-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alternative to obtain tenant ID and client ID and secret #16
Comments
Chances are your workplace's admin already registered a few common applications such as Thunderbird. You could try using the publicly available client ID & secret (under kIssuers): {
"tenant_id": "common",
"client_id": "08162f7c-0fd2-4200-a84a-f25a4db0b584",
"client_secret": "TxRBilcHdC6WGBee]fs?QR:SJ8nI[g82",
"redirect_host": "localhost",
"redirect_port": "5000",
"redirect_path": "/",
"scopes": ["https://outlook.office.com/IMAP.AccessAsUser.All", "https://outlook.office.com/SMTP.Send"]
} This worked for me. (The ID you see under "My feed" is probably your user ID and of no use in this case. Sometimes, you can read the tenant ID under "Basic information" in Azure's Active directory Overview section). |
Same trick I use: I can also confirm using Thunderbird's details (and just needing the tenet id) works for me on a server that I can't create Azure apps for. |
Thanks @podiki and @phdenzel.
However, when running mbsync it seems to not recognise xoauth2 (for some reason)
|
New update: After installing mbsync 1.5.0 and the sasl xoauth2 plugin (via ppa) I fell on issue #9 (although I am using linux and not macOS)
I think that at this stage it is safe to assume that it is not a tenant and client ID related-problem anymore and am happy to close this issue. Thanks again. |
Hello @podiki and @phdenzel . I have managed to get it working after installing the xoauth2 sasl plugin. Thanks a lot! |
Sorry, I don't know. Have you tried without oauth, just plain smtp? Maybe that's what it means. |
Must say that what this project is set to achieve is amazing!
Unfortunately on step 3 of Azure app set up an "Access denied You don't have permission to register applications in the " message shows up. There is no point in trying to ask for permission at my workplace, they are too inflexible/unhelpful. So my question, which is probably a shot in the dark, is if there is any alternative way to obtain a tenant ID, client ID and secret?
Other information I was able to gather: In Azure's Active directory Overview section there is a "My feed" subsection which under my name displays a code
189cdec2-7acf-4b53-bb9a-9080ff602f56
(possibly this is my tenant or client ID?). Under the same section I can also see an Azure AD Connect icon and the type of license used in my company is Azure AD Premium P2. Thank you in advance for any help.The text was updated successfully, but these errors were encountered: