- Getting started
- Notifications
- Licensing
- Troubleshooting
- Connector Builder
- Act! 365
- ActiveCampaign
- Active Directory - Preview
- Adobe Acrobat Sign
- Adobe PDF Services
- Amazon Bedrock
- Amazon Connect
- Amazon Polly
- Amazon SES
- Amazon Transcribe
- Amazon Web Services
- Anthropic Claude
- Asana
- AWeber
- Azure AI Document Intelligence
- Azure Maps
- BambooHR
- Box
- Brevo
- Calendly
- Campaign Monitor
- Cisco Webex Teams
- Citrix Hypervisor
- Citrix ShareFile
- Clearbit
- Confluence Cloud
- Constant Contact
- Coupa
- CrewAI – Preview
- Customer.io
- Database Hub - Preview
- Databricks Agent
- Datadog
- DeepSeek
- Deputy
- Discord - Preview
- DocuSign
- Drip
- Dropbox
- Dropbox Business
- Egnyte
- Eventbrite
- Exchangerates
- Exchange Server - Preview
- Expensify
- Facebook
- Freshbooks
- Freshdesk
- Freshsales
- Freshservice
- GetResponse
- GitHub
- Gmail
- Google Cloud Platform
- Google Docs
- Google Drive
- Google Forms - Preview
- Google Maps
- Google Sheets
- Google Speech-to-Text
- Google Text-to-Speech
- Google Tasks - Preview
- Google Vertex
- Google Vision
- Google Workspace
- GoToWebinar
- Greenhouse
- Hootsuite
- HTTP - Preview
- HTTP Webhook - Preview
- Hubspot CRM
- HubSpot Marketing
- HyperV - Preview
- Icertis
- iContact
- Insightly CRM
- Intercom
- Jina.ai
- Jira
- Keap
- Klaviyo
- LinkedIn
- Mail
- Mailchimp
- Mailgun
- Mailjet
- MailerLite
- Marketo
- Microsoft 365
- Microsoft Azure
- Microsoft Azure Active Directory
- Microsoft Azure AI Foundry
- Microsoft Azure OpenAI
- Microsoft Dynamics 365 CRM
- Microsoft OneDrive & Sharepoint
- About the Microsoft OneDrive & SharePoint connector
- Microsoft OneDrive and SharePoint authentication
- Microsoft OneDrive & SharePoint events
- Microsoft Outlook 365
- Microsoft Power Automate
- Microsoft Sentiment
- Microsoft Teams
- Microsoft Translator
- Microsoft Vision
- Miro
- NetIQ eDirectory
- Okta
- OpenAI
- OpenAI V1 Compliant LLM
- Oracle Eloqua
- Oracle NetSuite
- PagerDuty
- PayPal
- PDFMonkey
- Perplexity
- Pinecone
- Pipedrive
- QuickBooksOnline
- Quip
- Salesforce
- Salesforce AgentForce & Flows – Preview
- Salesforce Marketing Cloud
- SAP BAPI
- SAP Cloud for Customer
- SAP Concur
- SAP OData
- SendGrid
- ServiceNow
- Shopify
- Slack
- SmartRecruiters
- Smartsheet
- Snowflake
- Snowflake Cortex
- Stripe
- Sugar Enterprise
- Sugar Professional
- Sugar Sell
- Sugar Serve
- System Center - Preview
- TangoCard
- Todoist
- Trello
- Twilio
- UiPath Apps - Preview
- UiPath Data Fabric – Preview
- UiPath GenAI Activities
- UiPath Orchestrator
- X (formerly Twitter)
- Xero
- watsonx.ai
- WhatsApp Business
- WooCommerce
- Workable
- Workday
- Workday REST
- VMware ESXi vSphere
- YouTube
- Zendesk
- Zoho Campaigns
- Zoho Desk
- Zoho Mail
- Zoom
- ZoomInfo

Integration Service user guide
In Integration Service, when you create a connection to one of our Microsoft Graph-based connectors, you can choose between the following authentication options:
- OAuth 2.0 Authorization code – connects to the UiPath public application.
- OAuth 2.0 Client credentials – uses a service account.
- Bring your own OAuth 2.0 app – connects to a private application you create.
Many organizations require the consent of an administrator before you create a connection to an external application. The admin consent workflow requires an admin to approve the app registration to specific users or groups before a connection is established. For more details, check Overview of admin consent workflow and User and admin consent in Microsoft Entra ID in the Microsoft documentation.
Scopes
openid,
offline_access, email, and
Files.Read.
offline_access,
Files.Read, Files.Read.All,
Files.ReadWrite, Files.ReadWrite.All,
Sites.Read.All, Sites.ReadWrite.All,
Group.Read.All, Group.ReadWrite.All,
profile, openid, email,
User.Read.All, and User.Read.
To add more granular permissions, refer to the activities documentation.
Adding the Microsoft OneDrive and SharePoint connection
- In Automation Cloud, select Integration Service from the rail.
- From the Connectors list, select Microsoft OneDrive and SharePoint. You can also use the search bar to narrow down the connector.
- Select Connect to Microsoft OneDrive and SharePoint, which redirects you to the connection page.
- Select the OAuth 2.0 Authorization code authentication type.
- Configure the following:
- Scope - Add or remove permissions for your connector.
- Environment -
Optionally, select an environment from the dropdown list:
- Office 365 (default)
- US Government L4 - Public Sector domain
- US Government L5 - Public Sector domain
- China
Select Office 365 (default) for all regions, and only switch to Government or China for cloud deployments. For more details on environments, check Microsoft Graph and Graph Explorer service root endpoints.
- Select Connect.
- Authenticate with your Microsoft email address and password.
Refresh tokens for OAuth applications
Refresh tokens for OAuth applications can be invalidated or revoked at any time by Microsoft. This can happen for different reasons, such as timeouts and revocations. For details, see Microsoft's official documentation.
Make sure to follow best practices from Microsoft when creating your OAuth applications. For full details on how to create a Microsoft OAuth app, see the Microsoft documentation.
This issue affects not only the OneDrive & SharePoint connector, but all Microsoft Graph-based connectors, such as Outlook or Teams.
Scopes
Files.Read.
offline_access,
Files.Read, Files.Read.All,
Files.ReadWrite, Files.ReadWrite.All,
Sites.Read.All, Sites.ReadWrite.All,
Group.Read.All, Group.ReadWrite.All,
profile, openid, email,
User.Read.All, and User.Read.
To add more granular permissions, refer to the activities documentation.
Adding the Microsoft OneDrive and SharePoint connection
- In Automation Cloud, select Integration Service from the rail.
- From the Connectors list, select Microsoft OneDrive and SharePoint. You can also use the search bar to narrow down the connector.
- Select Connect to Microsoft OneDrive and SharePoint, which redirects you to the connection page.
- Select the OAuth 2.0 Client credentials authentication type.
- Configure the
following:
- Client ID - The client ID from the Overview section of your Microsoft Azure application registration.
- Client secret - The client secret from the Certificates & secrets section of your Microsoft Azure application.
- Tenant ID - The Microsoft Azure tenant ID for an app from the Overview section.
- Environment - Optionally,
select an environment from the dropdown list:
- Office 365 (default)
- US Government L4 - Public Sector domain
- US Government L5 - Public Sector domain
- China
Select Office 365 (default) for all regions, and only switch to Government or China for cloud deployments. For more details on environments, check Microsoft Graph and Graph Explorer service root endpoints.
- Account - Represents the account used to impersonate a user. Specify the user principal name (UPN) of the account or shared mailbox to be used in connection. This is required for the connection to be established.
- Select Connect.
Overview
To learn how to create an application, check the official Microsoft documentation: Register an application with the Microsoft identity platform.
Requirements
When you create your own application to use with Integration Service, make sure you meet the following requirements:
- Configure the application as a Multi-tenant or Single-tenant application.
- Configure a Web application.
- Configure a Web Redirect URI. The Redirect URI (or callback URL) for your OAuth 2.0 application is provided in the authentication screen when creating a connection: https://cloud.uipath.com/provisioning_/callback.
- You must set up delegated permissions. For more information, refer to Permissions in the Microsoft official documentation.
- Generate a client secret for your application.
The connector uses Microsoft Graph API. Refer to the Microsoft Graph permissions reference page for details on all permissions.
After you create your application, use its Client ID and Client Secret to create a connection with the Microsoft connectors.
Scopes
- The connector requires the
following minimum scopes to create a connection:
openid,offline_access,User.Read.AllorUser.Read,Files.Read. - OneDrive triggers require the
following minimum scopes:
openid,offline_access,User.Read.AllorUser.Read,Sites.Read.All– for events on SharePoint sites.Group.Read.All– for events on groups and calendars.Files.Read.All– for all the remaining event types.
offline_access,
Files.Read, Files.Read.All,
Files.ReadWrite, Files.ReadWrite.All,
Sites.Read.All, Sites.ReadWrite.All,
Group.Read.All, Group.ReadWrite.All,
profile, openid, email,
User.Read.All, and User.Read.
To add more granular permissions, refer to the activities documentation.
Adding the Microsoft OneDrive and SharePoint connection
- In Automation Cloud, select Integration Service from the rail.
- From the Connectors list, select Microsoft OneDrive and SharePoint. You can also use the search bar to narrow down the connector.
- Select Connect to Microsoft OneDrive and SharePoint, which redirects you to the connection page.
- Select the Bring your own OAuth 2.0 app authentication type.
- Configure the following:
- Client ID - The client ID from the Overview section of your Microsoft Azure application registration.
- Client secret - The client secret from the Certificates & secrets section of your Microsoft Azure application.
- Scope - Add or remove permissions for your connector.
- Tenant ID -
The Microsoft Azure tenant ID for an app from the Overview
section.
Note:
- If you
use a multi-tenant application, keep the default value
common. - If you use a single-tenant application, retrieve the tenant ID from Azure. For more details, check How to find your Microsoft Entra tenant ID.
- If you
use a multi-tenant application, keep the default value
- Environment -
Optionally, select an environment from the dropdown list:
- Office 365 (default)
- US Government L4 - Public Sector domain
- US Government L5 - Public Sector domain
- China
Select Office 365 (default) for all regions, and only switch to Government or China for cloud deployments. For more details on environments, check Microsoft Graph and Graph Explorer service root endpoints.
- Select Connect.
Refresh tokens for OAuth applications
Refresh tokens for OAuth applications can be invalidated or revoked at any time by Microsoft. This can happen for different reasons, such as timeouts and revocations. For details, see Microsoft's official documentation.
Make sure to follow best practices from Microsoft when creating your OAuth applications. For full details on how to create a Microsoft OAuth app, see the Microsoft documentation.
This issue affects not only the OneDrive & SharePoint connector, but all Microsoft Graph-based connectors, such as Outlook or Teams.
- Overview
- Admin consent
- OAuth 2.0 Authorization code
- Scopes
- Adding the Microsoft OneDrive and SharePoint connection
- Refresh tokens for OAuth applications
- OAuth 2.0 Client credentials
- Scopes
- Adding the Microsoft OneDrive and SharePoint connection
- Bring your own OAuth 2.0 app
- Overview
- Scopes
- Adding the Microsoft OneDrive and SharePoint connection
- Refresh tokens for OAuth applications