Microsoft Entra Application Permissions

Veeam Data Cloud for Microsoft 365 uses Microsoft Entra applications to establish and maintain the connection between Veeam Data Cloud for Microsoft 365 and Microsoft 365 organizations, and perform backup and restore of the organization data.

For Veeam Data Cloud for Microsoft 365, Microsoft Entra ID automatically creates 3 Enterprise applications (not application registrations) in your tenant:

  1. Veeam Data Cloud [EMEA, AMER, APJ]

When you log in to Veeam Data Cloud for Microsoft 365 with a Microsoft account for the first time, you must accept the following permissions: View your basic profile, Maintain access to data you have given it access to. After you accept the permissions, the Veeam Data Cloud [EMEA, AMER, APJ] Enterprise application is created with those permissions. Veeam Data Cloud for Microsoft 365 uses this Enterprise application to authenticate the users who sign in to Veeam Data Cloud for Microsoft 365 with Microsoft accounts. When users log in to Veeam Data Cloud for Microsoft 365 for the first time, they must accept the following permissions: profile — View users' basic profile and offline_access — Maintain access to data you have given it access to.

  1. Veeam Data Cloud Registration [EMEA, AMER, APJ]
  • When you add a Microsoft 365 tenant to Veeam Data Cloud for Microsoft 365, if you choose to automatically connect Veeam Data Cloud for Microsoft 365 to Microsoft 365, you must accept the following permissions upon entering the device code: Application.readwrite.all, AppRoleAssignment.ReadWrite.All, Directory.ReadWrite.All, Application.ReadWrite.All, RoleManagement.ReadWrite.Directory. After you accept the permissions, the Veeam Data Cloud Registration [EMEA, AMER, APJ] Enterprise application is created. Veeam Data Cloud for Microsoft 365 uses this Enterprise application to automatically create the Veeam Data Cloud for Microsoft 365 application registration that is used for backup and restore.
  • When you add a Microsoft 365 tenant to Veeam Data Cloud for Microsoft 365, if you choose to manually connect Veeam Data Cloud for Microsoft 365 to Microsoft 365, the Veeam Data Cloud Registration [EMEA, AMER, APJ] Enterprise application is not created. You must manually create and grant admin consent to the Veeam Data Cloud for Microsoft 365 application registration. For more information on how to create a new application registration, see this Microsoft article.

Once you have successfully added a Microsoft 365 tenant to Veeam Data Cloud for Microsoft 365, you can delete the Veeam Data Cloud Registration [EMEA, AMER, APJ] Enterprise application. When using features such as uploading certificates, Veeam Data Cloud for Microsoft 365 will ask for the permissions and create the Veeam Data Cloud Registration [EMEA, AMER, APJ] Enterprise application again.

  1. Veeam Data Cloud for Microsoft 365

When you run your first backup session, the Veeam Data Cloud for Microsoft 365 Enterprise application is created. Veeam Data Cloud for Microsoft 365 uses this Enterprise application for backup and restore purposes.

For Express or Premium, you must (create, if manual connection, and) grant admin consent to a fourth Enterprise application, called Multi-tenant Registration for MBS Billing. To view the required permissions for this Enterprise application, see Express or Premium Permissions for Microsoft Entra Application.

In this section you can find a list of permissions for Microsoft Entra applications that are granted automatically by Veeam Data Cloud for Microsoft 365 when you add your organization during onboarding.

If you prefer to manually add your organization, make sure to manually grant all the listed permissions.

Note

For the user account that the Microsoft Entra application will use to log in to Microsoft 365, consider the following:

  • You must assign the required roles to this user account.
  • If you plan to back up public folder mailboxes, this user account must have a valid Exchange Online license and an active mailbox within the Microsoft 365 organization.

Required User Account Roles for Microsoft Entra Application

The user account that the Microsoft Entra application uses to log in to Microsoft 365 must be assigned the following roles:

NOTE

Veeam Data Cloud for Microsoft 365 does not support Microsoft Entra Privileged Identity Management.

Required Permissions for Microsoft Entra Application

The Microsoft Entra application requires the Global Reader role. To learn how to grant the Global Reader role to the Microsoft Entra application, see Granting Global Reader Role to Microsoft Entra Application.

Note

To restore data using Microsoft Entra application, make sure that you configure the Microsoft Entra application settings. For more information, see Configuring Microsoft Entra Application Settings.

