Documentation Index
Fetch the complete documentation index at: https://nango.dev/docs/llms.txt
Use this file to discover all available pages before exploring further.
Create an integration
In Nango (free signup), go to Integrations -> Configure New Integration -> Microsoft Excel. Nango doesnât provide a test OAuth app for Microsoft Excel yet. Youâll need to set up your own by following these instructions. After that, make sure to add the OAuth client ID, secret, and scopes in the integration settings in Nango. Authorize Microsoft Excel
Go to Connections -> Add Test Connection -> Authorize, then log in to Microsoft Excel. Later, youâll let your users do the same directly from your app. Call the Microsoft Excel API
Letâs make your first request to the Microsoft Excel (Microsoft Graph) API (fetch worksheets from a specific workbook). Replace the placeholders below with your secret key, integration ID, connection ID, and a workbook file ID:curl "https://api.nango.dev/proxy/v1.0/me/drive/items/{fileId}/workbook/worksheets" \
-H "Authorization: Bearer <NANGO-SECRET-KEY>" \
-H "Provider-Config-Key: <INTEGRATION-ID>" \
-H "Connection-Id: <CONNECTION-ID>"
Install Nangoâs backend SDK with npm i @nangohq/node. Then run:import { Nango } from '@nangohq/node';
const nango = new Nango({ secretKey: '<NANGO-SECRET-KEY>' });
const res = await nango.get({
endpoint: '/v1.0/me/drive/items/{fileId}/workbook/worksheets',
providerConfigKey: '<INTEGRATION-ID>',
connectionId: '<CONNECTION-ID>'
});
console.log(res.data);
Or fetch credentials dynamically via the Node SDK or API.The {fileId} in the URL is the unique identifier for the Excel file in OneDrive/SharePoint. You can obtain this ID by first making a Nango proxy call to /v1.0/me/drive/root/children to list files and retrieve their IDs. Then, use the ID of the desired workbook to access its worksheets. â
Youâre connected! Check the Logs tab in Nango to inspect requests.Next step: Embed the auth flow in your app to let your users connect their Microsoft Excel accounts. Create a Microsoft account and Azure account
Register an application in Microsoft Entra ID
- Sign in to the Microsoft Entra admin center as at least an Application Developer.
- If you have access to multiple tenants, use the Settings icon in the top menu to switch to the tenant in which you want to register the application.
- From the search bar at the top of the Azure portal, search for App registrations and select it. Then choose New registration. Or from your left navigation tab, navigate to Applications > App registrations then choose New registration.
- Enter a meaningful name for your application, for example âNango Integrationâ.
- Under Supported account types you need to decide who can install your integration:
- Accounts in any organizational directory - Any user account in a professional Microsoft organization (Business, School, etc.)
- Accounts in any organizational directory and personal Microsoft accounts - The accounts from the first option, plus personal Microsoft accounts (pick this unless you want to restrict your integration to business accounts)
- Leave the Redirect URI section blank for now; weâll configure it in a later step.
- Click Register to complete the app registration.
Note your application (client) ID
After registration, youâll be taken to the applicationâs Overview page. Record the Application (client) ID, which uniquely identifies your application and is used in your applicationâs code as part of validating security tokens.
Add a redirect URI
- In the left sidebar, select Authentication.
- Under Platform configurations, select Add a platform.
- Select Web as the platform type.
- Enter
https://api.nango.dev/oauth/callback as the Redirect URI.
- Under Advanced settings, keep Allow public client flows set to the default No for web applications.
- Click Configure to save your changes.
Add API permissions
- In the left sidebar, select API permissions.
- Click Add a permission.
- Select Microsoft Graph to integrate with Microsoft Excel.
- Select the required permissions from the Delegated permissions section.
- Select the specific permissions your app requires. Please refer to the table below for some of the commonly used scopes.
- Click Add permissions.
- If your application requires admin consent, click Grant admin consent for [tenant] to pre-authorize the permissions.
Create a client secret
- In the left sidebar, select Certificates & secrets.
- Under Client secrets, click New client secret.
- Enter a description for the secret and select an expiration period (6 months, 12 months, 24 months, or custom). Please select a date further in the future to avoid interruptions, note that the Custom date can only be set to a maximum of 1 year from the current date. If the secret expires, you will need to regenerate a new one and update your integration within Nango.
- Click Add.
- Important: Copy the secret value immediately and store it securely. You wonât be able to see it again after you leave this page.
Configure token settings (optional)
- In the left sidebar, select Token configuration. Here you can configure optional claims to be included in the access tokens issued for your application.
- Click Add optional claim and select the claims you want to include in your access tokens.
Configure app visibility (optional)
If you want users to see your app on their My Apps page:
- From the search bar at the top of the Azure portal, search for Enterprise applications, select it, and then choose your app.
- On the Properties page, set Visible to users? to Yes.
Common Scopes
| Scope | Description |
|---|
offline_access | Access to refresh tokens for offline access |
Files.Read | Read user files and files shared with user |
Files.ReadWrite | Read and write user files and files shared with user |
Files.Read.All | Read all files that user can access |
Files.ReadWrite.All | Read and write all files that user can access |
- Make sure you request the
offline_access scope to get a refresh token and keep access with your integration.
- Microsoft offers a tool that allows you to construct and perform Graph API queries and see their response for any apps on which you have an admin, developer, or tester role. For more information you can check Microsoft Graph Explorer.
- Please be aware that the Microsoft Graph API implements throttling to manage the volume of requests. For more information on handling throttling, refer to the Microsoft Graph Throttling Guidance.
- Microsoft Graph API has different versions (v1.0 and beta). The v1.0 endpoint is for production use, while the beta endpoint contains features that are still in preview.
- When requesting permissions that require admin consent, users without admin privileges will not be able to complete the OAuth flow unless an admin has pre-authorized the permissions.
- For multitenant applications, you may need to handle tenant-specific endpoints and permissions.
- You can set the
.default scope documentation to ensure the permissions remain the same as those granted at the organization level.
- The
.default scope canât be combined with the scopes registered in the Azure portal. So either just use the .default scope or remove it to list out explicit parameters that are required. If you attempt to combine them youâll receive the following error
.default scope can't be combined with resource-specific scopes
- If you need a user to reauthenticate or accept updated scopes, you can force a prompt using the
authorization_params. Use prompt=login to force the user to enter their credentials (bypassing single-sign on) or prompt=consent to trigger the OAuth consent dialog after sign-in, which asks the user to grant permissions to the app. For more details, see Microsoftâs OAuth 2.0 authorization documentation.
const { data } = await nango.createConnectSession({
[...],
integrations_config_defaults: {
"<provider-name>": {
authorization_params: {
"prompt": "consent" // or "login" depending on your needs
}
}
}
});