@softeria/ms-365-mcp-server 0.11.0 → 0.11.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +36 -10
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -60,6 +60,29 @@ get-sharepoint-site-drive-by-id, list-sharepoint-site-items, get-sharepoint-site
|
|
|
60
60
|
get-sharepoint-site-list, list-sharepoint-site-list-items, get-sharepoint-site-list-item,
|
|
61
61
|
get-sharepoint-sites-delta</sub>
|
|
62
62
|
|
|
63
|
+
### Work Scopes Issues
|
|
64
|
+
|
|
65
|
+
If you're having issues accessing work/school features (Teams, SharePoint, etc.), you should pass the
|
|
66
|
+
`--force-work-scopes` flag!
|
|
67
|
+
|
|
68
|
+
```json
|
|
69
|
+
{
|
|
70
|
+
"mcpServers": {
|
|
71
|
+
"ms365": {
|
|
72
|
+
"command": "npx",
|
|
73
|
+
"args": [
|
|
74
|
+
"-y",
|
|
75
|
+
"@softeria/ms-365-mcp-server",
|
|
76
|
+
"--force-work-scopes"
|
|
77
|
+
]
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
```
|
|
82
|
+
|
|
83
|
+
While the server should attempt to force a re-login when work scopes are needed, passing the flag explicitly is safer
|
|
84
|
+
and ensures proper scope permissions from the start.
|
|
85
|
+
|
|
63
86
|
**User Profile**
|
|
64
87
|
<sub>get-current-user</sub>
|
|
65
88
|
|
|
@@ -146,22 +169,23 @@ MCP clients will automatically handle the OAuth flow when they see the advertise
|
|
|
146
169
|
|
|
147
170
|
##### Setting up Azure AD for OAuth Testing
|
|
148
171
|
|
|
149
|
-
To use OAuth mode with custom Azure credentials (recommended for production), you'll need to set up an Azure AD app
|
|
172
|
+
To use OAuth mode with custom Azure credentials (recommended for production), you'll need to set up an Azure AD app
|
|
173
|
+
registration:
|
|
150
174
|
|
|
151
175
|
1. **Create Azure AD App Registration**:
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
|
|
176
|
+
- Go to [Azure Portal](https://portal.azure.com)
|
|
177
|
+
- Navigate to Azure Active Directory → App registrations → New registration
|
|
178
|
+
- Set name: "MS365 MCP Server"
|
|
155
179
|
|
|
156
180
|
2. **Configure Redirect URIs**:
|
|
157
181
|
Add these redirect URIs for testing with MCP Inspector:
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
182
|
+
- `http://localhost:6274/oauth/callback`
|
|
183
|
+
- `http://localhost:6274/oauth/callback/debug`
|
|
184
|
+
- `http://localhost:3000/callback` (optional, for server callback)
|
|
161
185
|
|
|
162
186
|
3. **Get Credentials**:
|
|
163
|
-
|
|
164
|
-
|
|
187
|
+
- Copy the **Application (client) ID** from Overview page
|
|
188
|
+
- Go to Certificates & secrets → New client secret → Copy the secret value
|
|
165
189
|
|
|
166
190
|
4. **Configure Environment Variables**:
|
|
167
191
|
Create a `.env` file in your project root:
|
|
@@ -175,13 +199,15 @@ With these configured, the server will use your custom Azure app instead of the
|
|
|
175
199
|
|
|
176
200
|
#### 3. Bring Your Own Token (BYOT)
|
|
177
201
|
|
|
178
|
-
If you are running ms-365-mcp-server as part of a larger system that manages Microsoft OAuth tokens externally, you can
|
|
202
|
+
If you are running ms-365-mcp-server as part of a larger system that manages Microsoft OAuth tokens externally, you can
|
|
203
|
+
provide an access token directly to this MCP server:
|
|
179
204
|
|
|
180
205
|
```bash
|
|
181
206
|
MS365_MCP_OAUTH_TOKEN=your_oauth_token npx @softeria/ms-365-mcp-server
|
|
182
207
|
```
|
|
183
208
|
|
|
184
209
|
This method:
|
|
210
|
+
|
|
185
211
|
- Bypasses the interactive authentication flows
|
|
186
212
|
- Uses your pre-existing OAuth token for Microsoft Graph API requests
|
|
187
213
|
- Does not handle token refresh (token lifecycle management is your responsibility)
|