Skip to main content

Set Up Outlook Connector

What you'll build

An authenticated connection to your Outlook account so your agent can send emails, reply to threads, and read your inbox. Learn more → Send Notifications. Time: ~5 minutes.

Prerequisites

  • An agent created in the Azure SRE Agent portal
  • A Microsoft 365 account with Outlook access
  • Contributor role on the agent's resource group (requires Microsoft.Web/connections/write and Microsoft.Authorization/roleAssignments/write)
  • A managed identity configured on the agent

Step 1: Navigate to Connectors

  1. Open your agent in the Azure SRE Agent portal
  2. In the left sidebar, expand Builder
  3. Select Connectors

You'll see the connectors list showing any existing connectors for your agent.


Step 2: Add an Outlook connector

  1. Click Add connector in the toolbar
  2. In the connector picker, select Outlook Tools (Office 365 Outlook)
  3. Click Next
Connector picker showing Send email (Office 365 Outlook) and Send notification (Microsoft Teams) options alongside other connector types
One Outlook connector per agent

Your agent can have one Outlook connector at a time. If a connector already exists, the card is disabled with the message "Your agent can only have one Outlook connector." To change the connected account, edit the existing connector.


Step 3: Sign in to Outlook

The setup form shows your connector name (auto-generated) and the sign-in option.

  1. Wait for the permission check to complete — you'll see "Checking permissions..." briefly
  2. Click Sign in to Outlook
  3. Complete the OAuth authentication in the popup window
  4. On success, you'll see a Connected as card showing your email address with a green checkmark
Popup blocker

If the authentication dialog doesn't appear, check that your browser isn't blocking popups from sre.azure.com.

Checkpoint: The "Connected as" card shows your email address with a green checkmark. If you see a permissions warning instead, verify you have Contributor role on the resource group — the warning includes a link to the Azure IAM settings.

Switching accounts

Click Sign in with a different account below the connected card to re-authenticate with a different Microsoft account. This disconnects the current account and starts a new OAuth flow.


Step 4: Select managed identity

Why both sign-in and managed identity?
  • OAuth sign-in authorizes the agent to use your Outlook account (send and read emails)
  • Managed identity lets the agent securely access the connector at runtime through Azure Resource Manager
  1. From the Managed identity dropdown, select an identity:
    • System assigned — simplest option. Automatically created with your agent and tied to its lifecycle. Use this if you don't need to share the identity across multiple resources.
    • User assigned — an independent Azure resource you manage separately. Use this if you share identities across services or need the identity to persist independently of the agent.
  2. If no identities appear, click Add identity below the dropdown to configure one in the Azure portal.

Step 5: Review and add

  1. Click Next to proceed to the Review + add step
  2. Verify your connector details
  3. Click Add connector to create the connector

Checkpoint: A toast notification confirms the connector was created successfully. Your connector appears in the connectors list.


Step 6: Test your Outlook connector

Ask your agent to send a test email:

Send an email to [your-email] with subject "SRE Agent Test" and body "Outlook connector is working"

Your agent composes the email, formats it as HTML, and sends it through the connected Outlook account.

Checkpoint: The agent shows a tool card confirming the email was sent. Check your inbox to verify receipt.


Edit or remove the connector

Edit

  1. In the connectors list, click the (more actions) menu on the Outlook connector row
  2. Select Edit connector
  3. The edit dialog opens — you can re-authenticate with a different account or change the managed identity
  4. Click Save

Delete

  1. Click on the connector row → Delete connector, or select the checkbox and click Remove in the toolbar
  2. Confirm the deletion

After deleting, your agent can no longer send or read emails. You can add a new Outlook connector at any time.


What you learned

  • How to add an Outlook connector using OAuth sign-in
  • How to verify the connector by sending a test email
  • What email tools become available to your agent

Troubleshooting

IssueSolution
Permissions warning appearsYou need Microsoft.Web/connections/write and Microsoft.Authorization/roleAssignments/write roles on the resource group. Click the link in the warning to open Azure IAM settings
OAuth popup blockedAllow popups from sre.azure.com in your browser settings
OAuth sign-in failsEnsure your Microsoft 365 account has an active Outlook mailbox
No managed identities in dropdownClick Add identity to configure one in the Azure portal, then click the refresh button
Connector card disabledYou already have an Outlook connector. Edit the existing one or delete it first
ResourceWhat you'll learn
Send Notifications →How your agent uses Outlook and Teams for contextual notifications
Set Up Teams Connector →Connect Teams for channel notifications
Create a Scheduled Task →Automate email notifications on a schedule
Was this page helpful?