OAuth
Microsoft Setup
Connect Outlook Calendar to Recal
Already set up?
Jump to Configure API Permissions, Get Credentials, or Add to Recal.
1. Register Application in Azure
Go to Azure Portal → Search "App registrations" → + New registration:
- Display name: Your app name
- Supported account types: "Any organizational directory + personal accounts" (SaaS) or "This org only" (internal)
- Redirect URI: Web →
https://yourapp.com/auth/callback - Click Register
2. Configure API Permissions
API permissions → + Add a permission → Microsoft Graph → Delegated permissions:
- Add Calendar permissions (see Scopes below)
- For org apps: Grant admin consent
3. Obtain Client ID and Secret
- Client ID: Overview page → Application (client) ID
- Client Secret: Certificates & secrets → + New client secret → Copy Value immediately (shown once)
4. Microsoft Scopes
Recal maps to these Microsoft Graph permissions:
write scope - Read/write access to events
User.Read- User's basic profile informationCalendars.ReadWrite- Read/write access to calendars and eventsCalendars.ReadWrite.Shared- Read/write access to shared calendars
read scope - Read-only access to calendars and events
User.Read- User's basic profile informationCalendars.Read- Read-only access to calendars and events
free-busy scope - Read-only access to availability
- Same as
readscope (Microsoft has no separate free-busy permission)
Best Practice
Request minimum scopes needed. Insufficient access returns 403 — re-authenticate with higher scope.
5. Add to Recal
In Recal dashboard → OAuth Credentials → Add Client ID, Client Secret, and redirect URL to Microsoft card.
URLs Must Match
Redirect URL in Recal must exactly match the URI in Azure.