Permissions for Source OneDrive

To connect to the source, you can choose to only use a service account/delegated app profile, Fly app profile, or custom app profile as the authentication method. You can also use the combination of a service account/delegated app profile and a Fly app profile, or the combination of a service account/delegated app profile and a custom app profile.

Refer to the following sections to view the permissions required by the authentication methods.

Fly App Profile Permissions

With the Tenant Owner or Service Administrator role, you can create a Fly app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using the Fly app.

Refer to Fly App Profile Permissions about how to create a Fly app profile and required permissions of the Fly app profile.

Custom App Profile Permissions

With the Tenant Owner and Service Administrator role, you can create a custom app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using a custom Azure app.

Refer to the following procedures to create a custom app profile:

  1. Prepare a certificate in Microsoft Entra ID. Refer to for more information.

    You can ignore this step if you have a certificate.

  2. Create a custom Azure app in Microsoft Entra ID. Refer to for more information.

  3. .

  4. in AvePoint Online Services.

*Note: After you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token if there are permissions updated.

The required API permissions to the custom Azure app are different according to your destination.

When Destination is OneDrive

To migrate all OneDrive sites, add the following API permissions to the custom Azure app.

APIPermissionTypePurpose
Microsoft GraphRoleManagement.Read.Directory(Read all directory RBAC settings)ApplicationRetrieve Microsoft global groups and check required roles of the service account.
Microsoft GraphFiles.Read.All(Read files in all site collections)ApplicationRetrieve the users’ OneDrive site URLs.
Microsoft GraphUser.Read.All(Read all users’ full profiles)ApplicationRetrieve Microsoft 365 users for user mapping and retrieve users’ OneDrive site URLs.
Microsoft GraphSites.Read.All(Read items in all site collections)ApplicationOnly required if you want to run tenant discovery.
Microsoft GraphReportSettings.Read.All(Read all admin report settings)ApplicationOnly required if you want to run tenant discovery.
Microsoft GraphReports.Read.All(Read all usage reports)ApplicationOnly required if you want to run tenant discovery.
Microsoft GraphGroup.Read.All(Read all groups)ApplicationRetrieve details of Microsoft 365 Groups.
Microsoft Information Protection Sync ServiceUnifiedPolicy.Tenant.Read (Read all unified policies of the tenant)ApplicationOnly required if you want to manage the sensitivity labels of files.
Azure Rights Management Services*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.Content.SuperUser (Read all protected content for this tenant)ApplicationOnly required if you want to manage the sensitivity labels of files.
SharePoint/Office 365 SharePoint OnlineSites.FullControl.All (Have full control of all site collections)ApplicationRetrieve settings and permissions of OneDrive sites.
SharePoint/Office 365 SharePoint OnlineUser.Read.All(Read user profiles)ApplicationRetrieve SharePoint user profile service.

For easy use, you can directly use the following commands to add required API permissions through Manifest for Microsoft 365 Commercial tenants.

"requiredResourceAccess": [

        {

            "resourceAppId": "00000003-0000-0ff1-ce00-000000000000",

            "resourceAccess": [

                {

                    "id": "678536fe-1083-478a-9c59-b99265e6b0d3",

                    "type": "Role"

                },

                {

                    "id": "df021288-bdef-4463-88db-98f22de89214",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "00000012-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "7347eb49-7a1a-43c5-8eac-a5cd1d1c7cf0",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "00000003-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "01d4889c-1287-42c6-ac1f-5d1e02578ef6",

                    "type": "Role"

                },

                {

                    "id": "5b567255-7703-4780-807c-7be8301ae99b",

                    "type": "Role"

                },

                {

                    "id": "230c1aed-a721-4c5d-9cb4-a90514e508ef",

                    "type": "Role"

                },

                {

                    "id": "ee353f83-55ef-4b78-82da-555bfa2b4b95",

                    "type": "Role"

                },

                {

                    "id": "483bed4a-2ad3-4361-a73b-c83ccdbdc53c",

                    "type": "Role"

