Skip to Content
Product Information

Cloud Integration – Connect to Microsoft 365 Mail with OAuth2

Microsoft 365 supports connecting to Outlook 365 via OAuth2 with Authorization Code grant type. This blog provides a step by step description on how you can connect from SAP Cloud Integration to a mail account in Outlook 365 via OAuth2 with Authorization Code grant type, using either the protocol SMTP for sending e-mails or the protocol IMAP for reading e-mails.


When connecting to Microsoft Outlook 365 with OAuth2, you need to have an organizational directory/tenant in Microsoft Azure Active Directory and a user in this directory which has a subscription to Outlook 365. For the configuration tasks in the Azure Active Directory, you also need a user with the “Application administrator” and the “Application developer” role.

Furthermore, you need a SAP Cloud Integration tenant on which you have a user with the “Integration Developer” role. If you only have a user with the “Administrator” role, you can do all the configurations mentioned below in SAP CPI, except for the last two configurations in the integration flow.

The new functionality is available with the release update at end of August 2020.

You have to use the sender mail adapter version 1.8 or higher and the receiver mail adapter version 1.9 or higher. If you use older adapter versions in your integration flows, you have to delete these adapters and recreate them.


To set up the OAuth2 connection for reading and sending e-mails with SAP Cloud Integration, do the following steps:

  • Determine Redirect URI
  • Create OAuth Client/App in Microsoft Azure Active Directory
  • Create OAuth2 Authorization Code Credential in your SAP Cloud Integration tenant
  • Configure Mail Sender Adapter in your integration flow
  • Configure Mail Receiver Adapter in your integration flow

Determine Redirect URI

When you log into the SAP Cloud Integration WEB-UI, you see your host name in the browser address field:

https://<host name>/itspaces

Use the <host name> to construct the following redirect URI:

https://<host name>/itspaces/odata/api/v1/OAuthTokenFromCode

You need this redirect URI in the next step.

Create OAuth Client/App in Microsoft Azure Active Directory

  1. Log into your Azure tenant by using
  2. Select “App registrations” under “Azure services”.
  3. Click on “New registration”, provide a name for your app and enter the redirect URI you determined at the beginning. Do not change the default setting for the “account types” (“Accounts in this organizational directory only”). After that, select “Register”.

Save the Application (client) ID anywhere on your local desktop. You will need this ID later to configure the OAuth2 Credential in CPI.

4. Choose “Certificates & secrets” in the menu on the left.

5. Select “New client secret”, choose your preferred expiry period (“In 1 year”, “In 2 years” or “Never”). Optionally, you can also add a description. When you’re done, select “Add”.

Remark: Before the secret expires you have to create a new secret and transfer the new secret to the SAP CPI OAuth2 Authorization Code credential (see below).

6. Use the “Copy to clipboard” button to remember the created secret (you will need this later to configure the OAuth2 credential in CPI).

7. Go back to the “Overview” view of the app and select the “Endpoints” tab.

Copy the “OAuth 2.0 authorization endpoint (v2)” and the “OAuth 2.0 token endpoint (v2)” to your local desktop. You need these values later for the creation of the OAuth2 credential in Cloud Integration.

Create an OAuth2 Authorization Code Credential in SAP CPI Tenant

  1. Log into your Cloud Integration tenant via the URL https://<host name>/itspaces. Change to the “Operations View” (press the eye icon), and select the “Security Materials” tile. Select the “Create” button and choose “OAuth2 Authorization Code”.
  2. Enter a name for the Credential and the “Authorization URL”, “Token Service URL”, “Client ID”, and “Client Secret” from your Microsoft App.
    Enter also a “User Name”. This is the e-mail address of the user whose mail resources you want to access in an integration flow. This user must exist in the same Microsoft Azure directory/tenant as the App created and must have an Outlook 365 account.

    Enter the necessary scope (see
    – “” for accessing e-mails
    – “” for sending e-mails

    Additionally, you need the scope “offline_access” for creating refresh tokens  (if this scope is not added, SAP Cloud Integration will add this scope automatically). The scopes must be separated by a space.

    The default value for the Refresh Token Expiry is set to 90 days for “Microsoft 365” (see: However, if the expiry time was changed for your Microsoft tenant, then you have to adjust this value. After clicking on the “Deploy” button, you see the newly created “OAuth2 Authorization Code” credential in the list of Security Materials in status “Unauthorized“.
  3. Select the three dots in the entry with the created credential and choose the “Authorize” option.
    A confirmation pop-up will come up. Select “Continue”:
    A Microsoft login screen appears. Enter the password of the user you specified in the OAuth2 credential:

    After you’ve selected “Sign in”, a further pop-up comes up, indicating the requested permissions required by the app:

    Select “Accept”. You should get a success message:

    Return  to your previous browser page and refresh the Security Materials list (button “Reload content”). The state of the “OAuth2 Authorization Code” credential changed to “Deployed”:

    Now, with status “Deployed”, the credential can be used by the mail adapters.

