When creating a SigParser account using Microsoft 365 work credentials, or when connecting your Microsoft 365 mailbox, admin approval may be required based on your organization's security policies.
These instructions are for M365 Admins. Users without admin permissions cannot approve OAuth consent on behalf of the organization.
Step 1 – Approve OAuth Consent in Microsoft Entra ID (Required)
This is the primary step for most organizations. Approving OAuth consent in Entra ID grants SigParser the permissions it needs to connect to your mailbox.
Go to: Azure → Microsoft Entra ID → Enterprise Applications → Activity → Admin Consent Requests → find the SigParser request and approve it.
Don't see a pending request? This means admin consent requests may not be enabled for your tenant, or the user hasn't yet triggered the request. See Enable Admin Consent Requests below.
It can take 1 hour+ for Microsoft permissions to update. If your Admin applies permissions updates and you cannot proceed, try again in 1 hour.
Step 2 – Check Microsoft Defender for Cloud Apps (If Entra approval alone doesn't work)
Some organizations use Microsoft Defender for Cloud Apps with stricter OAuth app governance policies. If a user still cannot connect after Entra consent is approved, a Defender policy may be blocking or flagging the SigParser app.
What to check:
Go to: M365 Admin Center → Microsoft Defender (Security)→ Cloud Apps → OAuth Apps → locate the SigParser application.
If the app shows as Banned — change its status to remove the ban.
If the app is unreviewed — you can mark it as Approved to flag it as reviewed for your security team. Note: the "Approved" label in Defender is a tracking/review status for your security team — it does not by itself grant OAuth access. The actual access is controlled by Entra (Step 1).
If your organization has automated OAuth app policies that restrict or revoke unreviewed apps, those policies may also need to be updated to allow SigParser.
Not all organizations use Defender for Cloud Apps. If your org doesn't have Microsoft Defender for Cloud Apps enabled, this step does not apply.
Enable Admin Consent Requests (If users can't request approval)
If users are not seeing the option to request admin approval when connecting their mailbox, this feature needs to be enabled by an admin.
Go to: Azure → Microsoft Entra ID → Enterprise Applications → Consent and Permissions → Admin Consent Settings → enable "Users can request admin consent to apps they are unable to consent to"
Microsoft Graph Permissions Requested by SigParser
SigParser uses Microsoft Graph API to securely extract and maintain contact and relationship data. Access is limited to the minimum permissions required for the platform to function.
Requested permissions and what they mean:
Mail.Read
Allows SigParser to read email metadata and signature blocks to identify contact information and relationship activity.
SigParser does not read or analyze full email message content beyond signatures.Calendars.Read
Enables visibility into meeting metadata (e.g., attendees and dates) to help calculate relationship strength and interaction history.
Meeting content and notes are not accessed.Contacts.Read
Allows SigParser to read existing contacts to prevent duplicates and keep contact records accurate and up to date.GroupMember.Read.All
Used to understand group membership and organizational context (e.g., distribution lists or teams) for relationship mapping and coworker identification.Users.Read.All
Allows SigParser to read basic user profile information (name, email address) to correctly associate mailbox activity and contacts within the organization.
Security notes:
SigParser cannot access the Microsoft 365 admin environment or perform administrative actions.
Permissions apply only to the approved scope and are used strictly for data extraction and enrichment.
SigParser does not send email, modify messages, or impersonate users.
Access and processing are governed by SigParser’s SOC 2 Type II–certified security controls.
Admins can review the exact permissions during the Microsoft Entra Admin Consent workflow before approving access.
If you have any questions, send us an email at support@sigparser.com. You can also book a demo session HERE.




