Skip to main content

Microsoft 365 (Azure / Entra ID) Administrator Guide

This guide provides Microsoft 365 administrators instructions to approve the Double Nickel email and calendar integration in Entra while restricting access to specific users, ensuring secure delegated access without organization-wide mailbox permissions.

Updated over a month ago

Approving Double Nickel Email and Calendar Access (Restricted to Specific Users)


Overview

This guide explains how to approve the Double Nickel Microsoft 365 integration while:

  • Avoiding organization-wide mailbox access

  • Restricting usage to specific users only

  • Completing setup entirely within the Microsoft Entra Admin Center (no PowerShell required)


Security Model Overview

Double Nickel uses delegated OAuth access.

This means:

  • The application can only access the mailbox of a user who signs in and authorizes it.

  • It cannot access other users’ mailboxes.

  • Administrators can restrict which users are permitted to authenticate.

Granting admin consent does not provide access to all mailboxes. Access remains limited to authenticated users.


Step 1 — Trigger the Application Registration (User Action)

Before an administrator can approve the application, it must exist in the tenant.

Have one intended user:

  1. Log into Double Nickel.

  2. Navigate to Settings → Users

  3. Click on the selected user, click Edit.

  4. Click Connect Email.

  5. When prompted with “Admin approval required,” stop.

This action creates the Enterprise Application entry inside Microsoft Entra.


Step 2 — Grant Admin Consent in Microsoft Entra

Required role: Global Administrator or equivalent permissions.


2.1 Open the Microsoft Entra Admin Center

Go to:

https://entra.microsoft.com

Navigate to:

Entra ID → Enterprise Applications → All Applications

2.2 Locate the Application

Search for the name shown on the Microsoft approval screen. It may appear as:

  • Nylas

  • Double Nickel

  • Or the integration provider name (Cal.com) displayed in the consent prompt

Select the application.


2.3 Grant Admin Consent

  1. Navigate to Permissions.

  2. Review the requested permissions (typically):

    • User.Read

    • Mail.Send

    • Mail.Read

    • Calendars.Read

    • Calendars.ReadWrite

  3. Select:

    Grant admin consent for [Your Organization]

  4. Confirm by selecting Accept.

This allows the application to operate in the tenant but does not grant access to all mailboxes.


Step 3 — Restrict Access to Specific Users (Required for Limited Access)

To prevent organization-wide access, user assignment must be required.


3.1 Enable Assignment Requirement

  1. Within the same Enterprise Application, navigate to Properties.

  2. Set:

Assignment required? → Yes
  1. Select Save.

This ensures only explicitly assigned users can authenticate with the application.


3.2 Assign Approved Users

  1. Navigate to Users and Groups.

  2. Select Add user/group.

  3. Choose:

    • Specific individual users, or

    • A Security Group (recommended)

  4. Select Assign.

Only assigned users will now be able to connect their Microsoft accounts to Double Nickel.


Step 4 — Users Complete the Connection

After approval and assignment:

  1. Assigned users return to Double Nickel.

  2. Click Connect Microsoft Account again.

  3. Sign in with their Microsoft credentials.

  4. Approve the Microsoft consent screen.

The connection should complete successfully.


Optional: Enable the Admin Consent Request Workflow

If your organization blocks user consent globally, you may enable Microsoft’s built-in approval workflow.

  1. In Microsoft Entra, navigate to:

Enterprise Applications → Consent and Permissions → Admin Consent Settings
  1. Enable:

Users can request admin consent → Yes
  1. Assign one or more reviewers.

Users will then be able to submit approval requests directly through Microsoft’s interface.


Security Controls Summary

Control

Purpose

Admin Consent

Allows the application to operate within the tenant

Assignment Required

Restricts which users may use the application

Delegated OAuth

Limits mailbox access to authenticated users only


Troubleshooting

If users continue to experience connection issues:

  • Confirm admin consent has been granted.

  • Confirm “Assignment required” is enabled.

  • Confirm the user is assigned to the application.

  • Have the user sign out of Microsoft completely and retry the connection.

  • Verify that conditional access policies are not blocking third-party app access.

Did this answer your question?