Role Based Access Control for Applications in Exchange Online RBAC for Applications in Exchange Online allows admins to grant permissions to an application that's independently accessing data in Exchange Online This grant can be paired with a scope of access (resource scope) to specify which mailboxes an app can access
Permissions in Exchange Online | Microsoft Learn Exchange Online in Microsoft 365 and Office 365 includes a large set of predefined permissions, based on the Role Based Access Control (RBAC) permissions model, which you can use right away to easily grant permissions to your admins and users
Role assignment policies in Exchange Online | Microsoft Learn End-users roles are part of the role based access control (RBAC) permissions model in Exchange Online You can assign different role assignment policies to different users to allow or prevent specific self-management features in Exchange Online
Limiting application permissions to specific Exchange Online mailboxes . . . In the delegated model, the effective permissions are the cross-section of the user permissions and the permissions granted to the app, they are not affected by the application access policy To restrict access for delegate scenarios, use the built-in RBAC controls in Exchange Online
RBAC for Applications in Exchange Online. - Microsoft Q A With the RBAC for application in exchange online coming to EOL this February I have been tasked with finding the apps that are using it and either re-creating them or changing the permissions to the relevant Microsoft graph permissions
Find the permissions required to run any Exchange cmdlet This procedure shows the role-based access control (RBAC) management roles and role groups that give you access to a specified cmdlet—even if your organization has custom roles, custom role groups, or custom role assignments
Permissions in Exchange hybrid deployments | Microsoft Learn The Exchange Online in Microsoft 365 or Office 365 organization is based on Exchange Server and, like on-premises organizations, it also uses Role Based Access Control (RBAC) to control permissions