Protected: About App Requests and Integrations

This content is password protected. To view it please enter your password below:

Frequently asked questions

App requests and integrations

Members of the University community can request third-party apps and add-ins from the University’s Microsoft 365 team. These requests are subject to a review process that involves:

  • Approval by the requester’s divisional IT administrators.
  • An evaluation by the Application Review Committee.
  • A risk assessment.

Microsoft apps that are part of existing Microsoft licenses such as Power Automate, Power Apps and Sways are granted on a by-request basis. Some Microsoft apps such as Power BI Pro, Project and Visio require that additional licensing be purchased through U of T Libraries: How to Purchase Software. 

University community members can request that third-party apps and add-ins that connect with their Microsoft 365 accounts be enabled. These requests will be subject to a review process.

If you are requesting one of the following applications, please purchase a license through the Library. There is no need to fill out this form:

  • Microsoft Power BI Pro
  • Microsoft Project
  • Microsoft Visio

Support for approved add-ins is provided by users’ local IT units.

Apps with indicated user restrictions can be enabled for specific user groups after going through an approval process. For more information, please submit a ticket to the Enterprise Service Centre. 

Two types of apps and add-ins can be implemented as part of the approval process:

    • Low-risk apps: Identified low-risk apps that do not access Microsoft 365 data are available for University-wide use. 
    • Higher risk apps: Apps that are higher risk and integrate with Microsoft 365 data can be enabled for specific user groups after going through a request and approval process. 

If you would like access to a higher risk app, please submit a request through the Enterprise Service Centre. 

FILL INFO

Applications developed by EASI do not currently require an information risk assessment (IRM) but do require a privacy impact assessment (PIA). These applications have an existing governance process and are outside the scope of the Application Review Committee.