Chat now with support
Chat with Support

Archive Shuttle 11.0 - Planning Guide

Size limits when ingesting into Office 365

For quite some time there has been a limit imposed by Microsoft on the size of individual items that can be ingested into Office 365 by third parties. This limit was 25 Mb. The limits for system-provided applications has been increased, and now, the limits for third parties has also been increased. This section explains how to take advantage of this increase.

Details

The default limit on a new Office 365 tenant is still 25 Mb, but this can be increased per user, or across the board for all users.

To increase the limit for an individual user:

In the Office 365 Admin Center, locate the user and change the max send and max receive sizes:

SingleUser

To increase the size for multiple users:

To edit size for multiple users. Shift + Click to select multiple recipients, then click the Update… link on the right side to modify those user’s message size restrictions.

MultipleUsers

To increase the limit across the board:

Go to Recipients, Mailboxes, Click … and choose Set default message size restrictions

DefaultForAllUsers

To increase the limits via PowerShell:

Limits can also be changed by PowerShell as follows:

For a single user:

Set-Mailbox -identity user@somedomain.com -MaxSendSize 75Mb -MaxReceiveSize 75Mb

 

For multiple mailboxes:

{"alias","alias2","alias3") | % {Set-Mailbox -identity $_ -MaxSendSize 75Mb -MaxReceiveSize 75Mb}

 

For all mailboxes:

Get-Mailbox | Set-Mailbox -MaxSendSize 75Mb -MaxReceiveSize 75Mb

 

To change the default:

Get-MailboxPlan | Set-MailboxPlan -MaxSendSize 75Mb -MaxReceiveSize 75Mb

 

info

NOTE: Archive Shuttle has seen items more than 120 Mb ingest successfully after making these changes.

Using OAuth Authentication

Archive Shuttle can be configured to use OAuth to authenticate with Microsoft Office 365, using a Certificate and/or Secret. Read the step-by-step guide below on how to configure OAuth using Secret and a certificate. For more on this, click here.

info

NOTES:

·OAuth is currently supported over both Exchange Online and PowerShell endpoints in Archive Shuttle 10 or above.

·If you would like to use OAuth without a Global Administrator account, a certificate with thumbprint needs to be configured together with installed  Exchange Online PowerShell V2 (EXOv2) module. Otherwise, a Global Administrator account is required. Click here for more information.

·You cannot utilize more than one service account when using OAuth.

·Windows Remote Manager (WinRM) needs to allow basic authentication to be able to proceed. Archive Shuttle was tested on Exchange Online PowerShell Module v2.0.5 and requires WinRM to be enabled.

Credential Editor

An account with Global Administration rights from Archive Shuttle 10.3 and below in Credential Editor. A Global Admin account is not required post Archive Shuttle 10.4.

info

NOTES:

·This is only when using a certificate thumbprint with installed Exchange Online Powershell V2 (EXO V2) and Azure Active Directory V2 PowerShell (Azure AD) modules. Click here for more information.

·An account with Global Administration rights when using the Credential Editor is still required when using an Application Secret or using certificate thumbprint without installed Exchange Online Powershell V2 module.

·For more on configuring OAuth for GCC and GCC High tenants by configuring the Credential Editor, click here.

·If using Microsoft Graph, ensure that the Azure App Registration section has been filled, regardless if OAuth is being used. If Azure App Registration is left empty, an error will occur.

Minimum permissions required for the account are listed on the Quadrotech Archive Shuttle Installation Guide.

 

Configuring Modern Authentication (OAuth) with a Secret

Step 1: Create a new Registered Application in Azure

To get an application ID:

1.Go to https://portal.azure.com and log in to your Office 365 tenant with an administrator account.

2.From the left menu, select Azure Active Directory > App registrations.

3.Click New registration.

4.Enter a name.

5.From the Supported account types, select Supported Account Type – Single tenant.

6.Don’t enter anything for Redirect URI (optional). Leave it as it is.

7.Click Register.

8.Copy the Application (client) ID and save it somewhere secure that you will remember. You will need it later.

