Enterprise mailbox connection checklist (Microsoft 365 and Google Workspace)
Enterprise mailbox connection checklist (Microsoft 365 and Google Workspace)
Purpose
This article is for IT and operations teams that need to connect many Microsoft 365 and Google Workspace mailboxes during a platform migration or similar cutover. It gives a single runbook—who does what, which SuperSend paths to use at scale, and a sign-off checklist—without duplicating the full Gmail, Outlook, and Azure setup guides.
Prerequisites
- Microsoft 365 / Entra ID administrator access (for Azure app registration and admin consent).
- Google Cloud / Workspace administrator access (for OAuth consent screen, APIs, and OAuth clients).
- SuperSend organization admin access for Admin → Integrations (or team members who can add senders and OAuth apps, per your roles).
Recommended paths at scale
Provider | Use this in SuperSend | Why |
|---|---|---|
Microsoft 365 / Outlook | Service account (Graph application permissions + client secret) | Connect many mailboxes on one tenant without each user completing Microsoft’s OAuth consent screen. |
Google Workspace / Gmail | OAuth — one or more Google OAuth apps saved on the same team | No Google passwords stored in SuperSend; you can add multiple OAuth apps per team (e.g. different Google Cloud projects or tenants) and pick the right app per mailbox. |
For the full wizard flows and alternatives (e.g. Outlook OAuth, Gmail App Password), see Connect Outlook / Microsoft sender and Connect Gmail / Google Workspace sender.
Roles (who does what)
Area | Typical owner |
|---|---|
Azure app registration, admin consent, client secrets | Microsoft 365 / Entra ID administrator |
Google Cloud project, OAuth consent screen, OAuth client, scopes | Google Workspace or GCP administrator |
Entering credentials in SuperSend, adding mailboxes | SuperSend org admin and/or team members with Senders access |
Per-mailbox Google sign-in (“Connect your Gmail account”) | Someone who can sign in to that mailbox (admin or mailbox user) |
Steps — Microsoft 365 (service account)
Complete the Azure side first, then SuperSend.
In Azure (summary)
- Microsoft Entra ID → App registrations → create an app (single-tenant is typical).
- Redirect URI: not required for the service-account (client credentials) path.
- API permissions → Microsoft Graph → Application permissions (not delegated):
User.Read.All,Mail.Read,Mail.ReadWrite,Mail.Send. - Grant admin consent for your organization.
- Certificates & secrets → create a client secret; copy the secret value (shown once).
Full permission table, troubleshooting, and policy notes: Azure app registration and Microsoft service account (Outlook).
In SuperSend
- Admin → Integrations → select the team → Microsoft → add a Microsoft service account (Client ID, Tenant ID, client secret), or
- Senders → Add Sender → Email Sender → Connect Your Own Mailboxes → Microsoft Outlook → Service Account tab → create or select a service account → enter the mailbox email.
UI walkthrough: Connect Outlook / Microsoft sender (Service Account section).
Steps — Google Workspace (OAuth, multiple apps per team)
In Google Cloud (repeat per OAuth client / project)
- Create or select a project → enable Gmail API.
- Configure OAuth consent screen (Internal vs External / testing users as needed).
- Add scopes on Data access, including:
- Credentials → OAuth client ID → Web application:
- Authorized JavaScript origins:
https://app.supersend.io - Authorized redirect URIs:
https://app.supersend.io/oauth/google
- Download the client JSON or copy Client ID, secret, and Project ID.
Step-by-step detail (including consent-screen flow) is in the OAuth path inside Connect Gmail / Google Workspace sender and in Admin → Integrations for Integrations overview (Google OAuth / sending providers).
In SuperSend
- Senders → Add Sender → Gmail → OAuth tab.
- Add a Google OAuth app for this team (upload JSON or enter fields). Use a clear name per Google Cloud project or tenant.
- Add another OAuth app on the same team if you have additional GCP projects—multiple apps per team are supported.
- Optionally mark one app as default for the team.
- For each mailbox: select the correct OAuth app → Connect your Gmail account → sign in and approve.
Steps — After mailboxes are connected
Mailboxes must be attached to sender profiles, and campaigns must use those profiles, before email sends.
- Create sender profiles if you have not already: Senders → Sender Profiles → Create Profile. See Create and use sender profiles.
- Attach mailboxes to a profile from Senders → Mailboxes (the mailboxes table): select the mailboxes you want (you can bulk-select rows), then use Assign to Profile and pick the profile. (You can also open a profile’s detail page and use Add mailboxes there—the same outcome.)
- Point each campaign at a sender profile: open the campaign → Settings → Senders and add the profile(s) the campaign should send from. This step chooses which profile a campaign uses; it does not attach mailboxes to profiles.
See Senders overview for the full three-layer model.
Expected result
- Microsoft: Service account is saved for the team; mailboxes connect via the Service Account tab without per-user Microsoft consent.
- Google: One or more OAuth apps are on the team; each mailbox completes Google OAuth and shows as connected under Senders.
- Sender profiles include the new mailboxes; campaigns reference those profiles.
Troubleshooting
- Microsoft — “Failed to get Outlook profile”: Usually missing
User.Read.All(application permission), missing admin consent, or email / UPN mismatch. See the Azure article above. - Microsoft — permission errors after connect: Re-check all four Graph application permissions, consent state, and client secret expiry; rotate the secret in Azure and update SuperSend.
- Google — “App isn’t verified”: Common for internal OAuth clients; admins can proceed via Advanced, or pursue Google verification for broad production use. See Connect Gmail / Google Workspace sender.
- Google — wrong tenant or project: Confirm you selected the matching Google OAuth app on the OAuth tab before connecting; add a separate OAuth app per GCP project if needed.
Sign-off checklist (go / no-go)
Check | Microsoft 365 | Google Workspace |
|---|---|---|
Identity platform setup | ☐ Entra app has the four Graph application permissions + admin consent | ☐ Consent screen, scopes, and web OAuth client (origins + redirect) complete |
Credentials in SuperSend | ☐ Service account on team; secret documented and not expired | ☐ Correct OAuth app(s) on team; default set if desired |
Pilot | ☐ One mailbox connects via Service Account | ☐ One mailbox completes OAuth; status healthy in Senders |
Scale | ☐ Runbook for adding mailbox email + UPN quirks | ☐ Runbook for multiple OAuth apps vs default |
Related articles
- Senders overview
- Connect Outlook / Microsoft sender
- Azure app registration and Microsoft service account (Outlook)
- Connect Gmail / Google Workspace sender
- Integrations overview
- Create and use sender profiles
Updated on: 07/04/2026
Thank you!