{"id":184,"date":"2018-05-24T07:21:00","date_gmt":"2018-05-24T07:21:00","guid":{"rendered":"http:\/\/www.mailsdaddy.com\/blogs\/?p=184"},"modified":"2023-08-06T10:00:58","modified_gmt":"2023-08-06T10:00:58","slug":"how-to-grant-application-impersonation-rights-office365","status":"publish","type":"post","link":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/","title":{"rendered":"Quick Guide on Why &#038; How to Enable Impersonation in Office 365"},"content":{"rendered":"<blockquote><p>Here in this article, I will discuss that how to grant application impersonation rights in office 365 mailboxes using Office 365 Exchange Admin Portal as well as PowerShell commands.<\/p><\/blockquote>\n<p><!--more--><\/p>\n<p>Working with Application Impersonation in Exchange Online is very helpful for the administrators. As Application Impersonation is the best feature of Office 365 which enables applications to impersonate users to do any activities on their behalf without having their login credentials. This option can be used in many seniors such as <a href=\"https:\/\/www.mailsdaddy.com\/pst-to-office-365-migration-tool\/\" target=\"_blank\" rel=\"noopener\">PSTs migration to Office 365<\/a>, Integration with a telephone system,\u00a0CRM integration, performing scheduled local <a href=\"https:\/\/www.mailsdaddy.com\/office-365-backup\/\" target=\"_blank\" rel=\"noopener\">backups of Office 365 mailboxes<\/a>, Offboarding and migrating users from one platform to etc.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#1_How_to_Configure_Impersonation_in_Office_365_using_Exchange_Admin_Portal\" >1) How to Configure Impersonation in Office 365 using Exchange Admin Portal?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#Provide_Full_Access_Permission_to_Admin_Mailbox\" >Provide Full Access Permission to Admin Mailbox<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#2_Setting_up_the_application_impersonation_role_in_Office_365_Exchange_Online_using_Windows_PowerShell\" >2) Setting up the application impersonation role in Office 365 (Exchange Online) using Windows PowerShell<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#How_to_configure_impersonation_for_all_users_in_an_organization\" >How to configure impersonation for all users in an organization?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#How_to_set_up_impersonation_for_specific_users_or_groups_of_users\" >How to set up impersonation for specific users or groups of users?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"1_How_to_Configure_Impersonation_in_Office_365_using_Exchange_Admin_Portal\"><\/span>1) How to Configure Impersonation in Office 365 using Exchange Admin Portal?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Application Impersonation feature is available on Microsoft Exchange Server 2007 or higher and Microsoft Office 365 plan E3. In order to setup Application Impersonation using Office 365 Exchange Admin Portal, the following steps should be carried out.<\/p>\n<ol>\n<ol>\n<li>Login to the <a href=\"https:\/\/outlook.office365.com\/ecp\/\" target=\"_blank\" rel=\"nofollow noopener\">Office 365 Exchange Admin Portal<\/a>\u00a0(Skip 2nd step you login with this link.)<\/li>\n<li>Go to <strong>Admin center<\/strong> and select <strong>Exchange<\/strong>.<\/li>\n<\/ol>\n<\/ol>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-163\" src=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png\" alt=\"archive-11\" width=\"280\" height=\"306\" srcset=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png 280w, https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1-275x300.png 275w\" sizes=\"(max-width: 280px) 100vw, 280px\" \/><\/p>\n<ol>\n<ol>\n<li>Now go to <strong>permissions<\/strong> &gt; Click on <strong>&#8220;+&#8221;<\/strong> icon to create a new role group &gt; Provide <strong>name &amp; description<\/strong> of the role group &gt; Select <strong>ApplicationImpersonation<\/strong> by clicking on <strong>&#8220;+&#8221;<\/strong>\u00a0icon from the Roles &gt; Click on <strong>Add<\/strong>\u00a0button then Press <strong>Ok\u00a0<\/strong>button.<\/li>\n<\/ol>\n<\/ol>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-191\" src=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-2.jpg\" alt=\"how to grant application impersonation rights in office 365\" width=\"850\" height=\"500\" \/><\/p>\n<ol>\n<ol>\n<li>Now Click on <strong>&#8220;+&#8221;<\/strong> icon from <strong>Members<\/strong> and select <strong>admin mailbox<\/strong> &gt; Click on <strong>Add<\/strong> then Press <strong>Ok.<\/strong><\/li>\n<\/ol>\n<\/ol>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-192\" src=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-3.jpg\" alt=\"step-3\" width=\"826\" height=\"666\" srcset=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-3.jpg 826w, https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-3-300x242.jpg 300w, https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-3-768x619.jpg 768w\" sizes=\"(max-width: 826px) 100vw, 826px\" \/><\/p>\n<ol>\n<ol>\n<li>After setting up roles and members click on <strong>save<\/strong> button.