1. Home
  2. Knowledge Base
  3. πŸ” Security & Privacy
  4. Microsoft Entra ID Permissions Used by Calliente

Microsoft Entra ID Permissions Used by Calliente

Overview

The Calliente application integrates with Microsoft Entra ID (formerly Azure AD) to provide a secure and seamless user experience within Microsoft 365 environments.
This document outlines the specific API permissions requested by the application, their purpose, and how data is securely managed.

At Calliente, we apply the principles of transparency and privacy by design.
We only request the strictly necessary permissions and do not access or store data beyond the functional scope of the application.


βœ… Permissions Requested by Calliente

The following permissions are delegated and granted via the Microsoft Graph API.
They appear in your tenant as “Granted to Calliente“.

PermissionTypeAdmin consent requiredPrimary use
GroupMember.Read.AllDelegatedβœ… YesRead the groups a user belongs to, to filter contact synchronization
offline_accessDelegated❌ NoObtain a new access token when the current one expires, even if the user is no longer active
openidDelegated❌ NoRequired for authentication via OpenID Connect
profileDelegated❌ NoAccess basic user profile information
User.ReadDelegated❌ NoAllows the user to sign in and read their own profile
User.Read.AllDelegatedβœ… YesRead all user profiles β€” used to synchronize phone numbers and contact info

πŸ” why these Permissions?

Each permission has a specific purpose:

πŸ” User Identification and Login

  • openid, profile, and User.Read are standard OpenID Connect scopes to enable secure authentication via Microsoft Entra ID.

🧩 Contact Filtering by Group

  • GroupMember.Read.All allows Calliente to determine which groups the user belongs to, to restrict contact synchronization only to members of admin-defined groups.

πŸ“‡ Directory Search and Contextual Information

  • User.Read.All is used to list users, for example when assigning roles or searching for colleagues.
    No profile modification or writing is possible.

πŸ”„ Session Management

  • offline_access allows the application to continue functioning during long sessions without requiring the user to re-authenticate.

πŸ›‘οΈ Security Commitment

🧱 Principle of Least Privilege

Calliente only requests the minimal necessary permissions and does not perform any administrative operations on your tenant.

πŸ” No Data Stored outside the Tenant

User data accessed via Microsoft Graph is never permanently stored on Calliente servers, unless explicitly configured with consent.

βœ… Built-in Compliance

The Calliente platform adheres to Microsoft’s best practices for application consent, and follows the recommendations of the Microsoft Identity Platform for secure integrations.


🧾 how to Check or Revoke Permissions

As a Microsoft Entra ID administrator, you can review and manage granted permissions at any time:

Azure Portal β†’ Enterprise applications β†’ Calliente
Go to Permissions β†’ View or delete individual consents

For more details, consult the official Microsoft documentation on managing application permissions.


πŸ“¬ Questions or Concerns?

For an audit, compliance documentation needs, or technical assistance:
πŸ‘‰ https://calliente.app/contact/

For identity-related issues:
πŸ‘‰ Contact Microsoft Entra support

Was this article helpful?

Related Articles

Scroll to Top