Work 365 Permissions for Azure Active Directory

Modified on Thu, Nov 16, 2023 at 8:50 AM

Overview

Work 365 uses Azure Active Directory (AAD) for identity management. When a user logs into Work 365, they are signing in using their AAD account. User credentials are not stored within Work 365. The following two permissions are requested from AAD.

  1. Read the logged-in user’s profile
    This access is required for us in order to read basic user properties such as name, and email address.
     
  2. Access Common Data Service as the logged-in user
    This access is required to connect to the Dynamics 365 tenant associated with Work 365.

How do I provide permissions to the Work 365 application?

The process of providing permissions to the Work 365 application is known as "Consent"; which can be granted by clicking on this link and logging in as a Global Administrator.

Why do I need a Global Administrator to grant these permissions?

The permissions requested by Work 365 are low-impact permissions. There are two reasons why a Global Administrator needs to grant these permissions.

  1. By granting organization-level access, individual users are not prompted for this permission.
  2. This also creates a service principal for the Work 365 application within the organization’s Azure Active Directory that can be used as an “Application User” for connecting with Dynamics 365.

The following prompt will be shown for a Global Administrator to grant the required permissions.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article