Handling Delegated vs. Application Scopes in Microsoft Integrations
December 11, 2025
Microsoft Graph offers two fundamentally different permission models — Delegated and Application scopes. Understanding how these scopes behave is important when connecting Microsoft integrations through Unified.
Some Microsoft APIs only support delegated permissions, while others require strictly application-level permissions. Mixing them in a single OAuth flow will cause failures.
In Unified, you can create separate Microsoft connections so you can cleanly target the scopes required for the endpoints you plan to use.
This guide explains the difference between the permission types, why certain Unified endpoints require one or the other, and how to configure your Unified connections correctly.
1. Delegated vs. Application Permissions
Delegated Permissions
Delegated permissions are used when a signed-in Microsoft user is present in the OAuth flow.
Use delegated permissions when:
- The API needs to act on behalf of a user
- You want to access data the user normally has permission to view
- The Microsoft Graph endpoint explicitly supports delegated scopes
Application Permissions
Application permissions are used when no user is logged in, and the app accesses Microsoft Graph directly as itself.
Use application permissions when:
- A Microsoft endpoint does not support delegated scopes
- The API involves system-level or tenant-wide data
- The OAuth token must come from the client_credentials flow
Examples of Unified endpoints that only support application scopes:
uc_call(MS Teams call records API)- Microsoft Graph requires
CallRecords.Read.Allas an application permission, not delegated.
- Microsoft Graph requires
2. Why You Cannot Mix Delegated and Application Scopes
Microsoft Graph enforces strict separation between permission types:
- Delegated scopes must be requested during a user login OAuth flow
- Application scopes must be requested using client credentials
- A single OAuth authorization cannot request both delegated and application permissions
If both are selected together:
- Microsoft returns
AADSTS650053or similar errors - The OAuth token cannot be issued
- Your Unified connection will fail to authenticate
Because of this, selecting both scope types for the same Unified connection will not work.