# Outlook

Outlook (opens new window) is a personal information manager from Microsoft that's part of the Microsoft Office suite. It includes email, calendaring, contacts, and task services.

# API version

The Outlook connector uses the Microsoft Graph API v1.0 (opens new window).

# Connection setup

The Outlook connector supports the following authentication types:

MICROSOFT MFA ENFORCEMENT

Microsoft is rolling out mandatory multifactor authentication (MFA) gradually to different applications and accounts in phases. This enforcement continues throughout 2025 and beyond. Refer to the Microsoft Mandatory multifactor authentication for Azure and admin portals (opens new window) documentation for more information.

We strongly recommend enabling MFA now for all Microsoft accounts used with Workato to avoid service disruptions from short-notice enforcement changes.

Complete the following steps to maintain uninterrupted service:

1

Enable MFA for your Microsoft organization following the Microsoft MFA setup guide. Refer to Set up multifactor authentication for Microsoft 365 (opens new window) for more information.

2

Reconnect your Microsoft connection in Workato.

3

Complete the OAuth flow with MFA when prompted.

4

Test your recipes to ensure they work with the updated connection.

# Authorization code grant authentication (OAuth 2.0)

This authentication method requires the following value for tenant-specific account types:

  • Tenant ID/Domain

# Minimum and default scopes

The Outlook connector requests the following scopes for authorization code grant connections by default. These scopes are necessary to use all of the connector's triggers and actions. Additionally, you must assign these permissions to the Workato app as Delegated permissions in the Azure portal.

  • Mail.Send
  • Mail.ReadWrite
  • Mail.ReadWrite.Shared
  • Calendars.ReadWrite
  • Calendars.ReadWrite.Shared
  • User.Read
  • offline_access

The following minimum scopes are required to establish a connection to Outlook using authorization code grant authentication:

  • User.Read
  • offline_access

# Outlook setup for authorization code grant authentication

Complete the following steps to set up Outlook for authorization code grant authentication:

# Register the Workato App in the Azure portal
View register the Workato app in the Azure portal steps

Complete the following steps to register the Workato app in the Azure portal:

2

Select App registrations > + New registration.

3

Enter a unique name for the application.

4

Use the Supported account types drop-down menu to select an account type.

5

Select Web from the Select a platform drop-down menu.

6

Use the following URI for the Redirect URI:

https://www.workato.com/oauth/callback

7

Select Register.

# Assign permissions to your app
View assign permissions to your app steps

Complete the following steps to assign permissions to your app:

1

Go to your newly registered app and select Manage > API permissions.

2

Click + Add a permission and select Microsoft Graph.

3

Add the required permissions as outlined in Minimum and default scopes. Depending on your connection type, you must assign Application or Delegated permissions.

Add permissionsAdd permissions

4

Click Add permissions.

Admin consent is required for specific permissions. Refer to Connect Microsoft Entra ID to the Outlook connector to learn more.

# Obtain the Directory (tenant) ID from the Azure portal
View obtain the Directory (tenant) ID from the Azure portal steps

This step is required if you plan to use a tenant-specific account. You can skip this step if you plan to use a common, consumer, or organization account type for your connection.

Complete the following steps to obtain the Directory (tenant) ID from the Azure portal:

1

Go to the Overview > Essentials section.

App detailsApp details

2

Copy and save the Directory (tenant) ID for use in Workato.

# Connect to Outlook with authorization code grant authentication

View connect to Outlook with authorization code grant authentication steps

Complete the following steps to set up an authorization code grant connection to Outlook in Workato:

1

Click Create > Connection.

2

Search for Outlook and select it as your app.

3

Enter a name for your connection in the Connection name field.

4

Use the Location drop-down menu to select the project where you plan to store the connection.

5

Use the Connection account type drop-down menu to select the type of account you plan to use. The available choices are Common, Tenant-specific, Consumer, and Organization.

6

Use the Authentication type drop-down menu to select Authorization code grant.

7

Optional. The connector requests a set of scopes necessary for all triggers and actions to function properly by default. Go to the Advanced settings section to manually select the permissions instead. The minimum permissions required to establish a connection are User.Read and offline_access. Workato always requests these permissions regardless of the permissions you select. Refer to Minimum and default scopes for more information.

8

Optional. Use the Custom OAuth profile drop-down menu to select a custom OAuth profile for your connection. Refer to Outlook custom OAuth for more information.

9

Click Sign in with Microsoft.

# Client credentials-based authentication (OAuth 2.0)

This method requires the following fields:

  • Tenant ID/Domain
  • User ID
  • Client ID
  • Client Secret

COMPATIBLE AUTHENTICATION

Client credentials-based authentication is only compatible with tenant-specific connections.

# Minimum and default scopes

We recommend the following scopes for client credentials connections. These scopes are necessary to use all of this connector's triggers and actions. Additionally, you must assign these permissions to the Workato app as Application permissions in the Azure portal.

  • Calendars.Read
  • Calendars.ReadWrite
  • Contacts.Read
  • Contacts.ReadWrite
  • Mail.Read
  • Mail.ReadWrite
  • Mail.Send

The following minimum scopes are required to establish a connection to Outlook with client credentials-based authentication:

  • Mail.Read

# Outlook setup for client credentials-based authentication

Complete the following steps to set up Outlook for client credentials-based authentication:

# Register the Workato App in the Azure portal
View Register the Workato app in the Azure portal steps

Complete the following steps to register the Workato app in the Azure portal:

2

Select App registrations > + New registration.

3

Enter a unique name for the application.

4

Use the Supported account types drop-down menu to select an account type.

5

Select Web from the Select a platform drop-down menu.

6

Use the following URI for the Redirect URI:

https://www.workato.com/oauth/callback

7

Select Register.

# Assign permissions to your app
View assign permissions to your app steps

Complete the following steps to assign permissions to your app:

1

Go to your newly registered app and select Manage > API permissions.

2

Click + Add a permission and select Microsoft Graph.

3

Add the required permissions as outlined in Minimum and default scopes. Depending on your connection type, you must assign Application or Delegated permissions.

Add permissionsAdd permissions

4

Click Add permissions.

Admin consent is required for specific permissions. Refer to Connect Microsoft Entra ID to the Outlook connector to learn more.

# Generate a client secret
View generate a client secret steps

Complete the following steps to generate a client secret:

1

Go to Manage > Certificates & Secrets > Client secrets.

2

Click + New client secret.

3

Provide a Description for the client secret and specify an Expires date.

4

Click Add.

5

Copy and save the client secret Value—not the Secret ID—for use in Workato.

Copy and save the client secret valueCopy and save the client secret value

# Obtain the Application (client) ID, Object ID, and Directory (tenant) ID from the Azure portal
View obtain the Application (client) ID, Object ID, and Directory (tenant) ID from the Azure portal steps

Complete the following steps to obtain the Application ID, Object ID, and Directory (tenant) ID from the Azure portal:

1

Go to the Overview > Essentials section.

App detailsApp details

2

Copy and save the Application (client) ID, Object ID, and Directory (tenant) ID for use in Workato.

# Obtain the User ID from the Azure portal
View obtain the User ID from the Azure portal steps

Complete the following steps to obtain the User ID from the Azure portal:

1

Go to Home > Users to obtain the User ID.

UsersSelect users

2

Search for and select the default user you plan to use to perform operations. This user doesn't establish the connection but is required for performing certain operations that an app can't perform. It's also required in picklists to pull user data. For example, the folder picklist populates folders belonging to the default user.

3

Copy and save the User principal name. Use this value as the User ID in Workato.

# Connect to Outlook with client credentials-based authentication

View connect to Outlook with client credential-based authentication steps

Complete the following steps to set up a client credentials-based connection to Outlook in Workato:

1

Click Create > Connection.

2

Search for Outlook and select it as your app.

3

Enter a name for your connection in the Connection name field.

Client credentials connectionClient credentials connection

4

Use the Location drop-down menu to select the project where you plan to store the connection.

5

Select Tenant specific as the Connection account type. This option is specifically designed for users who belong to a particular organization (tenant).

6

Provide your Tenant ID/Domain. This is the Directory (tenant) ID for your app. Refer to Register an app in Azure for more information.

7

Use the Authentication type drop-down menu to select Client credentials.

8

Supply the User ID, Client ID, and Client secret for your app. Refer to Register an app in Azure for more information.

9

Click Sign in with Microsoft.

View connect Microsoft Entra ID to the Outlook connector steps

To connect to the Outlook connector using a Microsoft Entra ID account, ensure that all the consent requests are granted by admins.

Complete the following steps to grant admin consent using an admin account:

1

Sign in to your Azure portal and navigate to Enterprise Applications > Activity > Admin consent requests.

2

Approve the necessary consent requests.


Last updated: 4/23/2026, 3:37:37 PM