A fully managed platform in Microsoft Foundry for hosting, scaling, and securing AI agents built with any supported framework or model
OAuth identity passthrough (OBO) for MCP tools is only supported when invoking agents via the Responses protocol with OAuth identity passthrough configured on the MCP server connection. When an agent is published as an Agent Application to Microsoft 365 Copilot or Teams, it uses the Activity Protocol through Azure Bot Service with Channels authentication, not the Responses protocol with OAuth passthrough.
In this published M365/Teams scenario, the inbound authentication to the Agent Application is handled by Bot Service channels, and the documentation only describes two options for application invocation:
- Default (RBAC) – for direct invocation via the Responses protocol using Azure RBAC.
- Channels (Azure Bot Service) – automatically selected when publishing to M365/Teams.
There is no documented support for forwarding the end-user’s OAuth token (OBO) from M365 Copilot/Teams through the Activity Protocol into the MCP server. As a result, MCP tools invoked from a published agent in M365/Teams will not receive per-user OAuth tokens and instead operate under the application/agent identity (for example, project or agent managed identity), which matches the behavior described in the question.
The available documentation in the provided context does not expose:
- Any mechanism to enable OAuth identity passthrough for agents published to Microsoft 365 Copilot via Activity Protocol.
- Any roadmap commitment or preview feature to support per-user identity propagation (OBO) from M365 Copilot/Teams to MCP servers.
- Any M365-Copilot-specific page that documents this limitation separately from the general MCP or Teams guidance.
Given the constraints in the context, the only supported patterns are:
- Use Responses protocol + OAuth identity passthrough for scenarios that require per-user OAuth tokens to MCP servers (for example, when calling the agent via the OpenAI-compatible
/responsesendpoint and not via M365/Teams). - Use Channels (Azure Bot Service) when publishing to M365/Teams, accepting that per-user OAuth tokens are not forwarded to MCP tools and that the agent identity (application/managed identity) is what downstream services see.
No documented workaround in the context enables full per-user OBO propagation from M365 Copilot to MCP servers today. Any per-user authorization would need to be implemented using what the downstream service can infer from the agent/application identity and its own internal logic, rather than from a user OAuth token forwarded by Copilot.
References: