Quantcast
Channel: Veeam Support Knowledge Base
Viewing all articles
Browse latest Browse all 4362

Veeam Office 365 Complete Permissions

$
0
0

Challenge

Configuring the required granular permissions for Veeam Office 365 and troubleshooting permission errors.

Cause

  • When adding an Organization there are 11 Verification checks that happen. Below lists each of the verification and what it means if it fails. In addition any permission assigned in Office 365 Online can take 15-60 minutes to apply on Microsoft's end.
     

Connection to Microsoft Graph: This meaning can change based on if you are using Modern authentication or Basic authentication.

Modern authentication: This would mean that the Application ID and secret failed to authenticate.

  • Make sure the Application ID and Secret were properly entered
  • Check the Application APIs from the "Azure AD Application" section below
  • Try generating a new Application Secret from Azure AD

Basic authentication: This would mean that your username does not have permissions to authenticate with the Microsoft Graph Online.

  • If your Organization is Federated try creating a new cloud user account from Microsoft Azure AD for authentication.
  • Make sure that the user belongs to the Organization.
  • Check that user has all permissions assigned from the above SharePoint and Exchange section

Connect to EWS: This is a connection to the Exchange Web Service.

Modern authentication: This uses a duel authentication leveraging the Application ID and Username.

  • For the Application ID check in Microsoft Azure AD that the correct APIs were assigned as Application and not Delegated.
  • For the Username check Microsoft Exchange Admin center that all permissions have been assigned to the user as documented below.

Basic authentication:

  • For the Username check Microsoft Exchange Admin center that all permissions have been assigned to the user as documented below.

Connection to PowerShell: This step checks that we can connect to Exchange Online PowerShell. Only the username is used for this verification. Require AllowBasicAuthPowershell and AllowBasicAuthWebServices to be allowed in the group policy this user is added to.

Check Exchange plan and SharePoint plan: If either of these fail then your plan cannot automatically identified as Valid. Use the below KB to add the proper plans to your configuration

Service plan is not found when adding Office 365 organization: https://www.veeam.com/kb2946

Check Required cmdlets access, Mailbox Search role, and Applicationimpersonation role: The roles are all related to Exchange Online.

  • Check that the user has been properly added to the role group with all necessary permissions as shown above in the Exchange section

Check SharePoint Online Administrators role: This refer the SharePoint Administrator role that you assign to the user in the Admin Center.

  • Refer to the SharePoint section above and make sure that the service has the SharePoint Administrator role assigned

Check LegacyAuthProtocolsEnabled: This is a setting in SharePoint Admin center to enable legacy Authentication. 

  • Refer to the SharePoint section above to Allow Apps that don't use modern authentication.
  • “Unauthorized” error is thrown by SharePoint Online and/or OneDrive for business backup jobs: https://www.veeam.com/kb2714

Solution

Exchange
SharePoint
User App Password
Azure AD Application


Exchange

 Configuring Permissions for Exchange (on-premises or Online): User-added image
  • Create your role Group: -Name your role group appropriately (Example: VBO Permissions) -Add Roles: ApplicationImpersonation, View-Only Configuration, View-Only Recipients, Mailbox Search, and Mail Recipients -Add the Veeam Service account under Members and Save
User-added image

SharePoint

Configuring Permissions for SharePoint Online
  • Add the SharePoint Administrator Role to user In Azure Admin Center: https://admin.microsoft.com/ Select: Users > Active Users >  Select Backup Service account
User-added image
  • Allow Apps that don't use modern authentication In the SharePoint Admin Center: https://[ORGANIZATION NAME]-admin.sharepoint.com/ Select: Access control > Apps that don't use modern authentication > Allow Access
User-added image
User-added image

User App Password

Configuring user App Password: User-added image
  • Once the account have been enabled for Multi-factor authorization you will need to sign-in with the service account and follow the steps for configuring Multi Factor authentication.
  • Generate an application password for the user: https://portal.office.com/account/#security Select: Additional security verification> Create and manage app password:
User-added image
Or Directly to Application Password: https://account.activedirectory.windowsazure.com/AppPasswords.aspx Select Create:
User-added image
Name App Password:
User-added image
Copy App Password because it will no longer be available once you close the window:
User-added image

Azure AD Application

Configuring Azure AD Application
User-added image
  • Name the Application, add Redirect URL (URL does not need to be real. Example: "http://localhost/"), and Click Register
User-added image
  • Select API permissions and Add permission. Please keep in mind that all permissions must be added as Application permissions and not Delegated permissions
User-added image
  • First API will be at the top of the page: Microsoft Graph> Application Permissions
User-added image
  • Check Directory.Read.All and Group.Read.All then select Add permissions.
    Directory.Read.All permission is required to read organization and users’ properties. Group.Read.All is required to read groups properties and membership.
User-added image
  • If you’re going to use application certificates, second API will be halfway down the page: SharePoint > Application Permissions
User-added image
  • Check Sites.Fullcontrol.All and User.Read.All. Then select Add permission.
    Sites.Fullcontrol.All is required to read sites content. User.Read.All is required to read user profiles.
User-added image
  • Last API is also required only if using application certificates. It will be at the bottom of the page Under Supported legacy APIs: Exchange> Application Permissions.
User-added image
  • Check full_access_as_app. Then select Add Permission.
    full_access_as_app is required to read mailboxes content.
User-added image
  • After all APIs have been added you will need to Grant consent:
User-added image
  • Select Certificates & secrets and New client Secret
User-added image
  • Add a Description> Choose Expiration> Add
User-added image
  • Copy Secret Value because it will no longer be available once you close the window:
User-added image
  • Locate Application ID: Overview> Application (client) ID
User-added image

Viewing all articles
Browse latest Browse all 4362

Trending Articles