How to Connect to MS Dynamics 365 with Oauth (Legacy)

  • Updated

This connection method has been deprecated.

We have made security updates to our OAuth connection with Microsoft and you are now able to connect to Microsoft Dynamics using your Dynamics URL, App Client ID, and Secret instead of a Username & Password. This method is more secure and will bypass MFA requirements.

If your account is Dynamics 365 Cloud: You should connect using our newest version of Oauth. Basic Auth that connects with a username and password will not be supported by Microsoft beginning April 2022.

If your account is Dynamics 365 On-Prem: Accounts currently connected using Basic Auth will continue to maintain a connection with Dynamics. No action is required, however, you do have the option to switch to the new OAuth and we highly recommend doing so.

To begin using our newest connection today, see our instructions here: Connect to MS Dynamics 365 with OAuth.

Essentials to Get Started

  • System Administrator access in Azure Active Directory and Dynamics 365
  • Act-On Marketing or Admin user credentials
  • If you have not already done so, please submit a ticket with MS Dynamics to extend your use of Regional Discovery Services. For more information, read our update here.
  • Ability to disable MFA for the connected user.


If you have a new account and this is your first time connecting to Act-On, follow all of the steps below.

If you are migrating your connection from Basic Auth to Oauth, use the same username and password that you are currently using to connect Act-On to Dynamics. Follow steps 1, 4, and 5, (skip steps 2 and 3).

Step 1: Register an App for Act-On

  1. In Azure Active Directory, navigate to App registrations and click New registration:
    • Enter a Name for the application, such as “Act-On Integration”
    • Under Supported account types, select Accounts in this organizational directory only, then click Register. (If you have a multitenant environment, we recommend registering a separate App for each account.)Register-App.png
  2. You will be taken to the newly created app registration. Next, navigate to API permissions and click Add a permissionAdd-Permission.png
  3. On the Request API permissions page, select Dynamics CRMDynamics-API.png
  4. Select the user_impersonation permission and click Add permissionsuser-impersonation.png
  5. Click on Grant admin consent grant-consent.png
  6. Click Yes to confirm confirm-consent.pngA green checkmark will appear to indicate that admin consent has been granted.granted.png

  7. Navigate back to the App registration, and then click on Manifest
  8. Edit the text of these three properties so that they are true. (They may default to false, or null):
    • allowPublicClient
    • oauth2AllowIdTokenImplicitFlow
    • oauth2AllowImplicitFlow
  9. Once these are all set to true, click Save.
  10. Navigate back to the app registration and copy the Application (client) ID, to be used in Steps 3 and 4 below

Step 2: Set up a System Administrator for MS Dynamics

  1. In the Microsoft 365 Admin Center, create or identify an existing user to log in to Dynamics as a System Administrator. If you are creating a user or adding privileges:
    • Click on the User name and click Manage rolesManage-roles-for-admin-user.png
    • Scroll down and click Show all by category to expand.
    • Add Dynamics 365 Administrator and click Save changesmanage-roles.png

Step 3: Disable Multi-factor Authentication

If MFA is required for your Microsoft account, connect to Act-On using Basic Auth and an App Password to bypass MFA. See our instructions here: How to Connect to Microsoft Dynamics with Basic Auth (All versions).

  1. From Microsoft 365 Admin Center, go to the Active Users page
  2. Click on Multi-factor authentication
  3. Verify that the Dynamics 365 Administrator has multi-factor auth status disabled, and if not disable it for the userMFA.png

Step 4: Create an Application User

Create an Application User for Microsoft Dynamics that is associated with the Azure App you just registered. This user does not need to have a Client Access License and may have their Access Mode set to Non-interactive.

Microsoft has migrated the Application User management from the legacy web client to Power Platform. See Microsoft's instructions here: Create an Application User.

Within Power Platform, create an Application User that has the Act-On Integration app assigned.
When you create your user:

  • Choose the Azure AD App that you created in Step 1.
  • Apply the Security role of Dynamics 365 System Administrator.


Step 5: Connect to Act-On

  1. In Act-On, navigate to Settings > Connectors > CRM > MS Dynamics
  2. Click Disconnect (this will discontinue your current credentials from use)
  3. Click Connect
  4. Choose OAuth
  5. Enter your credentials:
  6. Select from the available sync options. See MS Dynamics Connector Options for more information on each of these choices.
  7. Click Login

Once you are logged in and successfully connected, the page will reflect that the MS Dynamics connector is active.

Was this article helpful?

Have more questions? Submit a request