The required permissions for the Microsoft Entra application are the following:

 

API

Permission name

Permission type

Exchange Online

SharePoint Online and OneDrive for Business

Microsoft Teams

Description

Microsoft Graph

Directory.Read.All

Application

Querying Microsoft Entra ID for organization properties, the list of users and groups and their properties.

Group.Read.All

Application

Querying Microsoft Entra ID for the list of groups and group sites.

Group.ReadWrite.All

Application

 

Recreating in Microsoft Entra ID an associated group in case of a deleted team site restore.

Sites.Read.All

Application

 

Querying Microsoft Entra ID for the list of sites and getting download URLs for files and their versions.

Accessing sites of the applications that are installed from the SharePoint store.

TeamSettings.ReadWrite.All

Application

 

 

Accessing archived teams.

ChannelMessage.Read.All

Application

 

 

Accessing Microsoft Teams public channel messages.

ChannelMember.Read.All

Application

 

 

Accessing Microsoft Teams private and shared channels.

Directory.ReadWrite.All

Application

 

When creating or accessing a M365 group for a Multi-Geo tenant in case of teams or sites restore:

  • Setting the preferred data location.
  • Creating sites that have Microsoft Teams template.

Files.ReadWrite.All

Application

 

 

Reading the current state and restoring files of Microsoft Teams shared channels.

ChannelMember.ReadWrite.All

Application

 

 

Reading the current state and restoring Microsoft Teams private and shared channels.

Reports.Read.All

Application

This permission is required to build the VDC dashboard.

Office 365 Exchange Online1

full_access_as_app

Application

 

Reading and restoring mailboxes content.

Exchange.ManageAsApp

Application

 

 

Accessing Exchange Online PowerShell to do the following:

  • Back up public folder and discovery search mailboxes.
  • Determine object type for shared mailboxes as Shared Mailbox.

Note: This permission is required to back up public folders and discovery search mailboxes. This permission works along with the Global Reader role granted to the Microsoft Entra application. For more information, see Granting Global Reader Role to Microsoft Entra Application.

Office 365 SharePoint Online

Sites.FullControl.All

Application

 

Reading SharePoint sites and OneDrive accounts content.

User.Read.All

Application

 

Reading OneDrive accounts (getting site IDs).

Note: This permission is not used to back up Microsoft Teams data, but you must grant it along with SharePoint Online and OneDrive for Business permission to add a Microsoft 365 organization successfully.

1You can check permissions for Office 365 Exchange Online API. For more information, see Checking Permissions for Office 365 Exchange Online API.

Express or Premium Permissions for Microsoft Entra Application

If you are under the Express or Premium plan, the following additional permissions are required for the Microsoft Entra application:

API

Permission name

Application type

Delegated type

Description

Microsoft Graph

BackupRestore-Control.ReadWrite.All

Updating or reading the status of the Microsoft 365 backup service.

Note: This is needed to back up and restore data through Microsoft Backup Storage and to manage the backup and restore service from the Microsoft side.

BackupRestore-Configuration.ReadWrite.All

Reading and editing backup configuration policies.

BackupRestore-Restore.ReadWrite.All

 

Reading restore all sessions and starting restore sessions from backups.

BackupRestore-Search.Read.All

 

Searching for metadata properties in backup snapshots.

BackupRestore-Monitor.Read.All

 

Reading all monitoring, quota and billing information for the tenant.

Group.Read.All

 

Reading all groups.

Note: This is needed to resolve logic related to a group or the entire workload backup. Additionally, logic must pull details about items, sites, OneDrives, mailboxes and users it handles.

Sites.Read.All

 

Reading items in all site collections.

Directory.Read.All

 

Reading directory data.

User.Read

 

Signing in and reading user profile.

 

Granting Global Reader Role to Microsoft Entra Application

Veeam Data Cloud for Microsoft 365 needs access to Exchange Online PowerShell for backup. To access Exchange Online PowerShell, Microsoft Entra application requires the Global Reader role.

To grant the Global Reader role to the Microsoft Entra application, do the following:

  1. Sign in to the Microsoft Entra admin center.
  2. Go to Identity > Roles & admins > Roles & admins.
  3. In the Administrative roles list, find the Global Reader role and click on it.
  4. In the Global Reader window, click Add assignments. The Add assignments wizard runs.
  5. In the Select member(s) section, click the link.
  6. In the Select a member window, select the Microsoft Entra application in the list and click Select. The selected application will appear in the Selected member(s) list.
  7. Click Next and then click Assign to finish working with the wizard.