<\/li>\n<\/ol>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-193\" src=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-4.jpg\" alt=\"step-4\" width=\"552\" height=\"642\" srcset=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-4.jpg 552w, https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-4-258x300.jpg 258w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/p>\n<p>Above steps will ensure you how to grant application impersonation rights in office 365. But if you are planning to perform migration and backup of all users\u2019 mailboxes at once with impersonation using MailsDaddy products then you have to give a few more permissions as shown below.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Provide_Full_Access_Permission_to_Admin_Mailbox\"><\/span>Provide Full Access Permission to Admin Mailbox<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Go to <strong>recipients<\/strong> from Exchange Admin center &gt; <strong>Double click on each mailbox<\/strong> &gt; Click on <strong>Mailbox Delegation<\/strong> &gt; Give \u00a0<strong>Full Access<\/strong> permissions to the <strong>Admin mailbox<\/strong> &gt; Finally, click on <strong>Save<\/strong> button. That\u2019s it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-268\" src=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-5.png\" alt=\"step-5\" width=\"900\" height=\"500\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-269\" src=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-6-1.jpg\" alt=\"step-6\" width=\"718\" height=\"627\" srcset=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-6-1.jpg 718w, https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2018\/05\/step-6-1-300x262.jpg 300w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Note:<\/strong><\/span> In the above screenshots, I have given permission for one mailbox so in this way you can give the full access permission to each mailbox do you want to backup of migrate using Impersonate Export<strong>.<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_Setting_up_the_application_impersonation_role_in_Office_365_Exchange_Online_using_Windows_PowerShell\"><\/span>2) Setting up the application impersonation role in Office 365 (Exchange Online) using Windows PowerShell<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Pre-requirements:<\/strong><\/p>\n<ol>\n<li>Administrative credentials for the Exchange server.<\/li>\n<li>Domain Administrator credentials, or other credentials with the permission to create and assign roles and scopes.<\/li>\n<li>Exchange management tools. These are installed on the computer from which you will run the commands.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"How_to_configure_impersonation_for_all_users_in_an_organization\"><\/span>How to configure impersonation for all users in an organization?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you are familiar with the Windows PowerShell commands and you want to know\u00a0how to grant application impersonation rights in office 365 using PowerShell? below steps will show how you can easily give impersonation rights to all office 365 users of your organization with the following commands:<\/p>\n<ol>\n<li>In the very first step, <strong>Open the Exchange Management Shell<\/strong> &gt; Choose <strong>All Programs<\/strong> from the Start menu &gt; <strong>Microsoft Exchange Server 2013<\/strong>.<\/li>\n<li>Run the <strong>New-ManagementRoleAssignment cmdlet<\/strong> to configure the impersonation permission to the required user. The following example will show you how to grant Application impersonation to enable a service account to impersonate all other users in an organization.<\/li>\n<\/ol>\n<p><code>New-ManagementRoleAssignment \u2013name:impersonationAssignmentName \u2013Role:ApplicationImpersonation \u2013User:serviceAccount<\/code><\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_to_set_up_impersonation_for_specific_users_or_groups_of_users\"><\/span>How to set up impersonation for specific users or groups of users?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To assign the application impersonation role for the specific users or groups of users, you have to run the following commands.<\/p>\n<ol>\n<ol>\n<ul>\n<li>1) As same as above.<\/li>\n<li>2) Run the <strong>New-ManagementScope cmdlet<\/strong> to create a scope to which the impersonation role can be assigned. You can skip this step if an existing scope is available. The following example shows how to create a management scope for a specific group.<\/li>\n<\/ul>\n<\/ol>\n<\/ol>\n<p><code>New-ManagementScope \u2013Name:scopeName \u2013RecipientRestrictionFilter:recipientFilter<\/code><\/p>\n<ol>\n<ol>\n<ul>\n<li>3) Run the <strong>New-ManagementRoleAssignment cmdlet<\/strong> to configure the permission to impersonate the users of the specified scope.