Home > Required Permissions > App Profile Authentication

    Export to PDF

    App Profile Authentication

    NOTE
    • AvePoint Online Services is transitioning from Exchange Web Services (EWS) to Microsoft Graph. As part of this change, administrators must re-authorize the AvePoint applications to grant new Microsoft Graph permissions, or add the following Microsoft Graph API application permissions to their custom Azure app:

      • MailboxItem.ImportExport.All
      • MailboxFolder.ReadWrite.All
      • MailboxItem.Read.All

      For complete list of permissions required for a custom Azure app, see Required Permissions of Microsoft 365 App Profile.

    • The Teamwork.Migrate.All permission has been added to the AvePoint Cloud Backup for Microsoft 365 (All permissions) app. To use the Microsoft Import API to restore Standard Channels, navigate to AvePoint Online Services > App management to re-authorize the app first.

    • If you want to protect team sites and group sites by AvePoint Cloud Backup Express , you must at first have a Cloud Backup Express service app with enough permissions, and then perform the Auto Discovery scan job to register the apps to your AvePoint Online Services instance. You can re-authorize your existing Cloud Backup Express service app with the permissions consented. For the required permissions, refer to Required Permissions of AvePoint Cloud Backup Express App.

    App profile authentication (Cloud Backup for Microsoft 365 service apps, default Microsoft 365 apps, or use a custom Azure app) ensures that all Auto Discovery and Cloud Backup for Microsoft 365 jobs are tagged as the activities of that app, and ensures that we do not need to store any service accounts and passwords, with only the consent being recorded. The consent can be monitored in your Microsoft Entra ID and can be revoked at any time.

    You can consent to apps separately for the services you want to protect. If you do not have service apps, AvePoint Cloud Backup will use the default Microsoft 365 app or custom Azure app to scan or protect the data. To protect Exchange Online mailboxes and SharePoint Online site collections with AvePoint Cloud Backup Express, you must configure a Cloud Backup Express service app for the Auto discovery and data protection.

    • If you want to use Cloud Backup for SharePoint Online, OneDrive, Exchange Online, Public Folders, Microsoft 365 Groups, and Teams service in app context, you need a Cloud Backup for Microsoft 365 service app or Microsoft 365 app connected to your tenant. If you use the Teams Chat service, you need to configure a Cloud Backup for Microsoft 365 service app or a custom app for Teams Chat.

    • If you use the Viva Engage service, you need to configure the Microsoft 365 app (All permissions) or Cloud Backup for Microsoft 365 app (All permissions), and the Viva Engage app. Alternatively, you can have a custom Azure app with delegated permissions.

    • If you want to use Cloud Backup for Project Online, you can use an app profile to scan the Project Online site collections. In this way, the service account does not require the Site Collection Administrator role. However, the Project Online data cannot be protected in the app context (using app profile authentication). Therefore, a service account with enough permissions is still required for the backup and restore for Project Online. For the required permissions of a service account, refer to Service Account Authentication.

    • If you want to use Cloud Backup for Power BI, Power Automate, or Power Apps in app context, restore the Teams channel conversations as new posts to the channel, or restore Planner task comments, you must configure an app profile for the Microsoft Delegated app or a custom Azure app with delegated permissions. If you want to restore the Teams channel conversations as new posts, the authentication user must have the Teams license.

      For the permissions required by the Microsoft Delegated app, refer to Required Permissions of Microsoft Delegated App.

    NOTE

    If you are using a multi-geo tenant, ensure the app profile has the Exchange Administrator role. This role is required to restore the region information for Microsoft 365 Groups and Teams. Otherwise, your group or team backed up from a specific region will be restored to the default region. This known issue also exists in the service account authentication. For details on how to assign the role to an app, refer to How to Assign the Exchange Administrator Role to an App.

    To view the lists of data types that are supported or unsupported for each service type, refer to Appendices: Supported and Unsupported Data Types. For the permission requirements of an app profile for a specific service type, refer to the sections below.