10 Blog

"Admin Approval Required" When Connecting Outlook — What It Means and How to Fix It

If your organization blocks third-party calendar apps like Hetk, here's what's happening and how your IT admin can approve it in a few clicks.

Updated By Andrei Reinus

You’ve signed up for Hetk, clicked “Continue with Microsoft,” and instead of the usual permissions screen you see this:

Needs admin approval Hetk Calendar Sync needs permission to access resources in your organization that only an admin can grant.

Microsoft “Need admin approval” dialog

This isn’t a bug in Hetk. It’s a security setting in your organization’s Microsoft Entra ID (formerly Azure Active Directory). Here’s what’s happening and how to fix it.

Why this happens

Microsoft gives IT administrators control over which third-party apps can access company data. Most organizations configure one of these policies:

  • Only admins can approve apps — the most restrictive and most common in security-conscious organizations. Users must request approval from IT to connect any third-party app
  • Users can approve apps from verified publishers only — a middle ground. Hetk is a verified publisher (Microsoft has confirmed our identity), but some companies restrict this further to an approved list of specific vendors
  • Users can approve any app — the most permissive. Less common in corporate environments due to security risks

When either of the first two policies is active, users can’t approve Hetk themselves. An admin needs to approve it once, and then everyone in the organization can connect without seeing the approval screen again.

This is standard across the industry. If you’ve used Calendly, Reclaim.ai, or other calendar tools with a work Outlook account, you’ve probably seen this screen. Microsoft uses this restriction to prevent users from accidentally granting access to malicious apps.

What permissions does Hetk request?

Hetk asks for two Microsoft Graph permissions, both delegated (meaning they act on behalf of the signed-in user, not the entire organization):

PermissionWhat it doesWhy it’s neededAdmin consent required?
Calendars.ReadWriteRead and write events on the user’s calendarsHetk needs this to read your events for sync, and write synced events from other calendarsNo (by Microsoft’s default)
User.ReadRead the user’s basic profile (name, email)Hetk needs your email to identify which calendar to sync toNo

Neither permission requires admin consent by default in Microsoft’s standard setup. The block comes from your organization’s tenant-level policy, not the permissions themselves.

Hetk does NOT request:

  • Organization-wide calendar access
  • Mail access
  • File or document access (OneDrive, SharePoint)
  • Administrative access
  • Access to other users’ calendars
  • Organization-wide settings or data

Hetk’s access is scoped to the individual user. Your coworkers’ calendars remain private unless you explicitly share them.

Permission scopes

Microsoft Graph permissions have different scopes:

Delegated permissions (what Hetk uses): Act on behalf of the signed-in user. Limited to that user’s data.

Application permissions: Act on behalf of the app, independent of any user. Always require admin consent and grant broader access.

Hetk uses delegated permissions, so your sign-in is required. Hetk can only access calendars you have access to.

How your IT admin can approve Hetk

Two ways to do this. Both take under a minute.

Your IT admin opens this link in their browser (signed in as admin):

https://login.microsoftonline.com/common/adminconsent?client_id=8dd90edb-c881-459a-ac84-2a1fee8c5c94

They see the permissions, click Accept, and Hetk is approved for everyone in the organization.

Admin consent permissions dialog

Option B: Approve through the Entra admin center

  1. Go to Entra admin center
  2. Navigate to Identity > Applications > Enterprise applications
  3. Search for Hetk Calendar Sync
  4. Click Permissions in the left sidebar
  5. Click Grant admin consent

After approval, any user in the organization can connect their Outlook calendar to Hetk without seeing the admin approval screen again.

What if you don’t have access to an admin?

  • Forward the consent link above to your IT department with a note
  • Submit an IT request through your company’s ticketing system (ServiceNow, Jira Service Desk, etc.)
  • Check if your org has a self-service app approval flow

In the meantime, if you have a personal Microsoft or Google account, sign into Hetk with that and connect your personal calendars.

About security

For IT administrators evaluating Hetk:

  • Verified publisher: Microsoft has confirmed our identity through the Cloud Partner Program
  • Minimal permissions: We only request calendar read/write and basic profile access
  • Delegated access: Hetk acts on behalf of individual users, not organization-wide
  • Domain-verified policy: Set a single DNS TXT record at _hetk.<your-domain> to force every sync leaving your domain to be marked private. No Hetk admin login, no extra OAuth scope. See domain-verified privacy policy.
  • Data handling: Calendar data is encrypted in transit and at rest. See our privacy policy and security overview

Security questions? Reach out to [email protected].

