource ManagementAzure appCustom modeThe custom app to which you can select the permissions to grant. You can use the custom Azure app to meet your compliance policy. Refer to Permissions for Microsoft Azure for the permissions required by each Microsoft 365 management.
Microsoft Entra Applications ManagementEnPower for Microsoft Entra ApplicationsModern modeThe service app provided with all permissions required by the Microsoft Entra Applications Management in EnPower.
Microsoft Entra Applications ManagementAzure appCustom modeThe custom app to which you can select the permissions to grant. You can use the custom Azure app to meet your compliance policy. Refer to Permissions for Azure Entra ID enterprise for the permissions required by each Microsoft Entra application management.

For more details on creating the app profiles in AvePoint Online Services, refer to .

Note the following:

- When creating the app profiles, the account used to authorize the apps must have the Global Administrator role. However, after the app creation, you can re-authorize the apps and Global Administrator role is not required. For more details on the app re-authorization, refer to . - Starting October 12, 2025, you must add a service principal to your tenant when re-authorizing the Power Platform service app. This is required because the **PowerPages.Websites.Read** and **PowerPages.Websites.Write** API permissions for Power Pages management depend on the service principal. If you are using a custom Azure app with delegated permissions and want to manage Power Pages within EnPower, a service principal is also required to assign the necessary API permissions to your app. For more details on the service principal configurations, refer to . - To access the Sensitivity report for Teams management, you need to configure available Insights app profiles in your tenants. For detailed configuration and required permissions, refer to the .

Refer to the following table to view the minimum administrative role required for the account used to re-authorize the apps:

Management moduleServiceRequired role
Power PlatformEnvironmentPower Platform Administrator
Power PlatformConnectionsPower Platform Administrator
Power PlatformPower AppsPower Platform Administrator
Power PlatformPower AutomatePower Platform Administrator
Power PlatformPower BIFabric Administrator with Power BI license
Power PlatformCopilot StudioPower Platform Administrator with Power Platform license
Microsoft 365UsersNo admin role required
Microsoft 365GroupsNo admin role required
Microsoft 365MailboxesNo admin role required
Microsoft 365SharePointNo admin role required
Microsoft 365OneDriveNo admin role required
Microsoft 365TeamsTeams Administrator
CallingUsersTeams Administrator
CallingResource accountTeams Administrator
CallingPhone numbersTeams Administrator
CallingAuto attendantsTeams Administrator
CallingCall queuesTeams Administrator
CallingVoice policyTeams Administrator

Assign Exchange Administrator Role to the App

For EnPower for Microsoft 365, EnPower for Power Platform, and EnPower for Teams Calling service apps, as the apps are provisioned in Microsoft Entra ID, they need to have appropriate roles assigned.

- For Exchange-related tasks, including recipient management and protection features, you need to go to the Microsoft Entra admin center (or Azure portal) to assign the **Exchange** **Administrator** role to the EnPower for Microsoft 365 and EnPower for Teams calling app. - For the retrieval of information barrier segments, the app you are using for EnPower Microsoft 365 management requires the **Compliance Administrator** role. - To perform the following action against users with specific administrative roles, higher administrative roles as indicated in requires to be granted to the app: - Update user profile and phone numbers - Restore deleted users - Reset user password

To assign the role, click Exchange Administrator, Compliance Administrator, or any other role on the page and follow the steps below:

  1. Click Add assignments.

  2. In the Add assignments panel, search for and select the app.

  3. Click Add to assign the Exchange Administrator role.

Or you can assign custom Exchange Online role groups to the app. For details on assigning custom Exchange Online role groups, refer to .

Refer to the table below for the required roles to assign when you create custom role groups in the Exchange Online admin center:

ModuleEnPower featureRolePowerShell Cmdlet
Microsoft 365Create distribution groupsDistribution GroupsNew-DistributionGroup;
Microsoft 365Update distribution groupsDistribution GroupsSet-DistributionGroup;
Microsoft 365Update distribution groupsDistribution GroupsSet-DistributionGroup -Identity '{0}' -ManagedBy {1} -BypassSecurityGroupManagerCheck;
Microsoft 365Update dynamic membership distribution groupDistribution GroupsSet-DynamicDistributionGroup;
Microsoft 365Update dynamic membership distribution groupDistribution GroupsSet-DynamicDistributionGroup -Identity '{0}' -ManagedBy $null -BypassSecurityGroupManagerCheck
Microsoft 365Load distribution groupsDistribution GroupsGet-DistributionGroup;
Microsoft 365Load distribution group membersDistribution GroupsGet-DistributionGroupMember;
Microsoft 365Create dynamic distribution groupsDistribution GroupsNew-DynamicDistributionGroup;
Microsoft 365Load dynamic distribution groupsDistribution GroupsGet-DynamicDistributionGroup;
CallingLoad dynamic distribution groupsDistribution GroupsGet-DynamicDistributionGroup;
Microsoft 365Load dynamic distribution group membersDistribution GroupsGet-DynamicDistributionGroupMember;
Microsoft 365Delete dynamic distribution groupsDistribution GroupsRemove-DynamicDistributionGroup;
Microsoft 365Delete distribution groupsDistribution GroupsRemove-DistributionGroup;
Microsoft 365Update distribution group membersDistribution GroupsUpdate-DistributionGroupMember;
Microsoft 365Update distribution group membersDistribution GroupsUpdate-DistributionGroupMember -Identity '{0}' -Members {1} -BypassSecurityGroupManagerCheck -Confirm:$False;
Microsoft 365Add distribution group membersDistribution GroupsAdd-DistributionGroupMember;
Microsoft 365Delete distribution group membersDistribution GroupsRemove-DistributionGroupMember;
Microsoft 365Create mailboxesMail Recipient CreationNew-Mailbox;
Microsoft 365Delete mailboxesMail Recipient CreationRemove-Mailbox;
Microsoft 365Update mailbox detailsMail Recipient CreationSet-MailboxFolderPermission;
Microsoft 365Create mail contactsMail Recipient CreationNew-MailContact;
Microsoft 365Delete mail contactsMail Recipient CreationRemove-MailContact;
Microsoft 365Delete mail usersMail Recipient CreationRemove-MailUser;
Microsoft 365Update mailboxesMail RecipientsSet-Mailbox;
Microsoft 365Update mailboxesMail RecipientsAdd-MailboxPermission;
Microsoft 365Update mailboxesMail RecipientsAdd-RecipientPermission;
Microsoft 365Update mailboxesMail RecipientsSet-Mailbox -Identity '{0}' -EmailAddresses {1};
Microsoft 365Update mailboxesMail RecipientsSet-MailboxAutoReplyConfiguration;
Microsoft 365Update mailboxesMail RecipientsSet-MailboxRegionalConfiguration;
Microsoft 365Update mailboxesMail RecipientsAdd-MailboxFolderPermission;
Microsoft 365Update mailboxesMail RecipientsRemove-MailboxFolderPermission;
Microsoft 365Update mailboxesMail RecipientsRemove-MailboxPermission;
Microsoft 365Update mailboxesMail RecipientsRemove-RecipientPermission;
Microsoft 365Update mailboxesMail RecipientsSet-CASMailbox;
Microsoft 365Update mailboxesMail RecipientsSet-CalendarProcessing;
Microsoft 365Update mailboxesMail RecipientsSet-User;
Microsoft 365Load mailbox detailsMail RecipientsGet-MailboxPermission;
Microsoft 365Load mailbox detailsMail RecipientsGet-RecipientPermission;
Microsoft 365Load mailbox detailsMail RecipientsGet-MailboxAutoReplyConfiguration;
Microsoft 365Load mailbox detailsMail RecipientsGet-MailboxRegionalConfiguration;
Microsoft 365Load mailbox detailsMail RecipientsGet-CASMailbox;
Microsoft 365Load mailbox detailsMail RecipientsGet-CalendarProcessing;
Microsoft 365Load mailbox detailsMail RecipientsGet-User;
Microsoft 365Load mailbox detailsMail RecipientsGet-MailboxFolderPermission;
Microsoft 365Update mailbox archive settingsMail RecipientsEnable-Mailbox;
Microsoft 365Update mailbox archive settingsMail RecipientsDisable-Mailbox;
Microsoft 365Update Microsoft 365 GroupsMail RecipientsSet-UnifiedGroup;
Microsoft 365Add group delegatesMail RecipientsAdd-RecipientPermission;
Microsoft 365Remove group delegatesMail RecipientsRemove-RecipientPermission;
Microsoft 365Load Microsoft 365 GroupsMail RecipientsGet-UnifiedGroup;
Microsoft 365Load group delegatesMail RecipientsGet-RecipientPermission;
Microsoft 365Load mail contactsMail RecipientsGet-Contact;
Microsoft 365Load mail contactsMail RecipientsGet-MailContact;
Microsoft 365Update mail contactsMail RecipientsSet-Contact;
Microsoft 365Update mail contactsMail RecipientsSet-MailContact;
Microsoft 365Load mail usersMail RecipientsGet-MailUser;
Microsoft 365Update mail usersMail RecipientsSet-MailUser;
Microsoft 365Scan mailboxesMail RecipientsGet-Mailbox;
Microsoft 365Scan recipientsMail RecipientsGet-Recipient;
Microsoft 365Scan recipientsMail RecipientsGet-Recipient -Identity {0};
Microsoft 365Load mailbox policiesView-Only Configuration; Mail Recipient CreationGet-SharingPolicy;
Microsoft 365Load mailbox policiesView-Only Configuration; Mail Recipient CreationGet-RoleAssignmentPolicy;
Microsoft 365Load mailbox policiesView-Only Configuration; Mail Recipient CreationGet-AddressBookPolicy;
Microsoft 365Load mailbox policiesView-Only ConfigurationGet-RetentionPolicy;

Grant Reader Role for Azure Resources Monitoring

For the retrieval and monitoring of your Microsoft Azure resources, the app you are using for EnPower Microsoft Azure management requires the Reader role.

To assign the role, go to the page, and follow the steps below to add the AvePoint EnPower for Azure Resources and grant Reader role to each subscription where the Microsoft Azure resources you want to monitor belongs to:

*Note: The user to add this app to the subscription and grant it the Reader role must be the Owner of the subscription or the User access administrator of your tenant. 

  1. On the Subscription page, find the list of subscriptions. You can filter the subscriptions in the list or search for subscriptions via keywords.

  2. Click a subscription.

  3. Click Access control (IAM) on the left pane.

  4. Access control (IAM).

  5. On the Access control (IAM) page, click Add on the action bar and select Add role assignment from the dropdown list.

  6. In the Add role assignment pane, click Reader from the Role tab, and then click Next.

  7. In the Members list, find the Members field, and click Select members.

  8. In the Select members pane, enter a keyword in the Select box to search for the AvePoint EnPower for Azure Resources. Click the app to add it to the Selected members field and click the Select button.

  9. Click the Review + assign button to review the role assignment and click this button again to add this app as Reader for your subscription.