Continue with this section to learn more about required permission for user accounts.
Required Permissions for Veeam Backup for Microsoft Office 365
Required Permissions for SharePoint and OneDrive for Business Organizations
The account must be a member of the Farm Administrator group and must have the Site Collection Administrator role. This role can be assigned either automatically, when adding a new SharePoint organization, or manually. For more information on adding new organizations, see Adding Microsoft Organizations.
- For SharePoint Online.
The account must have either the Global Administrator role, or the SharePoint Administrator role.
If you prefer to use PowerShell to assign the SharePoint Administrator role for SharePoint Online organizations, you can use the following code snippet.
Connect-MsolService $role=Get-MsolRole -RoleName "SharePoint Service Administrator" $accountname=example@domain.com Add-MsolRoleMember -RoleMemberEmailAddress $accountname -RoleName $role.Name |
The MSOL module can be downloaded from this Microsoft page.
The $accountname variable must be a user's UPN (e.g. example@domain.com).
Required Permissions for Exchange Organizations
The account that is used to connect to Microsoft Exchange organizations (On-Premises or Online) must belong to that organization, having a mailbox in that organization is optional.
This account must have the following Exchange roles assigned:
- The Role Management role. To grant ApplicationImpersonation role.
- The ApplicationImpersonation role. To assign this role, the account must be a member of the Organization Management group.
This role can be assigned by using any of the following methods:
- Automatically, when adding Exchange organizations.
- Manually, by using Exchange Management PowerShell cmdlets.
- Using the Microsoft Exchange control panel. For more information, see this Microsoft article.
- The Organization Configuration role. To manage role assignments.
- The View-Only Configuration role. To obtain necessary organization configuration parameters.
- The View-Only Recipients role. To view mailbox recipients (required for back job creation).
- Mailbox Search or Mail Recipients. To back up groups.
Assigning ApplicationImpersonation Role via PowerShell
For Microsoft On-Premises Organizations
$UserCredential = Get-Credential $Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri http://exchangeServerName/PowerShell/ -Authentication Kerberos -Credential $UserCredential Import-PSSession $Session |
New-ManagementRoleAssignment –Role ApplicationImpersonation –User "Administrator" |
For Microsoft Online Organizations
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $Credential -Authentication Basic -AllowRedirection Import-PSSession $Session |
New-ManagementRoleAssignment –Role ApplicationImpersonation –User user.name@domain.com |
Get-ManagementRoleAssignment -Role "ApplicationImpersonation" |
To remove the role, use the following cmdlet (for both On-Premises and Online organizations).
Get-ManagementRoleAssignment -RoleAssignee "Administrator" -Role ApplicationImpersonation -RoleAssigneeType user | Remove-ManagementRoleAssignment |
Add-MailboxPermission –Identity “<target_mailbox>” -User “<user_account>” -AccessRights FullAccess –InheritanceType All |
New-ManagementRoleAssignment -Name "<role_name>" -Role ApplicationImpersonation -User "<user_account>" [-CustomRecipientScope "<scope>"] |
New-ManagementRoleAssignment -Name "Exchange Test" -Role ApplicationImpersonation -User "Test User" -CustomRecipientScope "spain.local/TargetUsers" |
Recalling Privileges Granted Through Impersonation
To recall given privileges, run the following cmdlet.
Remove-ManagementRoleAssignment -Name "<role_name>" |