These are the steps to authorize CalendarBridge to access calendars on a Google (“domain-wide delegation”) or Microsoft 365 tenant (granting “application permissions”). After performing these steps, wait at least 30 minutes before proceeding to Connect authorized domains to group account.
1. Visit the following link: Domain Authorization 2. Log in with an administrator account for the tenant you want to authorize. 3. You will see the list of permissions you are granting: 4. Click “Accept.” Once authorized you will be redirected back to CalendarBridge and see a success screen. CalendarBridge now has read and write access to all calendars on the tenant. To restrict CalendarBridge’s access to only certain calendars, see Restrict CalendarBridge Access to a Security Group. Here are the steps to verify the proper permissions have been granted:
- login to portal.azure.com with an admin account
- Click “Azure Active Directory”
- Click “Enterprise Applications” on the left
- Click “CalendarBridge Inc” in the list of applications (If it is not that there, that would indicate it has not been authorized yet)
- Click “Permissions”
- Check the “Admin consent” tab. It should look like this:
1. Visit the following page in your Google Workplace admin panel: https://admin.google.com/ac/owl/domainwidedelegation 2. Click “Add New” to bring up the add client dialog: 3. Copy the following and paste it into the “Client ID” field: 102884401058997455704. 4. Copy the following and paste it into the “OAuth scopes (comma delimited)” field scopes: https://www.googleapis.com/auth/userinfo.email,https://www.googleapis.com/auth/userinfo.profile,https://www.googleapis.com/auth/calendar.events,https://www.googleapis.com/auth/calendar.readonly 5. Click “Authorize.” You should see the CalendarBridge service app in the listing at https://admin.google.com/ac/owl/domainwidedelegation: CalendarBridge now has read and write access to all calendars on the tenant and you can proceed to add the authorized domains to your organization account.