By default, C1 sends notifications fromDocumentation Index
Fetch the complete documentation index at: https://www.c1.ai/docs/llms.txt
Use this file to discover all available pages before exploring further.
no-reply@conductorone.com. You can instead send through your own Microsoft 365 tenant using the Microsoft Graph sendMail API, so recipients see your company’s domain as the sender.
This task requires the Super Admin role in C1 and the Application Administrator (or Global Administrator) role in Entra ID, plus an Exchange Online administrator who can configure mailbox access policies.
C1 authenticates to your tenant via an Entra ID app registration with the Mail.Send application permission. No user passwords are shared with C1, and you can revoke access at any time by removing the client secret or deleting the app.
Before you begin
Configure SPF, DKIM, and DMARC for your sending domain by following Microsoft’s recommended email authentication settings before proceeding. If your domain is already used for Microsoft 365 mail, these records may already be in place.
- A Microsoft 365 (Entra ID) tenant.
- A licensed mailbox to send from (for example,
governance@yourcompany.com). - Permission to register applications and grant admin consent in Entra ID.
- Permission to run Exchange Online PowerShell to configure the mailbox access policy (Step 4).
Step 1: Register an app in Entra ID
Create an Entra ID app registration that C1 will authenticate as to call the Microsoft GraphsendMail API.
Sign in to entra.microsoft.com as an Application Administrator or Global Administrator.
Fill in:
- Name: C1 Email Sender (or similar).
- Supported account types: Accounts in this organizational directory only (single tenant).
- Redirect URI: leave blank.
Step 2: Grant the Mail.Send application permission
Grant the app permission to send mail and authorize it for your tenant.Step 3: Create a client secret
Create the credential C1 will use to authenticate as the app.Enter a description (for example, C1 Email Sender) and choose an expiration. 24 months is the maximum; a shorter expiration is better practice.
Step 4: Restrict the app to a specific mailbox (highly recommended)
By default, the app you created can send mail as any user in your tenant. Use an Application Access Policy in Exchange Online to scope it down to only the sender mailbox.Create the access policy, replacing
<APP_CLIENT_ID> with the Application (client) ID from Step 1 and <SENDER_MAILBOX> with the address you’ll use as the sender (for example, governance@yourcompany.com):Step 5: Configure the email provider in C1
Enter the app credentials and sender mailbox from the previous steps in C1 to activate the integration.Fill in the fields:
- Sender name: The display name recipients see (for example, Governance Team).
- Sender email address: The mailbox you scoped in Step 4 (for example,
governance@yourcompany.com). - Reply-to address: Usually the same as the sender address.
- Azure tenant ID: The Directory (tenant) ID from Step 1.
- Application (client) ID: The Application (client) ID from Step 1.
- Client secret: The secret value you copied in Step 3.
Step 6: Verify
Send a test message to confirm C1 can send through your Microsoft 365 tenant and that your email authentication records are passing.Check your inbox. View the raw headers and confirm SPF: PASS, DKIM: PASS with your domain as signer, DMARC: PASS.