


Leave all the fields as pre-configured, including the Grant type, which is set to Authorization Code. Make sure the call back URL matches with what you provided when you created the application registration. In the Configure New Token section, select the Configuration Options tab.On the top right, next to the eye icon, verify that M365 Environment is selected in the dropdown and not No environment.īecause this is the first time that you are running a request as a delegated authentication flow, you need to get an access token.In TenantID, set the Current value to the directory (tenant) ID value from step 3.16.In ClientSecret, set the Current value to the client secret value from step 3.18.In ClientID, set the Current value to the application (client) ID value from step 3.16.In this step, you set up the environment variables in Postman that you use to retrieve an access token. The application can read users in Azure AD. is added as an application permission, which is a permission that does not require a signed-in user. The application can read mail on behalf of the user. Mail.Read is added as a delegated permission, which is a permission that requires a signed-in user. The application now has two permissions configured. Hover over the new client secret Value and copy it you'll need this in step 4. Select New client secret, enter a description, and then select Add.On the left menu, select Certificates and secrets.

From here, you can get the application (client) ID and directory (tenant) ID.
#Postman documentation windows#
You don't need the agent if you're using the Postman for Windows app. You can't use Postman for the web without this due to CORS restrictions in the web browser.
#Postman documentation download#
To use this particular Postman collection in your web browser, download the Postman Desktop Agent. Step 2: Download the Postman Agent (optional - Postman web browser only) You are redirected to a fork of the main Microsoft Graph Postman collection in your own workspace.
#Postman documentation update#
Update the Scope value on the Authorization tab of the Delegated and Application folders, replacing with the Microsoft Graph service root endpoint for your national cloud.Update the Auth URL and Access Token URL values on the Authorization tab of the Delegated and Application folders, replacing with the Azure AD endpoint for your national cloud.Update the request URL, replacing with the Microsoft Graph service root endpoint for your national cloud.If you want to use the collection to connect to a national cloud deployment, you must modify your fork of the collection. The Microsoft Graph Postman collection is configured to authenticate with the global Azure AD service and access the global Microsoft Graph service ( ).
