Overview
This guide walks you through configuring your Microsoft Entra tenant to allow Airia to access a designated service mailbox using a secure OAuth flow. No browser-based login is required — Airia authenticates directly using an app registration and client secret.Prerequisites
Before you begin, ensure you have:- Azure admin access - An account with Global Administrator or Application Administrator role
- Exchange Online PowerShell access - Required for the mailbox access policy step
- Service mailbox - A designated service mailbox that Airia will read from (e.g.,
airia-service@yourcompany.com)
Step 1: Create an App Registration
- Go to the Microsoft Entra admin center and sign in with your admin account
- In the left nav, go to Applications → App registrations

- Click + New registration
- Fill in the following:
- Name:
Airia Service Account(or any descriptive name) - Supported account types:
Accounts in this organizational directory only (Single tenant) - Redirect URI: Leave blank
- Name:
- Click Register
- Application (client) ID
- Directory (tenant) ID
Step 2: Create a Client Secret
- In the left nav under Manage, click Certificates & secrets
- Click + New client secret
- Give it a description (e.g.,
Airia secret) and set an expiry (24 months recommended) - Click Add
- Immediately copy the Value
Step 3: Add API Permissions
- In the left nav under Manage, click API permissions
- Click + Add a permission
- Select Microsoft Graph
- Select Application permissions (not Delegated)

Required Permissions
Search for and add the permissions based on what you want Airia to do. You can refer to common permissions in the Microsoft Entra ID OAuth App Setup guide.- Click Add permissions
Grant Admin Consent
- Click Grant admin consent for [your organization] and confirm
- All permissions should show a green checkmark with “Granted for [your org]” status
Step 4: Restrict Access to the Service Mailbox Only
1. Install Exchange Online PowerShell (if not already installed)
2. Connect to Exchange Online
You must use an M365 organizational account, not a personal Microsoft account.
3. Create the Access Policy
Run the following command to restrict access:<Application-Client-ID>with the client ID from Step 1<service-mailbox@yourcompany.com>with your designated service mailbox address
4. Verify the Policy
AccessCheckResult: Granted.
You can also confirm the app cannot access other mailboxes:
AccessCheckResult: Denied.
Step 5: Share Credentials with Airia
Once setup is complete, securely provide Airia with the following configuration details:| Field | Where to Find It |
|---|---|
| Tenant ID | App registration Overview page → Directory (tenant) ID |
| Client ID | App registration Overview page → Application (client) ID |
| Client Secret | Copied in Step 2 |
| Service Mailbox Address | The mailbox you scoped the policy to |
Next Steps
Once you have created and configured your Microsoft Entra Service Account, you can start using it to securely authenticate tools within Airia without requiring individual user logins.Using Your Service Account
You can configure any OAuth-enabled Microsoft tool to use this Service Account:- Navigate to the Tools section in your Airia platform
- Select the Microsoft tool you want to configure (e.g., Microsoft Graph Tools)
- When prompted for authentication details, select the OAuth connector you configured previously.
- The credential will now be obtained in the background, utilizing the restricted permissions you granted to access the resources you provided access to.
Additional Resources
- [Microsoft Authentication Guide](/integrations/Tools/Microsoft\ Authentication): Learn more about different ways to authenticate Microsoft services in Airia.
- Understanding MCP Servers: Discover how the Model Context Protocol enables seamless integrations between your AI agents and enterprise tools.