                },

                {

                    "id": "332a536c-c7ef-4017-ab91-336970924f0d",

                    "type": "Role"

                },

                {

                    "id": "df021288-bdef-4463-88db-98f22de89214",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "870c4f2e-85b6-4d43-bdda-6ed9a579b725",

            "resourceAccess": [

                {

                    "id": "8b2071cd-015a-4025-8052-1c0dba2d3f64",

                    "type": "Role"

                }

            ]

        }

    ],

*Note: The permissions listed above are required to migrate all OneDrive sites in your tenant. If you only want to migrate specific OneDrive sites, change to another custom app with different set of permissions. Refer to the following instructions:

  1. Add the following permissions to your app to be used.
APIPermissionTypePurpose  
Microsoft GraphFiles.Read.All(Read files in all site collections)ApplicationRetrieve the users’ OneDrive site URLs.
Microsoft GraphUser.Read.All(Read all users' full profiles)ApplicationRetrieve Microsoft 365 users for user mapping and retrieve users’ OneDrive site URLs.
Microsoft GraphSites.Selected(Access selected site collections)ApplicationRetrieve and migrate data of specified OneDrive sites.
Microsoft GraphReportSettings.Read.All(Read all admin report settings)ApplicationOnly required if you want to run tenant discovery.
Microsoft GraphRoleManagement.Read.Directory(Read all directory RBAC settings)ApplicationRetrieve Microsoft global groups and check required roles of the service account.
Microsoft GraphGroup.Read.All(Read all groups)ApplicationRetrieve details of Microsoft 365 Groups.
Microsoft GraphReports.Read.All(Read all usage reports)ApplicationOnly required if you want to run tenant discovery.
Microsoft Information Protection Sync ServiceUnifiedPolicy.Tenant.Read (Read all unified policies of the tenant.)ApplicationOnly required if you want to manage the sensitivity labels of files.
Azure Rights Management Services*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.Content.SuperUser(Read all protected content for this tenant)ApplicationOnly required if you want to manage the sensitivity labels of files.
SharePoint/Office 365 SharePoint OnlineSites.Selected(Access selected site collections)ApplicationRetrieve and migrate data of specified OneDrive sites.
SharePoint/Office 365 SharePoint OnlineUser.Read.All(Read user profiles)ApplicationRetrieve SharePoint user profile service.
For easy use, you can directly use the following commands to add required API permissions through **Manifest** for Microsoft 365 Commercial tenants.

"requiredResourceAccess": [

        {

            "resourceAppId": "00000012-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "7347eb49-7a1a-43c5-8eac-a5cd1d1c7cf0",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "870c4f2e-85b6-4d43-bdda-6ed9a579b725",

            "resourceAccess": [

                {

                    "id": "8b2071cd-015a-4025-8052-1c0dba2d3f64",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "00000003-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "01d4889c-1287-42c6-ac1f-5d1e02578ef6",

                    "type": "Role"

                },

                {

                    "id": "5b567255-7703-4780-807c-7be8301ae99b",

                    "type": "Role"

                },

                {

                    "id": "230c1aed-a721-4c5d-9cb4-a90514e508ef",

                    "type": "Role"

                },

                {

                    "id": "ee353f83-55ef-4b78-82da-555bfa2b4b95",

                    "type": "Role"

                },

                {

                    "id": "483bed4a-2ad3-4361-a73b-c83ccdbdc53c",

                    "type": "Role"

                },

                {

                    "id": "883ea226-0bf2-4a8f-9f9d-92c9162a727d",

                    "type": "Role"

                },

                {

                    "id": "df021288-bdef-4463-88db-98f22de89214",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "00000003-0000-0ff1-ce00-000000000000",

            "resourceAccess": [

                {

                    "id": "df021288-bdef-4463-88db-98f22de89214",

                    "type": "Role"

                },

                {

                    "id": "20d37865-089c-4dee-8c41-6967602d4ac8",

                    "type": "Role"

                }

            ]

        }

    ],

  1. in your environment.

