Approval Required (Admin Consent)
Admin consent for integration with Microsoft 365 via Microsoft Graph API
Written by Team
Updated over a week ago

Approval Required

If you are not able to connect Microsoft 365 Calendar without admin consent (Approval Required screen appears), you need to ask your Microsoft 365 Administrator to approve MeetingRoomApp application.


  1. Enter justification for requesting MeetingRoomApp

  2. Click on Request approval

Microsoft 365 Administrator:

In Azure Active Directory (AAD), app integration may be restricted to administrators only. To comply with this restriction, an account must possess administrator privileges.

Confirm the Approval:

  1. Sign in to the Azure portal: Navigate to and sign in using your administrator credentials.

  2. Access Azure Active Directory: In the left-hand menu, click on "Azure Active Directory" to access the Azure AD management dashboard.

  3. Go to Enterprise Applications: In the Azure AD dashboard, find and click on "Enterprise Applications" from the left-hand menu.

  4. Search for the application: In the Enterprise Applications pane, use the search bar to find the application that needs approval.

  5. Select the application: Click on the application name to access its overview and settings.

  6. Review permissions: In the application's settings, go to "Permissions" or "Required permissions" to review the requested permissions.

  7. Click on the "Grant admin consent" button. This will grant the necessary permissions to the application, allowing it to access your Microsoft account or other resources.

  8. Notify the user: Inform the user who requested the application connection that you have approved the application. They should now be able to use the application with their Microsoft account.

Microsoft 365 implementation offers multiple options. However, if strict domain administrators are in place, further progress cannot be made without their involvement.

For more information, refer to the following resource:

Complete settings for user account behaviour can be found in Azure Active Directory Enterprise Applications.

Did this answer your question?