Skip to main content
availability

Package: Invicti AppSec Core (on-demand), Invicti AppSec Enterprise (on-premise, on-demand)

Microsoft Azure Mail Integration

Microsoft Azure Mail enables sending email notifications through Microsoft's cloud infrastructure using Azure Active Directory (Microsoft Entra ID) OAuth authentication and the Microsoft Graph API. The Invicti AppSec integration with Microsoft Azure Mail allows security teams to receive real-time email notifications about vulnerability events — such as new critical findings, scan completions, or status changes — without requiring traditional SMTP credentials.

Purpose in Invicti AppSec

Microsoft Azure Mail is used in Invicti AppSec as a Notification Tool — enabling automated security event email notifications via Microsoft's cloud email infrastructure.

Use CaseDescription
Vulnerability notificationsReceive email alerts when new vulnerabilities are discovered or when severity thresholds are crossed
Scan completion alertsGet notified by email when a security scan completes
Status change updatesReceive email updates when vulnerability statuses change (e.g., opened, resolved, re-opened)

Where It Is Used

PageNavigation PathPurpose
Integrations — Notification ToolsIntegrations › Notification ToolsAdmin activation and global configuration
Project SettingsProject › Settings › Notification ToolsLink Microsoft Azure Mail to a specific project for project-level notifications

Prerequisites

Before activating the integration, register an application in Azure and gather the following credentials:

FieldDescriptionRequired
Tenant IDThe Azure Active Directory (Microsoft Entra ID) tenant IDYes
Client IDThe Application (client) ID of the registered Azure appYes
Client SecretA client secret generated for the registered Azure appYes
FromThe sender email address (must be a mailbox in your Microsoft 365 tenant)Yes
ToThe recipient email address where notifications will be deliveredYes

How to Obtain Credentials (on the Azure Side)

Step 1 — Register an Azure Application:

  1. Sign in to the Azure portal.
  2. Navigate to Microsoft Entra ID (formerly Azure Active Directory) › App registrations.
  3. Click New registration.
  4. Enter a name (e.g., invicti-aspm-mail), select Accounts in this organizational directory only, and click Register.

Tenant ID and Client ID:

  1. After registering the app, go to its Overview page.
  2. Copy the Directory (tenant) ID → this is your Tenant ID.
  3. Copy the Application (client) ID → this is your Client ID.

Client Secret:

  1. In the app registration, go to Certificates & secrets.
  2. Under Client secrets, click New client secret.
  3. Enter a description (e.g., invicti-aspm) and set an expiry period.
  4. Click Add and immediately copy the generated Value — it will not be shown again.

API Permissions: To allow the app to send emails, you must grant it the Microsoft Graph Mail.Send application permission:

  1. In the app registration, go to API permissions.
  2. Click Add a permissionMicrosoft GraphApplication permissions.
  3. Search for and select Mail.Send.
  4. Click Add permissions.
  5. Click Grant admin consent for [your tenant] and confirm.

From (Sender Email):

  • The sender address must be a valid mailbox in your Microsoft 365 tenant (e.g., notifications@acme.com). The registered app must have Mail.Send permission to send on behalf of this mailbox.

Activation Steps

Step 1: Navigate to Integrations

From the left sidebar, click Integrations.

Step 2: Open the Notification Tools Tab

On the Integrations page, click the Notification Tools tab.

Notification Tools

Step 3: Find and Activate Microsoft Azure Mail

Locate the Microsoft Azure Mail card.

  • If it is not yet activated, click Activate to open the settings drawer.
  • If it is already activated, click the gear icon to open the settings drawer and reconfigure.

Step 4: Fill In the Required Fields

In the settings drawer, enter the following:

FieldDescriptionRequired
Tenant IDYour Azure Active Directory tenant IDYes
Client IDYour registered application's client IDYes
Client SecretThe client secret generated for your Azure appYes
FromThe sender email address (e.g., notifications@acme.com)Yes
ToThe recipient email address for notifications (e.g., security-team@acme.com)Yes

Step 5: Test the Connection

Click Test Connection. A green "Connection successful" message confirms that Invicti AppSec can authenticate with Azure and send emails using the provided credentials.

Microsoft Azure Mail settings

Step 6: Save

Click Save to complete the activation.

Summary

StepAction
1Navigate to Integrations from the sidebar
2Select the Notification Tools tab
3Find Microsoft Azure Mail and click Activate (or the gear icon)
4Enter Tenant ID, Client ID, Client Secret, From, and To
5Click Test Connection — verify the success message
6Click Save

Troubleshooting

IssueResolution
Connection failedVerify that the Tenant ID, Client ID, and Client Secret are correct and that the Azure app registration is active.
Client secret expiredClient secrets have an expiry date. Generate a new secret in Azure and update the configuration in Invicti AppSec.
401 UnauthorizedEnsure the Client ID and Client Secret match the registered application and that admin consent has been granted for the Mail.Send permission.
403 Forbidden / Mail.Send not grantedThe app does not have the Mail.Send application permission or admin consent has not been given. Re-check the API permissions in the Azure app registration.
Sender address not authorizedThe From address must be a valid mailbox in your Microsoft 365 tenant. Shared mailboxes are also supported if the app has the required permissions.
Tenant ID not foundVerify the tenant ID matches the Directory (tenant) ID shown in the app registration's Overview page.

Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?