 

2021-01-19-AS-oAuth

 

Step 2: Configure Permissions, Roles and Secret

Configure Application Permissions: Return to the Azure portal and access Azure Active Directory > App registrations > owned applications. Then find the application you created in Step 1 above.

1.Select your application, and then select API Permissions.

2.Click Add a Permission.

3.In the Request API permissions section > Select APIs my organization uses, search for Office 365 Exchange Online and select this API.

4.Click Application Permissions

5.In the Permissions list section, select the full_access_as_app listed in this section.

6.Click Add permissions.

7.Click Grant Admin consent.

 

Assign User Administrator role to the registered Application:

1.Navigate to Active Directory - Roles and Administrators

2.Find and open the User Administrator role

3.Click on Add Assignments

4.Search for the registered application (by Display Name)

5.Select the application and click Add.

 

The application is now recognized as Service Principal for the User Administrator role.

 

info

NOTES:

·An Azure Active Directory Premium license is required for these steps.

·This role is mandatory to collect mailboxes. For more on this role, click here.

Configure Application Secret:

1.Go to Certificates & Secrets and click the New Client Secret button.

2.Enter a descriptive name.

3.Choose an Expiry duration for the Secret (it is recommended to set the secret to not expire)

4.Click Add.

5.Copy the Secret created and save it somewhere. You will need it later.

 

Step 3: Add your Application ID and Secret on the server running the Archive Shuttle Office 365 Import module.

To do this:

1.In Archive Shuttle, open the Credential Editor while logged in as the account the module is running under.

2.Select the Office 365 OAuth tab and click Add.

3.Enter the Name (free format text), Application ID, Tenant (eg. tenant.onmicrosoft.com) and Secret Value.

4.Save and close the Credential Editor.

5.Open the Archive Shuttle Administrator Console.

6.Click Configuration > System Configuration.

7.Go to the Office 365 module settings and enable the option to Use modern authentication (OAuth).

8.Restart the Office 365 module to force settings to take immediate effect.

 

Configuring OAuth with a certificate

Step 1: Create a new Registered Application in Azure

To get an application ID:

1.Go to https://portal.azure.com and log in to your Office 365 tenant with an administrator account.

2.From the left menu, select Azure Active Directory > App registrations.

3.Click New registration.

4.Enter a name.

5.From the Supported account types, select Supported Account Type – Single tenant.

6.Don’t enter anything for Redirect URI (optional). Leave it as it is.

7.Click Register.

8.Copy the Application (client) ID and save it somewhere you will remember and securely. You will need it later.

 

2021-01-19-AS-oAuth

 

Step 2: Add a certificate to the server running the Office 365 module.

To add an untrusted certificate to your bridgehead server’s local certificate store:

1.Access the server where the Office 365 module is installed.

2.Open the certificates manager by start/run certlm.msc

3.Expand Trusted Root Certificate Authorities > Certificates.

4.Right-click Certificates and select All Tasks > Import… to launch the Certificate Import Wizard.

5.Locate the (.cer) certificate file and follow the wizard prompts.

6.Supply password, if required.

7.Right-click Certificates and select All Tasks > Import… to launch the Certificate Import Wizard.

8.Locate the (.pfx) certificate file and follow the wizard prompts.

9.Supply the password, if required.

 

Step 3: Configure Permissions and Roles

Configure Application Permissions: Return to the Azure portal and access Azure Active Directory > App registrations > owned applications. Then find the application you created in Step 1 above.

1.Select your application, and then select API Permissions.

2.Click Add a Permission.

3.In the Request API permissions section > Select APIs my organization uses, search for Office 365 Exchange Online and select this API.

4.Click Application Permissions

5.In the Permissions list section, select the full_access_as_app listed in this section.

6.Click Add permissions.

7.Click Grant Admin consent.

 

Assign User Administrator role to the registered Application:

1.Navigate to Active Directory - Roles and Administrators

2.Find and open the User Administrator role

3.Click on Add Assignments

4.Search for the registered application (by Display Name)

5.Select the application and click Add.

 

The application is now recognized as Service Principal for the User Administrator role.

 

info

NOTES:

·An Azure Active Directory Premium license is required for these steps.

