Skip to main content

Overview

Pre-built tooling

ToolsStatus
Pre-built authorization (OAuth)βœ…
Credentials auto-refreshβœ…
Pre-built authorization UIβœ…
Custom authorization UIβœ…
End-user authorization guideβœ…
Expired credentials detectionβœ…
ToolsStatus
Pre-built integrations🚫 (time to contribute: <48h)
API unificationβœ…
2-way syncβœ…
Webhooks from Nango on data modificationsβœ…
Real-time webhooks from 3rd-party API🚫 (time to contribute: <48h)
Proxy requestsβœ…
ToolsStatus
HTTP request loggingβœ…
End-to-type type safetyβœ…
Data runtime validationβœ…
OpenTelemetry exportβœ…
Slack alerts on errorsβœ…
Integration status APIβœ…
ToolsStatus
Create or customize use-casesβœ…
Pre-configured pagination🚫 (time to contribute: <48h)
Pre-configured rate-limit handling🚫 (time to contribute: <48h)
Per-customer configurationsβœ…
No pre-built syncs or actions available yet.
Not seeing the integration you need? Build your own independently.

Access requirements

Pre-RequisitesStatusComment
Paid dev accountβœ… Not requiredFree, self-signup for a Microsoft account and Azure account.
Paid test accountβœ… Not requiredFree Microsoft account can be used for testing.
Partnershipβœ… Not required
App review⚠️ ConditionalRequired only if you want to publish your app to the Microsoft commercial marketplace or if your app needs admin consent for certain permissions.
Security auditβœ… Not required

Setup guide

No setup guide yet.
Need help getting started? Get help in the community.
Contribute improvements to the setup guide by editing this page
Contribute useful links by editing this page

Common Permissions

PermissionDescription
Financials.Read.AllRead all financial data (no user sign-in required)
user_impersonationAccess as the signed-in user
AdminCenter.ReadWrite.AllFull access to Admin Center API
Automation.ReadWrite.AllFull access to automation
API.ReadWrite.AllFull access to web services API

API gotchas

  • See particularly the tenantId parameter under Get a token.
  • When requesting Application Permissions that require admin consent, an Microsoft Entra ID administrator must pre-authorize the permissions. Without admin consent, the app cannot obtain tokens for those scopes.
  • For multitenant applications, each tenant administrator must grant consent to the app’s required permissions before access is granted in their tenant.
  • The .default scope is a special scope that tells Azure AD to issue a token containing all the Application Permissions that have already been granted (consented) for your app on that resource. Using .default ensures your app receives permissions consistent with those configured and consented at the tenant or organization level.
  • The .default scope can’t be combined with the scopes registered in the Azure portal. So either just use the .default scope or remove it to list out explicit parameters that are required. If you attempt to combine them you’ll receive the following error
.default scope can't be combined with resource-specific scopes
  • To add the .default scope when creating a connection, use the integrations_config_defaults parameter in createConnectSession:
const { data } = await nango.createConnectSession({
  end_user: {...},
  integrations_config_defaults: {
    "microsoft-business-central": {
      connection_config: {
        oauth_scopes: "https://api.businesscentral.dynamics.com/.default",
      },
    },
  },
});
  • No user interaction is involved when using the Microsoft Business Central provider. Therefore, a Microsoft Entra ID administrator must grant consent for the required Application Permissions ahead of time. This can be done through the Azure Portal or by using the admin consent endpoint.
    Contribute API gotchas by editing this page

Going further

Connect to Microsoft Business Central

Guide to connect to Microsoft Business Central using Nango Connect UI.