Skip to main content
Solved

User Authenticated but not Connected

  • November 26, 2024
  • 7 replies
  • 335 views

I am currently configuring an Email Account with Office 365 OAuth.

I also configure an Api on Azure, create an External application to authenticate the email account.

When I Sign in there is no problem, but when I run the Test this is the error that keeps showing.

IMAP and POP are also enabled

API Permisssion is selected

 

 

What else can be?

 

Best answer by darylbowman

alejandradiaz68 wrote:

I understand, I've already tried to create a new Azure app as well as create multiple new Client secret key clients, but it still reflects

That’s not necessary. You need multiple Acumatica External Applications. Each Email Account needs to be tied to an External Application which is signed in with the email address being used for the Email Account:

 

View original
Did this topic help you find an answer to your question?

7 replies

darylbowman
Captain II
Forum|alt.badge.img+13

I may be mistaken, but OAuth2.0 is definitely supported my Office365. In fact, as far as I know, it is the ONLY thing supported by Office365.

The issue in the referenced post was due to trying to use an External Application to connect a different account than was authenticated.

Is that what you're trying to do?


  • Freshman I
  • 2 replies
  • November 30, 2024

Is it possible that POP or IMAP is blocked in your tenant for the account you are trying to use?  Hope you can get it figure out. 


darylbowman wrote:

I may be mistaken, but OAuth2.0 is definitely supported my Office365. In fact, as far as I know, it is the ONLY thing supported by Office365.

The issue in the referenced post was due to trying to use an External Application to connect a different account than was authenticated.

Is that what you're trying to do?

Thats Right, at the moment I'm trying to use an external Application to connect a different account but is already add on Azure


darylbowman
Captain II
Forum|alt.badge.img+13

Then as the article states, at the moment, this is unsupported. You need to set up an External Application for each account you’re trying to connect. You don’t need to create a new Azure app for each account though (because it’s Acumatica’s limitation, not Microsoft’s). You can use the same Client ID and Client Secret for each External Application. 


darylbowman wrote:

Then as the article states, at the moment, this is unsupported. You need to set up an External Application for each account you’re trying to connect. You don’t need to create a new Azure app for each account though (because it’s Acumatica’s limitation, not Microsoft’s). You can use the same Client ID and Client Secret for each External Application. 

I understand, I've already tried to create a new Azure app as well as create multiple new Client secret key clients, but it still reflects


darylbowman
Captain II
Forum|alt.badge.img+13
  • 1749 replies
  • Answer
  • December 2, 2024
alejandradiaz68 wrote:

I understand, I've already tried to create a new Azure app as well as create multiple new Client secret key clients, but it still reflects

That’s not necessary. You need multiple Acumatica External Applications. Each Email Account needs to be tied to an External Application which is signed in with the email address being used for the Email Account:

 


  • Freshman I
  • 2 replies
  • December 2, 2024

I would double check in you Admin portal in MS365 for the account you are trying to use that you have IMAP allowed. If you have a conditional access setup in Entra ID (Azure AD) that blocks IMAP you would also need to make an exception for the account. 

MS has also been having Exchange issues over weekend and into this week which may or may be causing this issue.  You may want to wait for this to be resolved before troubleshooting more. 

*You will also need to “SIGN IN” again in Email Accounts after making any changes in Manage email apps

 


Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings