Connect to Outlook
This section shows how to set up a secure Outlook connection so automated workflows can send emails from standard addresses such as [email protected] or [email protected].
Overview
SlapFive's Automation Engine uses Microsoft’s Graph API to send emails through Outlook. We use Client Credentials–based authentication (OAuth 2.0) with a tenant-specific connection, which allows automations to send emails from approved mailboxes without needing an individual user to sign in.
Prerequisites
Microsoft 365 tenant (Exchange Online)
Admin access to Microsoft Entra ID (formerly Azure AD)
Admin access to Exchange Admin Center or PowerShell
Access to your company’s Workato workspace
Step 1. Register the App in Microsoft Entra ID
Sign into your Azure portal and go to Microsoft Entra ID > App registrations > New registration.
Enter the following data and click Register.
Name: enter SlapFive Email Automation.
Supported account types: choose Accounts in this organizational directory only (Single tenant).
Redirect URI: select Web from the platform dropdown and enter:
https://www.workato.com/oauth/callback
Step 2. Add Microsoft Graph API Permissions
Open the new app and go to Manage > API permissions. Select + Add a permission and select Microsoft Graph APIs.
What type of permissions does your app require? choose Application permissions. (This is required for Client Credentials–based authentication.)
Select permissions: the minimum permissions are
Mail.SendandMail.Read.Click Add permissions.
Back on the API permissions page, click Grant admin consent for <your organization name> and confirm. This approves the permissions for all users in the tenant. If this step is skipped, non-admin users who try to create the Workato Outlook connection will see a “Need admin approval” message and won’t be able to proceed.
Step 3. Create a Client Secret
Go to Manage > Certificates & Secrets > Client Secrets, and click + New client secret.
Give it a descriptive name, choose an expiry (12 months or longer).
Click Add.
Copy the secret Value immediately — it won’t be visible later.
Step 4. Obtain the Client ID, Object ID, and Tenant ID
Go to Overview > Essentials. Copy and save these items:
Step 5. Verify the mailbox exists and is mail-enabled
Before continuing, confirm that the email address you plan to send from (for example, [email protected]) exists as a mailbox in Exchange Online. This step prevents common “403 Forbidden” errors when sending email.
How to verify:
Option A — Exchange Admin Center
Go to Exchange Admin Center → Recipients → Mailboxes
Confirm the mailbox appears in the list
Confirm it is either:
A User mailbox with an Exchange Online license, or
A Shared mailbox (mail-enabled)
Option B — PowerShell (recommended for admins) Run the following command:
If the command returns no result or an error, the mailbox is not available to Microsoft Graph and cannot be used.
Important notes:
Entra ID users without Exchange mailboxes cannot send email
Shared mailboxes must be mail-enabled
Aliases and distribution lists are not valid sender mailboxes
Only continue once the mailbox is confirmed.
Step 6. Obtain the User ID (User Principal Name)
Workato requires a “User ID” to identify the default mailbox the app will act on. This does not authenticate a user — it simply tells Microsoft Graph which mailbox to use.
The User ID must be the primary SMTP email address of a mailbox that exists in Exchange Online and is authorized for sending.
Examples:
✅
[email protected](user mailbox or shared mailbox)❌ Distribution lists
❌ Mail contacts
❌ Aliases that are not the primary SMTP address
The mailbox specified here must also be included in the Exchange Application Access Policy configured in Step 7.
Go to Microsoft Entra ID > Users and search for the mailbox you want the connection to send from (i.e. [email protected]).
Copy the User Principal Name (which will usually be the same as the mailbox’s email address). You’ll enter this value later in SlapFive as the User ID or Default user.
Step 7. Authorize the App to send from mailboxes
Create an Application Access Policy in Exchange Online that allows your app to send mail from specific mailboxes (shared or regular).
Create a mail-enabled security group.
Name it something like SlapFive Email Senders.
Add every mailbox (
[email protected],[email protected], etc.) that the app should be allowed to send from.
Run these PowerShell commands:
Verify the policy:
Wait at least 30 minutes after creating or modifying the Application Access Policy before creating the Outlook Connection in Step 7, to allow time for Exchange to propogate the changes.
Step 8. Create the Outlook Connection in SlapFive
In SlapFive, go to Settings > Integrations and click to open the box named Outlook Connection. Enter this information and click the Connect button.
Repeat this step for each standard mailbox you’ll use (i.e. [email protected]) using the same Tenant ID, Client ID, and Client secret but different Default user values.
Troubleshooting the Outlook Connection
Error: 403 Forbidden when sending email
If the Outlook connection succeeds but sending email fails with a 403 error, check the following:
The Microsoft Graph API Permissions DO NOT include
offline_accessThe sender email address exists as a mailbox in Exchange Online
The mailbox is included in the Application Access Policy group
The policy has had at least 30 minutes to propagate
The User ID exactly matches the mailbox’s primary SMTP address
Last updated