Configure the Mail Sender Adapter in an Integration Flow

We assume that you are familiar with the Integration Flow modeling in SAP Cloud Integration, and provide here only configuration details for the OAuth2 configuration in the mail adapter.

Be aware that the adapter version must be at least 1.8 (you see the version if you press the i button, see screen shot below). If your adapter has a lower version, then you have to delete the adapter and recreate the adapter (this will automatically use the newest version).

If you want to receive mails, you configure the Mail Sender Adapter with the created OAuth2 Credential. In the creation dialog for the Mail sender adapter, you have to chose the transport protocol “IMAP4” (we do not support OAuth2 for POP3). Enter the Address value ““. In the “Connection” tab, choose “OAuth2 Authorization Code” as “Authentication”. Protection must be defined as “IMAPS” for Microsoft 365.

Configure the Mail Receiver Adapter in an Integration Flow

Be aware that the receiver adapter version must be at least 1.9 (you see the version if you press the i button, see screen shot below). If your adapter has a lower version, then you have to delete the adapter and recreate the adapter (this will automatically use the newest version).

If you want to send mails, you need to configure the Mail Receiver adapter. Enter the Address value ““.  Enter  “OAuth2 Authorization Code” for “Authentication” in the “Connection”. Protection must be defined as “STARTTLS Mandatory” for Microsoft 365. 

Limits and Scope

  • SAP Cloud Integration does not support the authentication with OAuth2 for the POP protocol. If you are currently using the POP protocol in the mail sender adapter, you can switch to the IMAP protocol in order to use the OAuth2 authentication.
  • The maximum number of OAuth2 Authorization Code credentials in a Cloud Integration tenant is limited to 500.
  • Microsoft does not support OAuth2 for personal e-mail accounts ending in ““.
You must be Logged on to comment or reply to a post.
  • Dear Franz,

    I’m getting authentication failed error after deploying iflow at both sender and receiver side. Even though oauth 2.0 authorization code security artifact has got deployed successfully. Is it that  organization has to explicitly provide access to be able to access and send emails

    • Hi Ravi,

      please check whether the user has an Outlook 365 account by logging-in with this user into
      Secondly, please be aware of the restriction that personal accounts (ending with "") cannot be used for OAuth2.
      Thirdly, please check whether the user was created in the organization where you have created the app/oauth client and whether the user has a subscription to Outlook 365 in this organization as stated in the prerequisites.

      • Hi Franz,

        I'm using my organization email Id and not personal accounts ending with

        Yes I can very well login into

        Created  app/ oauth client in Microsoft Azure. I don't any issues here. I have also been able to deploy authorization code artifact successfully but my iflow is not pulling or sending mails.

        Does the organization have been explicitly grant authorization for this?

  • Dear Franz,

    first of all thanks for the great blog post.

    I have now tried to reproduce the scenario several times in different CPI environments. Unfortunately, when authorizing the security material entry, I receive the following message on the CPI side after successful authentication and authorization in Azure AD:

    Do you have any ideas what the problem might be or how I can determine the cause?



        • Hi Simon,

          can you please try with another Browser. For example if you are currently using Firefox then use Chrome, or vice versa. Or change from Internet Explorer to Firefox or Chrome or vice versa.

          • Hi Simon,

            which kind of Role Collections are assigned to your user? I guess that your user has several Role Collections assigned. Can you try with a user who only  has the Role Collection PI_Administrator assigned.

            The background is that we found that the problem "Bad Request" occurs, if the HTTP header size of the request is too large. The header size is also influenced by the number of Role Collections you have assigned to your user. Therefore if you reduce the Role Collections the problem can be avoided.

            We will correct this error soon. But I hope you can go-on with this workaround.

