Configuring nested app authentication for Office add-ins
Nested app authentication (NAA) for Office add-ins replaces legacy Exchange tokens with Microsoft Entra ID policies, as required by Microsoft’s security standards. This ensures compliance with Exchange data access protocols and supports secure authentication workflows. Account owners and admins can configure NAA via the Azure portal and manage it directly within the Zoom web portal.
Requirements for configuring nested app authentication (NAA) for Office add-ins
Note: Nested app authentication (NAA) is only supported with Exchange Online. Organizations using Exchange 2019 (or other on-premises versions of Exchange) will need to continue utilizing legacy Exchange user identity tokens and callback tokens, as these are not blocked in on-premises environments.
How to configure NAA for Office add-ins
Enable NAA in the Zoom web portal
- Sign in to the Zoom web portal.
- Click Account Management, then Account Settings.
- Click the Mail & Calendar tab.
- Under Integrations, click the Enable Nested app authentication for Outlook Add-in SSO toggle to enable or disable the option.
- If a verification dialog appears, click Accept to grant Zoom the necessary access.
Note: Enter the Office 365 administrator username and password in the dialog box that appears (if not already).
(Optional) Create custom Azure application
Admins can create their own Azure application if preferred. Once configured, a request must be submitted to Zoom Support to enable the use of the custom Azure app.
- Sign in to the Azure portal.
- In the navigation menu, click App registrations, then click New registration.
- Under Name, type Zoom-Office-Add-in-NAA.
- Under Supported account types, select Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com).
- Under Redirect URL (optional), select Single-page application(SPA) then brk-multihub://zoom.us.
- Click Register.
- In the navigation menu, expand the Manage section, then click API permissions.
- Under Microsoft Graph, next to User.Read, click Remove permission.
- Click Add a permission, then select Microsoft Graph.
- Click Delegated permissions.
- Under Permission, select Calendars.Read, then click Add permissions.
- Click Authentication.
- Under Add URL, add the following redirect URLs:
- Click Save.