Skip to main content
Available starting with FlowX.AI 5.5.0Microsoft Outlook is a new data source type that connects to Microsoft Outlook mailboxes via the MS Graph API, enabling both email monitoring (read) and sending capabilities through a single data source.

Overview

Microsoft Outlook is a data source type in Integration Designer that provides native Outlook connectivity through the Microsoft Graph API. Unlike the Email Trigger (IMAP) and Email Sender (SMTP) data sources, Microsoft Outlook uses Azure AD authentication and the MS Graph API for a unified read and send experience. Use cases include:
  • Email-triggered workflows: Automatically start processes when emails arrive in an Outlook mailbox
  • Customer communication: Send emails and replies directly from business processes
  • Document processing: Trigger workflows when emails with attachments are received
  • Unified inbox management: Read and send from the same data source configuration
Microsoft Outlook supports three scope modes:
  • Read Emails — monitor a mailbox and trigger processes
  • Send Emails — send emails from processes via notification templates
  • Read & Send Emails — both capabilities in a single data source

How it works

1

Register an Azure AD app

Create an app registration in Azure AD with the required MS Graph permissions for your scope.
2

Create a Microsoft Outlook data source

Configure the connection in Integration Designer with your Azure AD credentials and select the desired scope.
3

Connect to processes

For Read scope: link to a Message Start Event node and activate from Manage Triggers. For Send scope: link to a notification template and use the Send Notification action.
4

Process emails

FlowX.AI monitors the mailbox (Read) or sends emails (Send) through the MS Graph API.

Creating a Microsoft Outlook data source

Add Data Source - Microsoft Outlook

Prerequisites

Before configuring a Microsoft Outlook data source, ensure you have:
  • Access to Integration Designer with appropriate permissions
  • An Azure AD app registration with the required MS Graph API permissions:
ScopeRequired permissions (any one)
Read EmailsMail.Read, Mail.ReadBasic, or Mail.ReadWrite
Send EmailsMail.Send or Mail.ReadWrite
Read & Send EmailsOne read permission + one send permission
  • Azure AD credentials: Tenant ID, Client ID, and Client Secret
MS Graph permissions must be configured as Application permissions (not Delegated) in your Azure AD app registration, since the connection uses client credentials flow.

Step 1: Access Integration Designer

  1. Navigate to FlowX DesignerYour workspaceProjectsYour projectIntegrationsData Sources
  2. Click the + button to open the Add Data Source dialog
  3. Select Microsoft Outlook as the data source type

Step 2: Configure authentication

Tenant ID
string
required
The Azure AD tenant ID for your organization.
This field accepts configuration parameters. Use ${configParam} syntax to reference environment-specific values.
Client ID
string
required
The application (client) ID from your Azure AD app registration.
This field accepts configuration parameters for environment-specific credentials.
Client Secret
string
required
The client secret generated in your Azure AD app registration.
Store sensitive credentials in configuration parameters and reference them here using ${configParam} syntax.

Step 3: Test the connection

Click the Test Connection button to verify your Azure AD credentials:
ResultMessageAction
✅ Success”Established connection”Proceed to configure scope
❌ Error”Failed to establish connection”Check Azure AD credentials and permissions
The data source can be created even if the test connection fails. If the test fails on creation, you will be redirected to the Authorization tab with a failed connection message instead of the Settings page.

Step 4: Configure scope and email

Scope
select
required
The email capabilities for this data source:
OptionDescription
Read EmailsMonitor a mailbox and trigger processes when emails arrive
Send EmailsSend emails from processes via notification templates
Read & Send EmailsBoth read and send capabilities
Email Address
string
required
The email address of the mailbox to monitor or send from.Validation: Must be a valid email format.
This field accepts configuration parameters for environment-specific values.

Step 5: Name and description

Name
string
required
A unique, descriptive name for the Microsoft Outlook data source.Validation rules:
  • Required field
  • Must be unique within the project
  • Only letters, numbers, and these characters allowed: [], (), ., _, -
  • Minimum 3 characters, maximum 50 characters
Description
string
Optional description explaining the purpose of this data source.
Click Create to save the data source.

Settings page

After creating the data source, configure monitoring and validation settings in the Settings tab. The available settings depend on the selected scope.

Read scope settings

For data sources with Read Emails or Read & Send Emails scope:

Filtering criteria

Email Address
string
The email address that will be monitored. Editable after creation.
This field accepts configuration parameters.
Mailbox Folder
string
The mailbox folder to monitor for incoming emails.Default: InboxSupported well-known folder names:
  • Inbox, Sent, Drafts, Deleted, Junk, Archive, Outbox
This field accepts configuration parameters for environment-specific folder names.
Scope
string
Displays the scope selected during creation. This field is read-only.

Attachment validations

Toggle ON the Add validations to Attachments option to configure validation rules for incoming email attachments.
If any validation fails, the email will not be processed and a warning will appear in the Failed Triggers section in Runtime.
Allowed File Types
array
Restrict which attachment file types are accepted:
TypeExtensions
PDF.pdf
DOCUMENT.doc, .docx, .txt
IMAGE.png, .jpg, .jpeg, .tif, .tiff
EXCEL.xls, .xlsx, .csv
ZIP.zip
Leave empty to accept all file types.
Maximum File Size
number
Maximum allowed size per attachment file.Maximum: 25 MB
Maximum File Count
number
Maximum number of attachments allowed per email.
All fields in the Settings section accept configuration parameters, enabling environment-specific configurations.