            Regards Franz

  • Hi  Franz Forsthofer,

    Very Informative Blog, Our oauth 2.0 authorization code security artifact has got deployed successfully. But  while deploying our I-flow with mail sender channel we are getting the below error related to certificate:

    Latest Poll: Dec 08, 2020, 11:45:00 PKIX path building failed: unable to find valid certification path to requested target
    We tried to get the certificate from connectivity Test, but there is no option with oauth 2.0 authorizationas radio button. Can you please guide, how to resolve this.
    Poushali Bhandari
    • Hi Bhandari,


      from the next release onwards you have the possibility to select the Authentication "OAuth2 Authentication Code" in the IMAP Connectivity Test where you can enter the OAuth2 Authorization Code Credential name. I have executed this option for you as shown in the following screen shot:

      You can see the server certificate chain. The chain consists of the server certificate and the intermediate certificate with dn=CN=GlobalSign Organization Validation CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE. The intermediate certificate is signed by the root CA "CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE". Because the root CA is not part of the certificate chain you cannot download the root CA with the download button shown in the above screen shot, you have to look up the root CA in the internet or if the root CA is part of the  trusted CAs in your browser, you can download it from there. I give you here the internet location:

      On this site the relevant root CA is called "GlobalSign Root R1"

      This root CA you have to import into the keystore of the CPI tenant.

  • Hi Franz Forsthofer ,

    Thanks for the blog. Followed the same steps as per the above. OAuth2 Authentication code was successfully deployed. When deploying the iFlow, getting an error " F3 BAD User is authenticated but not connected". We are trying to connect to a shared mailbox.

    Could you please assist?



    • Hi Raja,


      please check the user you registed in the Oauth2 Aurhoirzation Code credential. You must have an account in the azure directory tenant which has an e-mail of the form UserName@DomainName where the DomainName is the domain name of the Azure directory where you registered the app. And you have to register this UserName@DomainName in the OAuth2 Authorization Code credential of CPI with the correct password.

      Regards Franz

      • I had the same problem today. It is indeed very important that you use UserName@DomainName. we had something different than Username here and than it did not work.





  • I can't send email using SMTP, but i can read mailbox using IMAP. The connectivity test shows Invalid Certificate, but I added all certificates in SCPI Key Store, including oauth urls . Any idea? See my error and configurations

    I Verified that "DigiCert Cloud Services CA_1" is intermediate certificate, but there are 2 differents end date from different outlook URLs (2 differents intermediate certificate with the same name) . I'm don't know if it can be the error reason. I tried to add one each once, but didn't solve the problem.

    • Hello Lenardo,

      first a remark to the necessary certificates which you have to add the the SCI keystore:

      do not add the server certificate and the intermediate certificate (remove them from the keystore if you have already added those). Only add the root certificate with subject DN CN=DigiCert Global Root CA,, O=DigiCert Inc, C=US.


      The same holds also for the IMAP connection: Only the root CA which is self signed must be added.


      Further, in your third screenshot you have set the option "Protection" to "Off", and you got the response message "Server Certificate Invalid". This message is sent because the "Protection" "Off" is not supported by I get the same message on my test SCI account, although on my test SCI account the setting "STARTTLS Mandatory" works successful.


      Further, for the imap protocol you should only use the imap server, see above.

      Regards Franz

  • Franz, thanks for your answer! I tried to clean certificates, but I'm still geting error.

    Do you believe there could be a configuration problem at Azure? Do you have any suggestions on how to get more details of the error?
    My Iflow trace:



    An SAP DigiCert certificate already existed in the environment. In the last test (4) I left only the SAP certificate.
    About IMAP, i'm using, as you said. It's OK!
    Leonardo Lemos
    • Hi Leonardo,

      I checked the internet with search terms like "PRX4" and "451 4.7.0 Temporary server error", all the post indicate that it is a problem on the mail-server side or the network. Maybe you contact Microsoft support for this.

      Regards Franz

      • Franz, Problem solved! Indeed, there is a block for sending by SMTP (SmtpClientAuthenticationDisabled). We removed the block to test it, and it worked. But, I will try to switch to the graph API, because the infrastructure wants to keep this blocking rule.

        thank you so much!

  • Hi,


    configured everything as stated in the blog. But we always receive this error:


    javax.mail.AuthenticationFailedException: 535 5.7.3 Authentication unsuccessful []

    Any Ideas?

  • Hello Franz,


    1st of all  great Blog.thanks for writing this.


    I tried to do the same but after creating Oauth token in CPI security artifacts, I am not able to authorize it.
    Could you please guide if I am missing anything or I need to get in touch with my Company's office 365 account management team to enable some integration?


    Attached screenshots-


    As soon as I click on authenticate, I get this error:



    Thanks in advance.



    Pooja Tiwari


    • Hi Tiwari,

      looks for that the Oauth Client (=Application) with client id starting with 'fee48...' is not contained in the directory '964ce526-9c...' Yes, you should contact the administrator which created the OAuth Cient (Application) of the Azure directory.

      Regards Franz

      • Thank you Franz for your input .

        I will check with my admin team and share it will you the solution.

        Thanks again.