<\/li>\n<\/ul>\n<\/ol>\n<\/ol>\n<p><code>New-ManagementRoleAssignment \u2013Name:impersonationAssignmentName \u2013Role:ApplicationImpersonation \u2013User:serviceAccount \u2013CustomRecipientWriteScope:scopeName<\/code><\/p>\n<p><strong>Conclusion:<\/strong> In this article, I have discussed how to grant application impersonation rights in office 365 using Exchange Admin Portal and Windows PowerShell commands. I hope this article will help many Office 365 administrators in configuring impersonation in Exchange Online. If you have any difficulty or doubts while assigning application impersonation management role in office 365 then feel free to contact us. We will be happy to help you \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here in this article, I will discuss that how to grant application impersonation rights in office 365 mailboxes using Office 365 Exchange Admin Portal as well as PowerShell commands.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[31,28,30,26,24,25,29,27],"class_list":["post-184","post","type-post","status-publish","format-standard","hentry","category-office-365","tag-assign-application-impersonation-management-role-office-365","tag-configure-impersonation-in-office-365","tag-give-impersonation-rights-office-365","tag-how-to-enable-impersonation-in-office-365","tag-how-to-grant-application-impersonation-rights-in-office-365","tag-office-365-application-impersonation-rights","tag-setting-up-impersonation-in-office-365","tag-working-with-application-impersonation-in-exchange-online"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Grant Application Impersonation Rights in Office 365?<\/title>\n<meta name=\"description\" content=\"Step by Step guidance to ensure how to grant application impersonation rights in office 365. Enable application impersonation for Exchange Online mailboxes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Grant Application Impersonation Rights in Office 365?\" \/>\n<meta property=\"og:description\" content=\"Step by Step guidance to ensure how to grant application impersonation rights in office 365. Enable application impersonation for Exchange Online mailboxes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/\" \/>\n<meta property=\"og:site_name\" content=\"MailsDaddy Official Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailsdaddy\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-24T07:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-06T10:00:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mailsdaddy\" \/>\n<meta name=\"twitter:site\" content=\"@mailsdaddy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#\\\/schema\\\/person\\\/f7dec0fbb534e724f9687bfd44b5ef60\"},\"headline\":\"Quick Guide on Why &#038; How to Enable Impersonation in Office 365\",\"datePublished\":\"2018-05-24T07:21:00+00:00\",\"dateModified\":\"2023-08-06T10:00:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/\"},\"wordCount\":703,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/archive-1.png\",\"keywords\":[\"assign application impersonation management role office 365\",\"configure impersonation in office 365\",\"give impersonation rights office 365\",\"how to enable impersonation in office 365\",\"how to grant application impersonation rights in office 365\",\"office 365 application impersonation rights\",\"setting up impersonation in office 365\",\"working with application impersonation in exchange online\"],\"articleSection\":[\"Office 365\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/\",\"url\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/\",\"name\":\"How to Grant Application Impersonation Rights in Office 365?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/archive-1.png\",\"datePublished\":\"2018-05-24T07:21:00+00:00\",\"dateModified\":\"2023-08-06T10:00:58+00:00\",\"description\":\"Step by Step guidance to ensure how to grant application impersonation rights in office 365. Enable application impersonation for Exchange Online mailboxes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/archive-1.png\",\"contentUrl\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/archive-1.png\",\"width\":280,\"height\":306,\"caption\":\"archive-11\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/how-to-grant-application-impersonation-rights-office365\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quick Guide on Why &#038; How to Enable Impersonation in Office 365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#website\",\"url\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/\",\"name\":\"MailsDaddy Official Blog\",\"description\":\"Manual Data Recovery and Email Migration Blogs\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#organization\",\"name\":\"MailsDaddy Official Blog\",\"url\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/cropped-christmas-logo.avif\",\"contentUrl\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/cropped-christmas-logo.avif\",\"width\":418,\"height\":112,\"caption\":\"MailsDaddy Official Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailsdaddy\\\/\",\"https:\\\/\\\/x.com\\\/mailsdaddy\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/#\\\/schema\\\/person\\\/f7dec0fbb534e724f9687bfd44b5ef60\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c4226cf0566a27fc57ae215b9f89d6fb237df6f997eb5de7ad2ad83149b978e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c4226cf0566a27fc57ae215b9f89d6fb237df6f997eb5de7ad2ad83149b978e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c4226cf0566a27fc57ae215b9f89d6fb237df6f997eb5de7ad2ad83149b978e?