Orgwide Integration via Microsoft Graph

Enable organization-wide Microsoft 365 connectivity for Rox, allowing IT administrators to authorize Rox to securely access calendar and email data on behalf of all users within their Microsoft Entra

1) Scope of Integration

Use-case: Organization-wide connection to Microsoft 365 for calendar and email sync within Rox.

Supported data access:

Data Type

Purpose

Graph Permission (Application)

Mail

Read and write access to users’ mailboxes for syncing communications to Rox.

Mail.ReadWrite

Calendar

Read and write access to users’ calendars for meeting insights and scheduling automation

Calendars.ReadWrite

Directory

Read-only access to basic directory information (users) for mapping and permission management

Directory.Read.All

Permission model: Application-level permissions (granted once by a Microsoft 365 tenant admin). No per-user consent required after setup. No delegated scopes are used for this integration.


2) Components & Hosting Locations

Component

Vendor

Region

Rox Application Frontend

Vercel

United States

Rox Application Backend APIs

AWS

us-east-2 (Ohio, USA)

Microsoft Graph API

Microsoft

Global (per-tenant region)

Rox does not host or proxy any Microsoft infrastructure. Your Microsoft Entra tenant remains the authority for all authentication and access control.


3) Microsoft Entra (Azure AD) Application Details

Property

Description

App Type

Multitenant application using Microsoft Graph (Application permissions)

Protocol

OAuth 2.0 client credentials grant

Requested Graph Scopes

Mail.ReadWrite, Calendars.ReadWrite, Directory.Read.All

Consent Model

Tenant admin consent (single approval for the entire organization)

Token Handling

Short-lived access tokens obtained via service-to-service authentication; no delegated tokens or user credentials are stored

Directory Objects Accessed

Users (read-only for mapping and sync control)


4) Integration Flow

  1. A Microsoft 365 Global Admin or Privileged Role Administrator connects the organization’s Microsoft tenant to Rox using Org-wide Integration.

  2. The admin is redirected to Microsoft’s standard admin consent screen showing requested permissions.

  3. Upon consent, Microsoft issues an application token to Rox for organization-level access.

  4. Rox uses these application permissions to:

    1. Sync calendar events bi-directionally between Outlook and Rox (for authorized users only)

    2. Read and sync emails (for authorized users only) and optionally write emails

    3. Maintain user directory mappings to match mailboxes and permissions

  5. No per-user authentication is required. Rox respects organizational policies for mail and calendar data access.


5) Data Handling & Privacy

Category

Description

Data Accessed

Mail metadata, body, attachments (for synced users depending on permissions granted); calendar events; user directory data

Purpose

Enable Rox features such as timeline insights, communication tracking, meeting automation

PII Minimization

Only required attributes and content for syncing and user mapping are stored

Data Residency

Rox services are hosted in the United States (Vercel + AWS us-east-2)

Retention

Synced data is retained only for operational and feature purposes; deleted upon user or tenant disconnection

Deletion

Upon disconnection or data removal request, all synced data can be purged per Rox’s data lifecycle policies


6) Security Controls

Control

Detail

Transport Security

TLS 1.2+ for all communications between Rox, Microsoft Graph, and user browsers

Encryption at Rest

AES-256 or managed encryption via AWS and Vercel

Token Security

No persistent tokens stored; service tokens rotated and scoped

Access Control

Only Microsoft-granted app permissions; enforced by Microsoft Graph

Customer Governance

Admins can restrict or revoke Rox access via Enterprise Applications → Rox Orgwide Integration in Entra Admin Center

Auditability

All actions traceable via Rox logs and Microsoft Graph API audit logs

Least Privilege

Only the three required Graph scopes are used; no full directory write or global admin operations performed


7) Customer Action Checklist (IT / Admin)

  1. Review and approve the Rox 365 Integration request within Microsoft Entra ID.

  2. Grant tenant-wide admin consent for:

    1. Mail.ReadWrite

    2. Calendars.ReadWrite

    3. Directory.Read.All

  3. Verify that Rox appears under Enterprise Applications → Rox 365 Integration in your Entra portal.

  4. Confirm that Conditional Access and other Microsoft security policies (e.g., MFA, IP restrictions) are applied as per your standards.

  5. Optionally, configure user-level restrictions for email/calendar syncing in the Rox Admin Console.


8) Connection Steps (for IT Admins)

  1. Go to https://run.rox.com/settings > Integrations

  1. Click on the Connect button for Microsoft Enterprise

  1. Configure the individual access for Calendar and Email. Add any restricted domains as well.

  1. Add your tenant id from Microsoft Entra portal and the email IDs of the users you want to restrict the email access for

  1. Click on Connect which will take you to the Microsoft Authorization page. Click on Accept

  1. You will be redirected to the Rox application where you can see that the Microsoft Enterprise integration will be connected. The users will no longer be able to connect any of Google/Microsoft email and calendar separately.


9) Summary

Aspect

Detail

Purpose

Organization-wide connection to Microsoft 365 for calendar and email sync

Permissions

Application permissions: Mail.ReadWrite, Calendars.ReadWrite, Directory.Read.All

Hosting

Vercel (US), AWS us-east-2 (US)

Data

Email, calendar, and user directory data synced securely and encrypted

Controls

OAuth 2.0 client credentials flow; no user credentials stored; admin consent required; least-privilege scope

Governance

Microsoft Entra remains authoritative; revocation and audit available anytime via Microsoft portal

Last updated