Integrating Comeen with Microsoft for meeting room management generally involves granting comprehensive permissions for full operational capabilities. However, organizations with specific concerns may choose a read-only configuration, allowing access to view resources and events without enabling changes.
Required Scopes for ReadOnly Synchronization
For organizations opting for a read-only setup, the following OAuth scopes are necessary:
Read Calendars in rooms Mailboxes: This scope permits the application to access and read calendar events across rooms mailboxes. It does not allow for any modifications or bookings.
Read All Company Places: This scope allows the application to access information about all company places, such as meeting rooms, without editing capabilities.
Sign In and Read User Profiles: This scope enables the application to sign in users and read basic user profiles without the ability to edit or create new events.
Functional Limitations with ReadOnly Permissions
Choosing read-only permissions focuses on visibility rather than interaction. Key limitations include:
Room Reservations: Users cannot book, alter, or cancel room reservations. Any action requiring changes to the meeting room status is restricted.
Event Management: Users cannot create or modify events, including actions like extending, shortening, or ending meetings.
Notifications: The system cannot send notifications related to room releases or booking confirmations, as these require write access.
Setting Up ReadOnly Permissions
To configure read-only permissions for Microsoft integration, follow these steps:
Navigate to the Integrations section in your Comeen dashboard.
Select Microsoft.
Locate Meeting Rooms from the options available and click on Sign in with Microsoft or add another account by selecting Add Account.
Choose between Application permissions and Delegated permissions. Then tick the Read Only box to establish the desired permission level.
Proceed to Sign in with Microsoft.
In the Microsoft sign-in pop-up, click Allow to grant the necessary read-only access.
This setup ensures that your organization maintains visibility over meeting room usage and event schedules while adhering to specific security protocols.