  2. Access the and download the RegisterAzureADAppForGrantFullControl.ps1, GrantFullControlForOneDriveUser.ps1 and OneDriveUsers.csv files to a custom folder on a machine with a network connection.

  3. In the custom folder, open the RegisterAzureADAppForGrantFullControl.ps1 file with Notepad, and configure the following parameters based on your needs. Then, save the file.

    • Tenant – The name of your tenant. For example, mytenant.onmicrosoft.com.

    • AzureEnvironment – The Azure environment for authentication.

    • ApplicationName – (Optional) The name of the Azure AD app to be created. By default, the name will be PnP PowerShell For Grant Full Control.

  4. Open Windows PowerShell and enter the following commands in the Windows PowerShell window:

    . "file path"

    Replace file path with the full path of the RegisterAzureADAppForGrantFullControl.ps1 file in the extracted folder, and press Enter on the keyboard.

  5. Enter a password for the app certificate, and press Enter on the keyboard.

  6. Sign in with a user in your tenant to create the app.

    *Note: While registering the Azure AD app, the Permissions requested page will appear. Sign in using the Global Administrator account, and click Accept to continue the registration.

    The table below lists the required permissions by the app.

APIPermissionType
Microsoft GraphSites.FullControl.All(Have full control of all site collections)Application
Microsoft GraphUser.Read.All(Read all users’ full profiles)Application
SharePoint/Office 365 SharePoint OnlineSites.FullControl(Have full control of all site collections)Application
SharePoint/Office 365 SharePoint OnlineUser.Read.All(Read user profiles)Application
After the execution, the client ID of the Azure AD app and the path of the generated PFX certificate for the app will be displayed in the Windows PowerShell window. Note that they will be used when you execute the **GrantFullControlForOneDriveUser.ps1** script. A **Register Azure AD App_(TimeStamp).log** file will be generated in the same directory as the script. You can view the execution details in the file.

8. In the custom folder, open the OneDriveUsers.csv file, and enter the usernames of the OneDrive sites to be migrated as below.

![The OneDriveUsers.csv file.](/en/fly-user-guide/perform-onedrive-migrations/required-permissions-for-onedrive-migration/images/image345.png "The OneDriveUsers.csv file.")

9. In the custom folder, open the GrantFullControlForOneDriveUser.ps1 file with Notepad.

  1. Configure the following parameters with required information.

    • $appId = ' ' – Enter the client ID of your custom app.

    • $appName = ' ' – Enter the display name of your custom app.

    • $AzureEnvironment = ' ' – Enter the Azure environment for authentication.

    • $certPath = 'PnP PowerShell For Grant Full Control AppCertificate Path(.pfx)' – Enter the full path of the generated app certificate.

    • $connection = Connect-PnPOnline

      • Url – Enter the SharePoint admin center URL of your tenant.

        *Note: Your custom app may not have permissions to the SharePoint admin center URL. To avoid verifying the tenant domain while adding the connection in Fly, you can add the IsCheckAdminUrl=false string to the Customized features section in the migration policy.

      • ClientId – Enter the client ID of the PnP PowerShell For Grant Full Control app.

      • Tenant – Enter the ID of your tenant.

  2. Open Windows PowerShell and enter the following commands in the Windows PowerShell window:

    . "file path"

    Replace file path with the full path of the GrantFullControlForOneDriveUser.ps1 file in the extracted folder, and press Enter on the keyboard.

    The full path of the GrantFullControlForOneDriveUser.ps1file.

  3. Enter the certificate key of your custom app, and press Enter on the keyboard.

  4. Enter the certificate password of the PnP PowerShell For Grant Full Control app, and press Enter on the keyboard.

When Destination is Google Drive

  1. To migrate OneDrive sites to Google Drive, add the following API permissions to the custom Azure app.
APIPermissionTypePurpose
Microsoft GraphRoleManagement.Read.Directory(Read all directory RBAC settings)ApplicationRetrieve Microsoft global groups and check required roles of the service account.
Microsoft GraphFiles.Read.All(Read files in all site collections)ApplicationRetrieve the users’ OneDrive site URLs.
Microsoft GraphUser.Read.All(Read all users’ full profiles)ApplicationRetrieve Microsoft 365 users for user mapping and retrieve users’ OneDrive site URLs.
Microsoft GraphSites.Read.All(Read items in all site collections)ApplicationOnly required if you want to run tenant discovery.
Microsoft GraphReportSettings.Read.All(Read all admin report settings)ApplicationOnly required if you want to run tenant discovery.
Microsoft GraphReports.Read.All(Read all usage reports)ApplicationOnly required if you want to run tenant discovery.
Microsoft GraphGroup.Read.All(Read all groups)ApplicationRetrieve details of Microsoft 365 Groups.
Microsoft Information Protection Sync ServiceUnifiedPolicy.Tenant.Read (Read all unified policies of the tenant)ApplicationOnly required if you want to manage the sensitivity labels of files.
Azure Rights Management Services*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.Content.SuperUser (Read all protected content for this tenant)ApplicationOnly required if you want to manage the sensitivity labels of files.
SharePoint/Office 365 SharePoint OnlineSites.FullControl.All (Have full control of all site collections)ApplicationRetrieve settings and permissions of OneDrive sites.
SharePoint/Office 365 SharePoint OnlineUser.Read.All(Read user profiles)ApplicationRetrieve SharePoint user profile service.
  1. For easy use, you can directly use the following commands to add required API permissions through Manifest for Microsoft 365 Commercial tenants.

"requiredResourceAccess": [

        {

            "resourceAppId": "870c4f2e-85b6-4d43-bdda-6ed9a579b725",

            "resourceAccess": [

                {

                    "id": "8b2071cd-015a-4025-8052-1c0dba2d3f64",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "00000003-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "01d4889c-1287-42c6-ac1f-5d1e02578ef6",

                    "type": "Role"

                },

                {

                    "id": "5b567255-7703-4780-807c-7be8301ae99b",

                    "type": "Role"

                },

                {

                    "id": "230c1aed-a721-4c5d-9cb4-a90514e508ef",

                    "type": "Role"

                },

                {

                    "id": "ee353f83-55ef-4b78-82da-555bfa2b4b95",

                    "type": "Role"

                },

                {

                    "id": "483bed4a-2ad3-4361-a73b-c83ccdbdc53c",

                    "type": "Role"

                },

                {

                    "id": "332a536c-c7ef-4017-ab91-336970924f0d",

                    "type": "Role"

                },

                {

                    "id": "df021288-bdef-4463-88db-98f22de89214",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "00000012-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "7347eb49-7a1a-43c5-8eac-a5cd1d1c7cf0",

                    "type": "Role"

                }

            ]

        },

        {

            "resourceAppId": "00000003-0000-0ff1-ce00-000000000000",

            "resourceAccess": [

                {

                    "id": "678536fe-1083-478a-9c59-b99265e6b0d3",

                    "type": "Role"

                },

                {

                    "id": "df021288-bdef-4463-88db-98f22de89214",

                    "type": "Role"

                }

            ]

        }

    ],

Service Account Permissions

The Tenant Owner and Service Administrators can also for Microsoft 365 to connect AvePoint Online Services to your Microsoft 365 tenant.

*Note: Users with Multi-Factor Authentication (MFA) enabled cannot be used as the service account to perform migrations. You can use a delegated app profile instead.

If you use both app profile and service account authentications for the source, there are no permission requirements for the service account.