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/www.mailsdaddy.com\\\/blogs\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Grant Application Impersonation Rights in Office 365?","description":"Step by Step guidance to ensure how to grant application impersonation rights in office 365. Enable application impersonation for Exchange Online mailboxes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/","og_locale":"en_US","og_type":"article","og_title":"How to Grant Application Impersonation Rights in Office 365?","og_description":"Step by Step guidance to ensure how to grant application impersonation rights in office 365. Enable application impersonation for Exchange Online mailboxes.","og_url":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/","og_site_name":"MailsDaddy Official Blog","article_publisher":"https:\/\/www.facebook.com\/mailsdaddy\/","article_published_time":"2018-05-24T07:21:00+00:00","article_modified_time":"2023-08-06T10:00:58+00:00","og_image":[{"url":"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@mailsdaddy","twitter_site":"@mailsdaddy","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#article","isPartOf":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/"},"author":{"name":"admin","@id":"https:\/\/www.mailsdaddy.com\/blogs\/#\/schema\/person\/f7dec0fbb534e724f9687bfd44b5ef60"},"headline":"Quick Guide on Why &#038; How to Enable Impersonation in Office 365","datePublished":"2018-05-24T07:21:00+00:00","dateModified":"2023-08-06T10:00:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/"},"wordCount":703,"publisher":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png","keywords":["assign application impersonation management role office 365","configure impersonation in office 365","give impersonation rights office 365","how to enable impersonation in office 365","how to grant application impersonation rights in office 365","office 365 application impersonation rights","setting up impersonation in office 365","working with application impersonation in exchange online"],"articleSection":["Office 365"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/","url":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/","name":"How to Grant Application Impersonation Rights in Office 365?","isPartOf":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#primaryimage"},"image":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png","datePublished":"2018-05-24T07:21:00+00:00","dateModified":"2023-08-06T10:00:58+00:00","description":"Step by Step guidance to ensure how to grant application impersonation rights in office 365. Enable application impersonation for Exchange Online mailboxes.","breadcrumb":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#primaryimage","url":"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png","contentUrl":"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2017\/09\/archive-1.png","width":280,"height":306,"caption":"archive-11"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailsdaddy.com\/blogs\/how-to-grant-application-impersonation-rights-office365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mailsdaddy.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Quick Guide on Why &#038; How to Enable Impersonation in Office 365"}]},{"@type":"WebSite","@id":"https:\/\/www.mailsdaddy.com\/blogs\/#website","url":"https:\/\/www.mailsdaddy.com\/blogs\/","name":"MailsDaddy Official Blog","description":"Manual Data Recovery and Email Migration Blogs","publisher":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailsdaddy.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mailsdaddy.com\/blogs\/#organization","name":"MailsDaddy Official Blog","url":"https:\/\/www.mailsdaddy.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailsdaddy.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2025\/12\/cropped-christmas-logo.avif","contentUrl":"https:\/\/www.mailsdaddy.com\/blogs\/wp-content\/uploads\/2025\/12\/cropped-christmas-logo.avif","width":418,"height":112,"caption":"MailsDaddy Official Blog"},"image":{"@id":"https:\/\/www.mailsdaddy.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailsdaddy\/","https:\/\/x.com\/mailsdaddy"]},{"@type":"Person","@id":"https:\/\/www.mailsdaddy.com\/blogs\/#\/schema\/person\/f7dec0fbb534e724f9687bfd44b5ef60","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8c4226cf0566a27fc57ae215b9f89d6fb237df6f997eb5de7ad2ad83149b978e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8c4226cf0566a27fc57ae215b9f89d6fb237df6f997eb5de7ad2ad83149b978e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8c4226cf0566a27fc57ae215b9f89d6fb237df6f997eb5de7ad2ad83149b978e?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.mailsdaddy.com\/blogs\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":5,"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":3500,"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/posts\/184\/revisions\/3500"}],"wp:attachment":[{"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mailsdaddy.com\/blogs\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}