Azure  

How Enterprise-Wide Third-Party Client Applications Use Azure Authentication

In today's Microsoft 365 ecosystem, third-party client applications like ShareGate, AvePoint, or Colligo play a vital role in helping organizations migrate, manage, and analyze their SharePoint and Microsoft 365 environments. To do so securely, these tools rely on Azure Active Directory (now Microsoft Entra ID) for authentication and authorization.

However, one common point of confusion is when these applications require admin consent and when they can operate with just user-level permissions.
Let's break this down clearly.

The Foundation: Azure AD Authentication in Enterprises

When any application (internal or third-party) connects to Microsoft 365, it must authenticate via Azure AD (Entra ID) - Microsoft's identity and access management service.

Authentication can happen in two ways:

  1. Delegated Authentication (User-based)

  2. App-only Authentication (Service Principal-based)

Both use secure OAuth 2.0 and OpenID Connect protocols to ensure tokens are issued safely to verified applications.

Delegated Authentication – When Admin Consent Is Not Required

In delegated authentication, a user signs in to the third-party tool using their own Microsoft 365 credentials (for example, through browser login or Windows authentication).

Here's what happens under the hood:

  • The user grants permission for the app to act on their behalf.

  • The app receives a delegated token tied to that user's identity.

  • It can access only the data and sites that the user already has access to.

Example

If a Site Collection Administrator uses ShareGate to migrate one SharePoint site, the tool only accesses that specific site using the user's own permissions.
No admin approval is needed because the app is not requesting global or tenant-level permissions. This is the most common method for site-specific operations or migrations where users already have the required permissions.

App-Only Authentication – When Admin Consent Is Required

For enterprise-wide operations - like tenant-level migrations, reporting, or automation - the third-party tool must operate independently of any user account.

This is done through App-Only Authentication, where:

  • The tool uses an Azure AD application (Service Principal).

  • The app requests elevated permissions (for example, Sites.FullControl.All).

  • These permissions apply across the tenant — not just one user.

Because such permissions could potentially access sensitive data across Microsoft 365, an administrator must grant tenant-wide consent.

Example

When you configure ShareGate for a large migration across all SharePoint sites, the administrator consents to the ShareGate Migration Tool App in Azure AD. Once approved, ShareGate uses that app identity to access resources across the tenant securely.

What "Consent" Really Means

Consent in Azure AD refers to granting permission for an application to access certain Microsoft 365 APIs on behalf of a user or the entire organization.

There are two types

  • User Consent: The user allows the app to access their own data (delegated access).

  • Admin Consent: The administrator allows the app to access data across the tenant (app-only access).

Once consent is given, Azure AD issues tokens to the application for the approved scopes.

ShareGate as a Case Study

ShareGate offers both modes, depending on your use case:

ModeAuthentication TypeAdmin Consent Required?Scope of Access
Delegated AuthenticationUser logs in with credentialsNoLimited to user's own permissions
App-Only AuthenticationApp registered in Azure AD (Service Principal)YesTenant-wide access
HybridCombines both modesSometimesDepends on operation type

In delegated mode, ShareGate can connect using:

  • Current Windows credentials

  • Username and password

  • Browser-based sign-in (MFA compatible)

In app-only mode, the ShareGate Migration Tool App must first be approved in the tenant's Microsoft Entra ID. This single approval allows secure, organization-wide access during large-scale migrations or reporting operations.

Balancing Security and Productivity

This dual-model approach ensures enterprises maintain strict control and transparency over access.

  • For routine operations: Delegated Authentication keeps access user-specific and secure.

  • For automation and large-scale management: App-Only Authentication provides efficiency with administrator oversight.

Microsoft's authentication framework ensures every access token is traceable, auditable, and revocable - protecting organizational data while enabling flexibility.

Conclusion

Enterprise tools like ShareGate, Colligo, and AvePoint use Azure AD-based authentication to securely interact with Microsoft 365.
They support both delegated and app-only models, giving organizations the choice between user-specific access and admin-approved, tenant-wide control.