If you only use service account authentication for the source, make sure the service account meets the following requirements:

- **Site Collection Administrator** > ***Note**: If Fly detects that the service account is not the **Site Collection Administrator**, but the service account has the **SharePoint Administrator** or **Global Administrator** role, Fly will automatically add the service account as the **Site Collection Administrator** of the site collection. - **SharePoint Administrator** is also required in the following cases: - To use the scan profile to scan OneDrive sites in AvePoint Online Services, the service account must be the **SharePoint** **Administrator**. - (Only required when the destination is OneDrive.) To create new OneDrive sites in the destination during the migration, the destination service account must be the **SharePoint** **Administrator**. > ***Note**: If the **SharePoint Administrator** cannot access the SharePoint admin center, the **Global Administrator** is required. - To manage sensitivity labels of files during the migration, the source service account must have the **super user** role. Refer to  for details. - Service account pool is no longer available in migrations. If you have used the service account pool for the source and/or destination OneDrive before, and you want to continue using the service account pool, you can select multiple service accounts when creating OneDrive connections, and make sure all selected service accounts have the roles mentioned above.

Delegated App Profile Permissions

Fly allows you to use the Fly delegated app profile or custom delegated app profile to connect to your workspace.

*Note: The license and permission requirements for the consent user are the same as those for the service account. Refer to Service Account Permissions for details.

*Note: If the consent user of the delegated app profile has Multi-Factor Authentication (MFA) enabled, you must authorize or re-authorize the delegated app profile after MFA is enabled. Otherwise, the migration jobs using the delegated app profile will fail.

*Note: If you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token when there are permissions updated.

To use the Fly delegated app profile with required permissions, refer to Fly Delegated App Profile Permissions.

To use a custom delegated app profile with required permissions, refer to the following steps:

  1. After registering an app in Microsoft Entra ID, add the permissions in the table below to the app.

  2. When Destination is OneDrive, make sure the custom delegated app profile has the following permissions.

APIPermissionTypePurpose
Microsoft GraphRoleManagement.Read.Directory(Read directory RBAC settings)DelegatedRetrieve Microsoft global groups and check required roles of the service account.
Microsoft GraphUser.Read.All(Read all users’ full profiles)DelegatedRetrieve Microsoft 365 users for user mapping and retrieve users’ OneDrive site URLs.
Microsoft GraphFiles.Read.All(Read files in all site collections)DelegatedRetrieve users’ OneDrive site URLs.
Microsoft GraphGroup.Read.All(Read all groups)DelegatedRetrieve details of Microsoft 365 Groups.
Microsoft Information Protection Sync ServiceUnifiedPolicy.User.Read(Read all unified policies of the tenant)DelegatedOnly required if you want to manage the sensitivity labels of files.
Azure Rights Management Services*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.user_impersonation(Create and access protected content for users)DelegatedOnly required if you want to manage the sensitivity labels of files.
SharePoint/Office 365 SharePoint OnlineAllSites.FullControl (Have full control of all site collections)DelegatedRetrieve OneDrive sites.
SharePoint/Office 365 SharePoint OnlineUser.Read.All(Read user profiles)DelegatedRetrieve OneDrive sites.
For easy use, you can directly use the following commands to add required API permissions through **Manifest** for Microsoft 365 Commercial tenants.

"requiredResourceAccess": [

        {

            "resourceAppId": "00000003-0000-0ff1-ce00-000000000000",

            "resourceAccess": [

                {

                    "id": "56680e0d-d2a3-4ae1-80d8-3c4f2100e3d0",

                    "type": "Scope"

                },

                {

                    "id": "0cea5a30-f6f8-42b5-87a0-84cc26822e02",

                    "type": "Scope"

                }

            ]

        },

        {

            "resourceAppId": "00000012-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "c9c9a04d-3b66-4ca8-a00c-fca953e2afd3",

                    "type": "Scope"

                }

            ]

        },

        {

            "resourceAppId": "870c4f2e-85b6-4d43-bdda-6ed9a579b725",

            "resourceAccess": [

                {

                    "id": "34f7024b-1bed-402f-9664-f5316a1e1b4a",

                    "type": "Scope"

                }

            ]

        },

        {

            "resourceAppId": "00000003-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "df85f4d6-205c-4ac5-a5ea-6bf408dba283",

                    "type": "Scope"

                },

                {

                    "id": "5f8c59db-677d-491f-a6b8-5f174b11ec1d",

                    "type": "Scope"

                },

                {

                    "id": "741c54c3-0c1e-44a1-818b-3f97ab4e8c83",

                    "type": "Scope"

