![veeam backup for office 365 user guide veeam backup for office 365 user guide](https://www.anoopcnair.com/wp-content/uploads/2019/10/image-63-1024x506.png)
Navigate to the “All users” overview within your Office 365 admin center and select your newly created service user. In this case the user will be named “veeam_vbo” Enable MFA on this service accountĪfter your service user has been created, you can now proceed with activating MFA for it. The user which we are going to create will be our service user for MFA. In the Office 365 admin center, head for creating a new user without a product license. It is now time to create the service user, which will connect from Veeam Backup for Office 365 to your tenant. Create a new service account in Azure Active Directory To collect your application secret, move to the “Certificates & secrets” settings within your custom application and copy (and safe) the value of it. The secret can be reviewed in the main settings area of your custom application under “Certificates & secrets”. Within the “New client secret” wizard, specify a description and an expiration date.Īfter you specified your description and your expiration date, you have successfully created your application secret. For achieving this, head to the main settings of your custom application and under “Manage”, choose “Certificates & secrets”.įrom within this menu, you are able to create a new client secret. The next step is to create a new client secret for your newly created custom application. The next screenshot will show you where to find your application ID. If you go back to the main site of the “app registrations”, you can easily copy and save it from there. The first thing you need to collect is your application ID.
![veeam backup for office 365 user guide veeam backup for office 365 user guide](http://www.veeam.atworkweb.com/sw/swchannel/images/users/41687/screen_2.jpg)
Collect your Application IDĬongratulations ! You have successfully registered a custom application in your Azure Active Directory and you have successfully set the required permissions. If you are going to have another look at your API permissions, you should see something similiar to this. Since you are now having set all the required permissions and granted the admin consent, you are now ready to proceed. For doing so, click the button on the bottom of the page. You will see, that there has not been granted an admin consent. Have a look on the right side of the permissions. Those 2 permissions are needed to access the organization tenant.Īfter you have set the permissions for your custom application, it should look like this: While setting permission, search for the following 2 permissions: We need to specify “Application permissions”. In the wizard select “Microsoft Graph” and proceed to the next step, where you will need to specify your type of permissions. We are now going to add Microsoft Graph permissions to your newly created custom application. For that navigate to your newly created application and choose the “API Permissions”. Give your new custom application a name and choose the supported account type.Īfter you created the new custom application, you need to provide it with some permissions. Register a custom application in Azure Active Directoryįirst of all, navigate to your Azure Active Directory admin center and create a new App registration.
#Veeam backup for office 365 user guide how to#
In this guide i’m going to show you step by step how to configure the modern authentication.
![veeam backup for office 365 user guide veeam backup for office 365 user guide](https://nolabnoparty.com/wp-content/uploads/2019/07/veeam-backup-office-365-v30-01.jpg)
Collect your app assword for the service account.Create a new service account in Azure Active Directory.Register a custom application in Azure Active Directory.The following steps should be done for using the modern authentication: In case you want to use the modern authentication with Veeam Backup for Office 365, you need to do some preparation work. In this scenario, the service account will be used to connect to the EWS and PowerShell services. With this access you can collect the data from the Microsoft Office 365 organization tenant. The custom application registered in Azure Active Directory will allow Veeam Backup for Office 365 to access the Microsoft Graph API. Therfore you will need an Azure Active Directory custom application and a service account which has MFA enabled. This means using service accounts enabled for multi-factor authentication. Since the release of version 3 of Veeam Backup for Office 365, you are now able to use the so called “modern authentication”.