Skip to main content
Coming soon — GDAP-based onboarding is not yet available. This page describes how it will work once released.
GDAP (Granular Delegated Admin Privileges) lets MSPs consent to the Neo app across customer tenants centrally, without requiring an admin in each customer tenant to complete the consent flow manually.
With GDAP, you consent to the Neo app on behalf of your customers — no admin action needed in each tenant. Once connected, the tenant works exactly the same as Direct Consent.

How it works

  1. Your MSP has an existing GDAP relationship with a customer tenant, including roles like Cloud Application Administrator (required to consent apps)
  2. In the Neo Dashboard, you configure which permission categories Neo should request (e.g., User Management, Security, Email) — see M365 Permissions
  3. You use your GDAP access to consent the Neo app in the customer tenant — no customer admin involvement needed
  4. Neo grants only the permissions matching your selected categories — nothing more

Prerequisites

Before connecting customer tenants via GDAP, ensure:
  1. You have active GDAP relationships with your customer tenants in Partner Center. If you don’t have GDAP set up yet, follow Microsoft’s GDAP guide first.
  2. Your GDAP relationships include the right roles — you need at least Cloud Application Administrator to consent apps on behalf of customers, plus the operational roles for Neo’s actions.
  3. You have admin access to your MSP’s partner tenant (the Entra ID tenant enrolled in CSP).

Your GDAP relationships should include these roles depending on what you want Neo to automate:
RoleRequired for
Cloud Application AdministratorConsenting the Neo app in customer tenants (required for GDAP onboarding)
User AdministratorCreate, update, delete users; reset passwords; manage group membership
Exchange AdministratorShared mailboxes, email forwarding, mailbox delegation, distribution lists
License AdministratorAssign and remove Microsoft 365 licenses
Groups AdministratorManage security groups and Microsoft 365 groups
Intune AdministratorManage devices, deploy apps, retrieve BitLocker keys
Privileged Role AdministratorAdd new permission categories to already-connected tenants without re-consent
Privileged Authentication AdministratorReset MFA, revoke sessions for admin accounts
Conditional Access AdministratorManage conditional access policies
At minimum, include Cloud Application Administrator, User Administrator, and Exchange Administrator — these cover the consent step plus the most common MSP automation scenarios.

Connecting customer tenants via GDAP

1

Go to End Companies in the Neo Dashboard

Navigate to https://dashboard.neoagent.io/end-companies and select a company, or create a new one.
2

Connect via GDAP

Click the GDAP connect option. Neo will consent only the permissions matching your M365 permission profile — no action needed from the customer’s admin.
3

Verify

Once connected, Neo shows which permission categories are active for the tenant. You can override the defaults per-tenant if needed.

GDAPDirect Consent
Who consentsMSP admin, using GDAP access — no customer involvementA tenant admin in each customer tenant
CSP enrollment requiredYesNo
Adding permissions laterAutomatic — no customer action neededCustomer admin must re-approve
Best forMSPs managing many tenants — onboard customers without waiting for their adminIndividual tenants, or non-CSP scenarios

Troubleshooting

GDAP relationships have a maximum duration of 730 days. When a relationship expires, create a new one in Partner Center with the same roles, then re-consent via the Neo Dashboard.