Send scope settings

For data sources with Send Emails scope only:
Email Address
string
The email address used to send emails.
Mailbox Folder
string
The mailbox folder.Default: Inbox
Scope
string
Displays the scope selected during creation. This field is read-only.

Authorization page

Microsoft Outlook - Authorization
The Authorization tab displays the Azure AD credentials and allows you to update them or re-test the connection:
Tenant ID
string
required
Azure AD tenant ID.
Client ID
string
required
Azure AD application (client) ID.
Client Secret
string
required
Azure AD client secret.
Click Test Connection to verify the credentials. The test validates both the authentication and the required MS Graph permissions for the configured scope.

Connecting to processes

Reading emails (process trigger)

To trigger processes when emails arrive:
1

Configure the Message Start Event

Open your process definition and add a Message Start Event (Start Catch Message) node.
2

Select Microsoft Outlook as trigger type

In the node configuration, set Trigger Type to Microsoft Outlook. Then select the Microsoft Outlook data source (only data sources with Read or Read & Send scope are shown).
3

Activate the trigger

Navigate to Runtime SettingsManage Triggers and activate the trigger.
The trigger must be activated from Manage Triggers in Runtime Settings before email monitoring begins.

Sending emails (notification template)

To send emails from processes:
1

Link to a notification template

Open a notification template and set Email Server to Predefined Email Connection. Select the Microsoft Outlook data source (only data sources with Send or Read & Send scope are shown).
2

Add a Send Notification action

Add a Send Notification action to a process node and select the notification template.
Microsoft Outlook supports replying to emails. When replying to an email received via the Read scope, the MS Graph API uses the original message’s Message-ID header to maintain the conversation thread.

Email data schema

When an email triggers a process, the following data structure is available in your process variables:
{
  "emailMessage": {
    "subject": "Support Request #12345",
    "dateTime": "2026-01-15T10:30:00Z",
    "sender": "customer@example.com",
    "body": "Email body content...",
    "fileAttachments": [
      {
        "filePath": "email-attachments/proc-123/invoice.pdf",
        "downloadPath": "/api/internal/files/uuid-456/download"
      }
    ],
    "headerParams": {
      "Message-ID": "<abc123@example.com>",
      "x-ms-graph-message-id": "AAMk..."
    }
  }
}

Schema fields

FieldTypeDescription
subjectstringEmail subject line
dateTimestring (ISO 8601)Timestamp when email was received
senderstringSender’s email address
bodystringEmail body content
fileAttachmentsarrayList of attachment metadata objects
fileAttachments[].filePathstringStorage path in Document Plugin
fileAttachments[].downloadPathstringAPI path to download the file
headerParams.Message-IDstringStandard email message identifier
headerParams.x-ms-graph-message-idstringMS Graph message ID (used for replies)

Managing triggers at runtime

Manage Triggers

Navigate to Runtime SettingsManage Triggers to view and control Microsoft Outlook email triggers.
ColumnDescription
StateCurrent status: Active or Inactive
Process NameThe process definition linked to this trigger
Trigger Type”Email Trigger” for Microsoft Outlook email triggers
Event NameThe Microsoft Outlook data source name
LocationProject and branch information

Activation requirements

For a Microsoft Outlook trigger to appear in Manage Triggers:
  1. Microsoft Outlook data source must be created with Read or Read & Send scope
  2. Data source must be linked to a Message Start Event node
  3. The process must be part of a build in the Active Policy

Failed Triggers

When emails fail validation or processing errors occur, they appear in the Failed Triggers section under Runtime Settings. Failed triggers display the same information as Email Trigger failed triggers, including cause type, context, and detailed error messages.

Best practices

Use configuration parameters

Store Azure AD credentials (Tenant ID, Client ID, Client Secret) in configuration parameters for secure, environment-specific management.

Set appropriate validations

Configure file type, size, and count limits for Read scope to prevent processing of unwanted or oversized attachments.

Monitor failed triggers

Regularly review the Failed Triggers section to identify issues with email processing or connection problems.

Use least-privilege permissions

Grant only the minimum required MS Graph permissions for your scope. Use Mail.Read instead of Mail.ReadWrite if you only need read access.

Troubleshooting

Common causes:
  • Invalid credentials: Verify Tenant ID, Client ID, and Client Secret in Azure AD
  • Missing permissions: Ensure the app registration has the required MS Graph application permissions
  • Permissions not consented: Admin consent may be required for application permissions
  • Expired client secret: Generate a new client secret in Azure AD
Check:
  1. Does the data source have Read or Read & Send scope?
  2. Is the trigger Active in Manage Triggers?
  3. Is the correct mailbox folder configured?
  4. Do incoming emails pass attachment validation rules?
  5. Review Failed Triggers for error details
Check:
  1. Does the data source have Send or Read & Send scope?
  2. Is the data source linked to a notification template?
  3. Is the notification template’s Email Server set to Predefined Email Connection?
  4. Does the Azure AD app have Mail.Send permission?
  5. Review process instance logs for error details
Required MS Graph application permissions by scope:
ScopeRequired permission
ReadMail.Read, Mail.ReadBasic, or Mail.ReadWrite
SendMail.Send or Mail.ReadWrite
Ensure:
  • Permissions are set as Application (not Delegated)
  • Admin consent has been granted
  • The app registration is in the correct Azure AD tenant

Last modified on February 27, 2026