Domain-verified privacy policy: a second layer

Admin consent decides whether anyone in your tenant can sign in to Hetk at all. It does not constrain what those users then choose to sync, or what details get written to the destination calendar. For organisations that want a second layer of control, Hetk reads a DNS TXT record at _hetk.<your-domain> and uses it to enforce a domain-wide policy on the data Hetk writes.

With v=hetk1; policy=private in place, every sync sourced from a @yourdomain user has its events written out as private: title becomes “Busy”, description, location, and attendees are cleared. The user’s per-sync privacy setting is overridden when policy says so. The mechanism is provider-agnostic — the same record covers Google Workspace and Microsoft 365 users at your domain.

The two layers compose:

  • Admin consent controls who can connect Hetk
  • Domain policy controls what Hetk is allowed to write once they are connected

The policy record is set the same place you set DMARC and SPF — no Hetk admin portal, no per-user dashboard, no extra OAuth scope. Setup and verification live at Hetk Policy Setup; the full schema, failure modes, and what users see is documented on the admin policy page.

Troubleshooting

Admin got an error when using the direct consent link.

Possible causes:

  1. Not signed in with an admin account (check that they’re using admin credentials, not a regular user account)
  2. Wrong tenant (if your company uses multiple Microsoft tenants)
  3. App already approved (check the Entra admin center to verify)
  4. Browser issue (try private/incognito mode or clear cookies)

Admin can’t find Hetk in Entra’s Enterprise applications list or the “Grant admin consent” button.

Possible causes:

  1. Hetk hasn’t been registered yet: The app only appears after someone signs in with their Microsoft account. Have a user attempt to sign in first (they’ll see the approval screen). This registers Hetk.
  2. Search issue: Try searching for just “Hetk” or the client ID (8dd90edb-c881-459a-ac84-2a1fee8c5c94)
  3. Insufficient permissions: The Permissions tab may be hidden if the admin doesn’t have Global Administrator or Application Administrator role

Have an admin with the right role sign in and try again. Contact Hetk support with your tenant ID if still stuck.

“Tenant policy blocks this app”

Approval went through but users see “Hetk is blocked by your organization’s policies.”

Possible causes:

  1. Conditional Access policy: Blocks certain apps or requires additional authentication
  2. Cloud App Security: Microsoft Defender for Cloud Apps may be blocking it
  3. Intune policy: Mobile device management may block Hetk on mobile

Admin should check:

  • Conditional Access policies in Entra (Identity > Conditional Access)
  • Defender for Cloud Apps policies
  • Intune app protection policies

Contact Hetk support with error details for specific guidance.

Frequently asked questions

No. Once approved, consent stays active unless:

  1. The admin explicitly revokes it (Entra admin center > Enterprise applications > Remove)
  2. The app is uninstalled from the tenant
  3. Your organization resets Entra policies

Approval is permanent until revoked. Users can connect without seeing the approval screen again.

Can the admin revoke access later?

Yes, the admin can revoke access anytime:

  1. Go to Entra admin center
  2. Navigate to Identity > Applications > Enterprise applications
  3. Search for Hetk Calendar Sync
  4. Click Permissions in the left sidebar
  5. Click Remove admin consent or Delete

After revocation:

  • Existing sync relationships continue working (they already have refresh tokens)
  • New users will see the approval screen again
  • Existing syncs gradually stop working as tokens expire (within weeks)

Is there a way for users to self-approve?

No. If your organization requires admin approval, users can’t bypass it. Microsoft designed this to prevent security breaches.

Users can:

  1. Contact IT and request approval
  2. Use a personal Microsoft account (if allowed)
  3. Wait for the admin to approve

Can I be selective about which users can use Hetk?

Admin consent is organization-wide. Once approved, all users can sign in. You can’t restrict it to specific users or departments with standard approval.

You can:

  1. Use Conditional Access policies to require additional authentication
  2. Block Hetk for specific departments using Defender for Cloud Apps
  3. Revoke approval entirely

Contact Hetk support for help with granular access controls.

Still stuck?

If you’re still seeing the approval screen or running into issues granting consent, reach out to [email protected].