Skip to main content

Office 365 Integration

How to connect each client's Microsoft 365 tenant to Strategy Overview to sync users, licenses, and MFA status.

Updated over a week ago

The Office 365 integration connects Strategy Overview to your clients' Microsoft 365 tenants, syncing user accounts, license assignments, and MFA status. Unlike your PSA (which connects once and syncs all companies), Office 365 requires a separate connection for each client tenant.

What syncs

  • User accounts with their assigned licenses

  • License types and counts

  • MFA status for each user (shows "enabled" only when the user has completed MFA registration; see The Office 365 Module for how Strategy Overview interprets MFA status)

Setup Video

Before you start

Important: The Office 365 connection goes through Microsoft's authentication flow, which can be sensitive to browser state. To avoid issues:

Use an incognito/private browser window. Microsoft can get confused with cached cookies, especially if you're signed into multiple Entra accounts.

Log into Strategy Overview using your local account, not Office 365/SSO. If you log into Strategy Overview with SSO, the browser may get confused about which Entra account is initiating the request.

Use the main app domain. The initial connection must be made from https://app.strategyoverview.com, not your branded domain. After the connection is established, you can use your branded domain normally.

Step 1: Get the Tenant ID

You'll need the Tenant ID for each client's Microsoft 365 environment.

  1. Go to the Azure Portal at https://portal.azure.com (note: https://portal.azure.us is not currently supported)

  2. Find Microsoft Entra ID using search or the left navigation menu

  3. Copy the Tenant ID from the overview page

Step 2: Connect in Strategy Overview

  1. Go to Settings > Integrations > Add Integration > Office 365

  2. Find the company you want to connect and click Connect

  3. Enter the Tenant ID

  4. In the Microsoft sign-in popup, sign in with an account that has admin access to the client's tenant

  5. Grant the requested permissions (see Required permissions above for details)

If you see an error that says "Applications must be authorized to access the customer tenant before partner delegated administrators can use them," try using incognito mode and make sure you're not logged into Strategy Overview with Office 365/SSO.

Step 3: Grant API consent in Entra ID

After connecting from Strategy Overview, you need to grant admin consent in the Azure Portal:

  1. Go to Azure Portal > Enterprise Applications

  2. Find Strategy Overview API

  3. Go to Permissions and click Grant admin consent

This grants the application-level permissions listed in the Required permissions section above.

Step 4: Force Sync

Click Force Sync to pull in the initial data. The data will appear within a few minutes. Check the logs to verify the sync completed.

Repeat for each client

Repeat Steps 1-4 for each company you want to sync. This is a one-time setup per client.

Adding Office 365 data to Reports

You can view Office 365 data in the Office 365 Module, or add it as a Part on your Reports:

  1. Go to Settings > Strategy Templates > [Your Template] > Parts > Add Part

  2. Label: Office 365

  3. Type: Office 365

  4. Icon: Windows

  5. Click Save

  6. Click Apply Part Settings to All Drafts to add it to existing open Reports

Once the Part is on your Report, you can rearrange the columns to fit your needs. Configure the column layout to show the information most useful for your vCIO conversations.

Required permissions

The integration requires the following Microsoft Graph API permissions. These are requested during the connection process (Step 2) and must be granted admin consent (Step 3).

Application permissions (require admin consent)

Permission

Description

Why it's needed

User.Read.All

Read all users' full profiles

Syncs user account details and license assignments across the tenant

Directory.Read.All

Read directory data

Reads tenant directory structure, group memberships, and organizational relationships

Organization.Read.All

Read organization information

Retrieves tenant-level details such as subscription and licensing information

Reports.Read.All

Read all usage reports

Accesses Microsoft 365 usage reports for license utilization data

UserAuthenticationMethod.Read.All

Read all users' authentication methods

Determines MFA enrollment and registration status for each user

AuditLog.Read.All

Read all audit log data

Reads sign-in and audit logs to support security and compliance reporting

Delegated permissions (used during sign-in)

Permission

Description

Why it's needed

User.Read

Sign in and read user profile

Authenticates the admin performing the connection

openid

Sign users in

Standard OpenID Connect sign-in scope

email

View users' email address

Identifies the signed-in admin by email

profile

View users' basic profile

Reads the signed-in admin's basic profile information

Note: All permissions are read-only. Strategy Overview does not write, modify, or delete any data in your Microsoft 365 environment.​

Did this answer your question?