                },

                {

                    "id": "a154be20-db9c-4678-8ab7-66f6cc099a59",

                    "type": "Scope"

                }

            ]

        }

],

When Destination is Google Drive, make sure the custom delegated app profile has the following permissions.
APIPermissionTypePurpose
Microsoft GraphRoleManagement.Read.Directory(Read directory RBAC settings)DelegatedRetrieve Microsoft global groups and check required roles of the service account.
Microsoft GraphUser.Read.All(Read all users’ full profiles)DelegatedRetrieve Microsoft 365 users for user mapping and retrieve users’ OneDrive site URLs.
Microsoft GraphFiles.Read.All(Read files in all site collections)DelegatedRetrieve users’ OneDrive site URLs.
Microsoft GraphGroup.Read.All(Read all groups)DelegatedRetrieve details of Microsoft 365 Groups.
Microsoft Information Protection Sync ServiceUnifiedPolicy.User.Read(Read all unified policies of the tenant)DelegatedOnly required if you want to manage the sensitivity labels of files.
Azure Rights Management Services*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.user_impersonation(Create and access protected content for users)DelegatedOnly required if you want to manage the sensitivity labels of files.
SharePoint/Office 365 SharePoint OnlineAllSites.FullControl (Have full control of all site collections)DelegatedRetrieve OneDrive sites.
SharePoint/Office 365 SharePoint OnlineUser.Read.All(Read user profiles)DelegatedRetrieve OneDrive sites.
For easy use, you can directly use the following commands to add required API permissions through **Manifest** for Microsoft 365 Commercial tenants.

"requiredResourceAccess": [

        {

            "resourceAppId": "00000003-0000-0ff1-ce00-000000000000",

            "resourceAccess": [

                {

                    "id": "56680e0d-d2a3-4ae1-80d8-3c4f2100e3d0",

                    "type": "Scope"

                },

                {

                    "id": "0cea5a30-f6f8-42b5-87a0-84cc26822e02",

                    "type": "Scope"

                }

            ]

        },

        {

            "resourceAppId": "00000012-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "c9c9a04d-3b66-4ca8-a00c-fca953e2afd3",

                    "type": "Scope"

                }

            ]

        },

        {

            "resourceAppId": "870c4f2e-85b6-4d43-bdda-6ed9a579b725",

            "resourceAccess": [

                {

                    "id": "34f7024b-1bed-402f-9664-f5316a1e1b4a",

                    "type": "Scope"

                }

            ]

        },

        {

            "resourceAppId": "00000003-0000-0000-c000-000000000000",

            "resourceAccess": [

                {

                    "id": "df85f4d6-205c-4ac5-a5ea-6bf408dba283",

                    "type": "Scope"

                },

                {

                    "id": "5f8c59db-677d-491f-a6b8-5f174b11ec1d",

                    "type": "Scope"

                },

                {

                    "id": "741c54c3-0c1e-44a1-818b-3f97ab4e8c83",

                    "type": "Scope"

                },

                {

                    "id": "a154be20-db9c-4678-8ab7-66f6cc099a59",

                    "type": "Scope"

                }

            ]

        }

    ],

  1. Click Authentication in the left navigation of the app.

  2. Click Add a platform.

  3. Select Web in the Configure platforms panel.

  4. In the Configure Web panel, enter the AvePoint Online Services URL: https://www.avepointonlineservices.com for your commercial environment or https://usgov.avepointonlineservices.com for your U.S. Government environment in the Redirect URIs field.

  5. Configure Web panel.

  6. Click Configure.

  7. Select the Access tokens and ID tokens checkboxes on the Authentication page.

    Access tokens and ID tokens checkboxes.

  8. Click Save.

  9. Create an app profile for the app using the Custom mode in AvePoint Online Services by referring to .

    *Note: When consenting to the app, if you have granted the admin consent and allowed public client flows for the permissions, you can choose to use the Global Administrator consent or the User consent method. If not, you can only use the Global Administrator consent method.