...
Login to the Azure Portal and select "Azure Active Directory".
Make a note of your Tenant Id and click "App Registrations" on the left.
Click "New registration".
Give the registration a name (this is for your own information only, something like "InTimeMailClient"), choose "Accounts in this organisational directory only" and in the Redirect URI box, select "Web" and add the following redirect URI: https://<your-intime-domain-here>/oauth2Client/callback/Email-Client
Click Save. Make a note of the Application (client) ID and the Directory (tenant) ID (should be the same as noted earlier).
Click "Certificates and secrets" on the left, click "New client secret", enter the descriptive name for this secret and set it to expire in an appropriate period. Click "Add". Note, when the secret expires, you'll have to create a new one and update the RSM InTime configuration.
Make a note of the the value in the Value field. This will not be displayed again.
Click "API permissions" on the left. Click "Add a permission" and click "Microsoft Graph"
Then click Delegated Permissions
You''ll then need to add the permissions noted below. They will likely be found in "Delegated Permissions" in the Graph API.following permissions sets.
IMAP.AccessAsUser.All
Mail.Read
offline_access
User.Read
You should then have the following permissions setup;
Log in to RSM InTime in an incognito window, go to Settings → Email Server Settings and enter the details shown below, replacing the email address/username with the email address/username of the mailbox you would like RSM InTime to monitor. Click Save, followed by OAuth 2.0 Settings.
You should be on the Integrations page. Click "New".
...