·This role is mandatory to collect mailboxes. For more on this role, click here.

Step 4: Get a Thumbprint

To get a thumbprint:

1.Go to Certificates & Secrets and click the Upload Certificate button.

2.Upload your certificate file from Step 2.

3.Copy the certificate Thumbprint and save it somewhere. You will need it later.

 

info

NOTE: OAuth supports the Exchange Online Powershell Module v3. This can be used to authenticate the use of a certificate and thumbprint in the case of a Global Administrator not being present to connect to Office 365. Application secret is NOT supported via this method.

 

Step 5: Add your Application ID and Thumbprint on the server running the Archive Shuttle module.

To do this:

1.In Archive Shuttle, open the Credential Editor while logged in as the account the module is running under.

2.Select the Office 365 OAuth tab and click Add.

3.Enter the Name (free format text), Application ID, Thumbprint, and Tenant (eg. tenant.onmicrosoft.com)

4.Save and close the Credential Editor.

5.Open the Archive Shuttle Administrator Console.

6.Click Configuration > System Configuration.

7.Go to the Office 365 module settings and enable the option to Use modern authentication (OAuth).

8.Restart the Office 365 module to force settings to take immediate effect.

Required API permissions for to use modern authentication (oAuth)

Below are required API permissions for Archive Shuttle.

As Global Administrator

 

Office 365 Exchange Online (1)

full_access_as_app

Application

Use Exchange Web Services with full access to all mailboxes

 

For Exchange Online

 

Microsoft Graph (1)

User.Read

Delegated

Sign in and read user profile

 

Office 365 Exchange Online (2)

Exchange.ManageAsApp

Application

Manage Exchange as Application

full_access_as_app

Application

Use Exchange Web Services with full access to all mailboxes

Using Exchange Online PowerShell module

Connecting to Office 365 using OAuth supports the Exchange Online Powershell Module v2. This can be used to authenticate the use of a certificate and thumbprint. This is useful in the case of a Global Administrator account not being present to connect to Office 365.

Visit this article from Microsoft for more about the module.

CredEd2

info

NOTE: Application secret is NOT supported via this method.

Installing the Exchange Online Management module

You first need to download the Exchange Online Management module. This needs to be on the same machine as the Office 365 module.

info

PRE-REQUISITES:

·PowerShell 5.1 and later are supported.

·Minimum requirements: EXO 2.0.4 installed on machine where module is located.

·PowerShell command: Install-Module ExchangeOnlineManagement on machine where module is located.

·A self-signed certificate can be used. View this section for more information. Certificates issued with SHA 1 or SHA 2 can also be used.

1.Install the certificate into the Personal and Trusted Root Certification Authorities folder stores on a virtual machine where the Office 365 module is running.

CertificateStores

2.Open the Azure Active Directory portal, and go to Active Directory.

3.Select App registrations, then New registration.

4.Give the application a name, and select Accounts in this organizational directory only.

5.Set Redirect URI to Web, and leave the URL blank. Then click Register.

6.Next, we need to configure the Application permissions. Select API Permissions.

7.User Read should appear as default. Click Add a permissions, and locate Office 365 Exchange Online from the APIs my organization uses tab.

8.Select Application permissions. In the next screen, expand Exchange, and check full_access_as_app and Exchange.ManageAsApp. Then click Add permissions.

9.Now we need to grant administration consent. Click Grant admin consent for <tenant>. When this is completed, the Status column for full_access_as_app and Exchange.ManageAsApp permissions should read Granted for <tenant>.

ADO1

 

10.Select Certificates & Thumbprints, and upload the certificate you previously created.

info

NOTE: Check that the certificate (that is on the same virtual machine as the Office 365 module) is in the .cer format. .pfx is not supported.

ADO2

11.Navigate to Active Directory - roles and administrators.

12.Find the Global Reader role and open it.

13.Click on the Add assignments button.

ADO3

14.Select the registered application from step 4 as the ServicePrincipal for the Global Reader role.

15.Repeat steps 12 and 13 for the Exchange Administrator and User Administrator roles.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating