With the Microsoft Outlook API, you can build a wide range of applications and services that work with Outlook. Here are some examples:
import { axios } from "@pipedream/platform"
export default defineComponent({
props: {
microsoft_outlook: {
type: "app",
app: "microsoft_outlook",
}
},
async run({steps, $}) {
return await axios($, {
url: `https://graph.microsoft.com/v1.0/me`,
headers: {
Authorization: `Bearer ${this.microsoft_outlook.$auth.oauth_access_token}`,
},
})
},
})
Emit new event when a new Calendar event is created
Emit new event when a Calendar event is updated
Emit new event when a new Contact is created
Create an event in the user's default calendar, See the docs
Add a contact to the root Contacts folder, See the docs
Get a contact collection from the default contacts folder, See the docs
Microsoft Outlook uses OAuth authentication. When you connect your Microsoft Outlook account, Pipedream will open a popup window where you can sign into Microsoft Outlook and grant Pipedream permission to connect to your account. Pipedream securely stores and automatically refreshes the OAuth tokens so you can easily authenticate any Microsoft Outlook API.
Pipedream requests the following authorization scopes when you connect your account:
User.Read
email
offline_access
openid
profile
Mail.ReadWrite
Mail.Send
MailboxSettings.ReadWrite
IMAP.AccessAsUser.All
POP.AccessAsUser.All
SMTP.Send
Calendars.ReadWrite
Contacts.ReadWrite
GET
https://login.microsoftonline.com/common/oauth2/v2.0/authorize
?
client_id={{oauth.client_id}}
&
redirect_uri={{oauth.redirect_uri}}
&
state={{oauth.state}}
&
response_type=code
&
scope={{oauth.space_separated_scopes}}
POST
https://login.microsoftonline.com/common/oauth2/v2.0/token
content-type: application/x-www-form-urlencoded
accept: application/json
client_id={{oauth.client_id}}
&
client_secret={{oauth.client_secret}}
&
redirect_uri={{oauth.redirect_uri}}
&
grant_type=authorization_code
&
code={{oauth.code}}
&
scope={{oauth.space_separated_scopes}}
POST
https://login.microsoftonline.com/common/oauth2/v2.0/token
content-type: application/x-www-form-urlencoded
accept: application/json
client_id={{oauth.client_id}}
&
client_secret={{oauth.client_secret}}
&
grant_type=refresh_token
&
refresh_token={{oauth.refresh_token}}