# Microsoft 365 OAuth Configuration
# Create an Azure AD app registration and get these values:
# Your Azure AD App Registration Client ID
MS365_MCP_CLIENT_ID=your-azure-ad-app-client-id-here
# Your Azure AD App Registration Client Secret
MS365_MCP_CLIENT_SECRET=your-azure-ad-app-client-secret-here
# Tenant ID - use "common" for multi-tenant or your specific tenant ID
MS365_MCP_TENANT_ID=common
# Instructions:
# 1. Go to https://portal.azure.com
# 2. Navigate to Azure Active Directory → App registrations → New registration
# 3. Set name: "MS365 MCP Server"
# 4. Add these redirect URIs (for MCP Inspector testing):
# - http://localhost:6274/oauth/callback
# - http://localhost:6274/oauth/callback/debug
# - http://localhost:3000/callback (optional, for server callback)
# 5. Copy the Client ID from Overview page
# 6. Go to Certificates & secrets → New client secret → Copy the secret value
# 7. Replace the values above with your actual credentials
# 8. Rename this file to .env
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Softeria/ms-365-mcp-server'
If you have feedback or need assistance with the MCP directory API, please join our Discord server