Create an Application Access Policy for Microsoft Teams Web Conference Integration

You must set up the application access policy for the application you created for this integration, and then grant the policy to each of the Microsoft users who need access to this integration.

Here’s an overview of the setup steps:

  1. Create a mail-enabled security group in the Microsoft Exchange admin center.
  2. Create an application access policy in Microsoft PowerShell for the security group you created.

Create a Mail-Enabled Security Group

Here are the steps to set up a mail-enabled security group.

  1. Sign in to the Exchange Admin Center at https://admin.exchange.microsoft.com/#/.
  2. Navigate to Groups > Mail-enabled security.
  3. Click Add a group as shown.

    The screenshot highlights the Add a group button on the Exchange admin center page. Click the button to create a group.

  4. In the Group type section, select Mail-enabled security and click Next, as shown:

    Select the Mail-enabled security option for the group type.

  5. In the Set up the basics section, enter a name and description, and click Next as shown:

    Next step in creating the group is to enter basic information such as name and description of your group.

  6. In the Settings section, enter the group email address, and configure the following:
    1. Communication: Don't select the checkbox.
    2. Approval: Select the Require owner approval to join the group checkbox.
  7. In the Finish section, verify all the details and click Create group as shown:

    Click the Create group button to finish creating a group.

  8. The mail-enabled security group you created shows up in the Groups list as shown:

    The group you created shows up in the Groups list.

  9. Next, you need to assign owners and add members to the group. To do that, click the group name.
  10. On the Group Details window, click the Members tab.
    1. You're the owner of the group you created. To add more owners, click View all and manage owners. For example, the following image shows the Limit Access window with the Members tab highlighted, along with the View and manage all owners link.

      On the Members tab, click the View all and manage owners link to add more owners to your group.

    2. On the Owners page, click Add owners as shown:

      Click the Add Owners button.

    3. Select the group owners from the list and click Add as shown:

      Select owners from the list.

    4. Click the back arrow to go back to the Members tab and click View all and manage members to add users you want to give seamless access to as shown:

      Click the View all and manage members link to add users to the security group you created.

    5. On the Members page, click Add members.
    6. Select the members from the list and click Add.
    7. Click the back arrow to go back to the Members tab
  11. Close the group.
The mail-enabled security group is ready for use.

Create an Application Access Policy

Follow these steps:
  1. Open Windows PowerShell.
  2. Run the following commands in Windows PowerShell.
    • Install-Module -Name MicrosoftTeams
    • Connect-MicrosoftTeams

      If you haven’t authenticated yet, Windows PowerShell will prompt you to sign in with your Microsoft Azure Administrator credentials.

  3. Once authenticated, go back to Windows PowerShell and create an application access policy by running the following command and replacing AppId:

    New-CsApplicationAccessPolicy -Identity XXXXXXXXXXXX -AppIds "XXXXXXXXXXXX" -Description "XXXXXXXXXXXX"

    AppID represents the application (client) ID of the registered Azure App for this integration. Identity represents the name of the policy and Description is the optional policy description.

  4. Once the policy is created, grant the policy to the Microsoft security group by running the following command and replacing the arguments for the PolicyName and groupID.

    Grant-CsApplicationAccessPolicy -PolicyName XXXXXXXXXXXX -Group "groupID”

    PolicyName represents the name of the policy to be assigned and groupID specifies the group used for the group policy assignment.

    Note: To retrieve groupID of the Microsoft security group created for this integration, run the following command in Windows PowerShell:
    Get-MgGroup -Search
            "displayName:name" -ConsistencyLevel eventual

    Replace the attribute for displayName with the full or partial name of your mail-enabled security group (you can use a keyword to search).

    It might take about 30 minutes for your changes to be reflected.