Skip to main content

Hosted Online - Email configuration for Hosted Online

Set up email in the Payroll Online or Hosted environment

The information below is specific to customers configuring emails for MicrOpay in the Hosted Online environment. The configuration for on-premise or desktop customers will be different.

Your MicrOpay environment is hosted on The Access Group’s cloud infrastructure in Microsoft Azure. All outbound emails from MicrOpay — payslips, notifications, reports, and other communications — are sent through our centralised email relay.

Following are the available email configuration options, what is required for each, to help you choose the best approach for your organisation.

Why Email Configuration Matters

Since 2024, major email providers (Google, Microsoft, Yahoo) have enforced strict email authentication. Emails that fail SPF, DKIM, or DMARC checks are silently dropped — your payslip emails may never reach employees, and MicrOpay will not show an error.

Choosing the right email configuration ensures your payroll communications are delivered reliably.

MicrOpay in the Hosted Online environment supports four SMTP-based email configuration approaches, plus Microsoft Graph API integration for clients wanting fully branded email from their own domain. Detailed information about the different approaches is in Configuration options.


MicrOpay sends emails by

When MicrOpay sends an email (e.g., a pay advice):

Step

What Happens

1. MicrOpay generates the email

The application creates the email using the From address, Reply-To address, and SMTP settings configured in Access MicrOpay Evo Administration, System Configuration, System Wizard.

2. Email is sent to the relay

MicrOpay connects to our centralised mail relay (or your own SMTP server, if configured) and submits the email.

3. Relay delivers to the recipient

Our relay forwards the email to the recipient’s email provider (e.g., Gmail, Outlook).

4. Recipient’s provider checks authentication

The receiving server checks SPF, DKIM, and DMARC records to verify the email is legitimate.

5. Email is delivered or rejected

If authentication passes, the email reaches the inbox. If it fails, the email is silently dropped or sent to spam.

📌Note: The recipient’s email provider decides whether to accept or reject the email based on whether the From address domain matches the sending infrastructure’s authentication records.

Network and port restrictions

The hosted environment has network restrictions that affect which email configurations are possible. The following ports are available:

Port

Protocol

Availability in Hosted environment

Used by

25

SMTP (unencrypted)

Internal only — available for communication with our centralised relay within the hosted network. Blocked for all external destinations.

Options A, B, C

465

SMTPS (implicit TLS)

Blocked. This is a deprecated legacy port and is not available in the hosted environment.

Not available

587

SMTP Submission (STARTTLS)

Restricted — outbound connections on port 587 are only permitted to Microsoft 365 SMTP endpoints (smtp.office365.com). Connections to non-Microsoft SMTP servers (e.g., Gmail, Yahoo, or your own mail server) are blocked.

Option D (Microsoft 365 only)

443

HTTPS

Open — confirmed accessible to both graph.microsoft.com and login.microsoftonline.com.

Graph API

⚠️ Important: Option D is limited to Microsoft 365 SMTP only.

Port 587 is the only port available for external SMTP connections, and it is restricted to Microsoft 365 endpoints. If your organisation uses a non-Microsoft SMTP server (e.g., your own on-premise mail server, Gmail, or another third-party provider), MicrOpay will not be able to connect to it from the hosted environment.

If you require emails to be sent from your own domain, Microsoft Graph API is the recommended approach — port 443 is fully available and is not subject to the same restrictions as SMTP ports.


Email authentication

Three protocols work together to verify that an email is genuinely from who it claims to be:

Protocol

What it does

In plain english

SPF

Lists which servers are authorised to send email for a domain.

Is this server allowed to send email as @example.com?

DKIM

Adds a cryptographic signature that proves the email wasn’t tampered with.

Can we verify this email is authentic and unmodified?

DMARC

Tells receiving servers what to do when SPF or DKIM fails.

If the checks fail, should the recipient reject, quarantine, or allow the email?

⚠️ Important: Custom From addresses fail.

When MicrOpay sends an email with From: [email protected], the recipient’s email provider checks your domain’s SPF and DKIM records against our sending infrastructure. Unless you have explicitly configured your DNS to authorise our relay (Option C), these checks will fail. The recipient’s provider treats this as a spoofed email and silently discards it.

This is the same mechanism that protects you from phishing emails — it’s working as designed.


Configuration options

MicrOpay supports four SMTP-based email configuration approaches, plus Microsoft Graph API integration for clients wanting fully branded email from their own domain. We recommend Option A or B for most clients, and Graph API for clients who need emails to come from their own domain.

📌Note: If you are experiencing email delivery problems with a non-standard configuration (Options C, D, or any custom settings), our support team will always recommend switching to the standard configuration (Option A) as the first troubleshooting step. The standard configuration is fully managed and authenticated by us, eliminating the most common causes of delivery failure.

Once email delivery is confirmed as working with the standard configuration, we can then work with you to re-establish your preferred setup or explore Graph API as an alternative.

Option A — Standard configuration (recommended)

Use our default From address with our centralised relay. This is the simplest and most reliable.

MicrOpay settings

Value

From Address (SMTPFrom)

Reply-To Address (SMTPReplyTo)

Your preferred address (e.g., [email protected])

SMTP Server (SMTPServer)

Default (our centralised relay)

SMTP Port (SMTPPort)

25 (internal relay only — see Network and port restrictions)

SMTP Authentication

Disabled

This works because the From address uses a domain we control (cloud.micropay.com.au). We manage the SPF, DKIM, and DMARC records for this domain, ensuring all authentication checks pass at the recipient’s provider.

When recipients click Reply, their response goes to your Reply-To address — giving you the practical benefit of branded replies without breaking email authentication.

Setup required

None, as this is the default configuration. Contact support if your database is not already configured this way.

Option B — Client-identified from address

Use a per-client From address on a domain we control, giving you a unique sender identity while maintaining full authentication.

MicrOpay settings

Value

From Address (SMTPFrom)

[YourClientId]@cloud.micropay.com.au

Reply-To Address (SMTPReplyTo)

Your preferred address (e.g., [email protected])

SMTP Server (SMTPServer)

Default (our centralised relay)

SMTP Port (SMTPPort)

25 (internal relay only — see Network and port restrictions)

SMTP Authentication

Disabled

This gives your organisation a unique, identifiable From address (e.g., [email protected]) while still using a domain we fully authenticate. Useful for traceability, and if you want mail flow rules to filter by sender.

Setup Required

Contact support to request a client identifier to be configured. No DNS changes are required on your end.

Option C — Custom From address (your domain)

Use your own domain as the From address (e.g., [email protected]). This requires DNS changes on your domain to authorise our relay to send on your behalf.

🤓 Tip: Consider Graph API instead.

Option C requires DNS changes on your domain and ongoing maintenance of those records. If your goal is to send email from your own domain, we recommend Microsoft Graph API integration (see Microsoft Graph API) as the better path. Graph API sends email directly through your own Microsoft 365 tenant with full authentication alignment — no DNS changes to maintain, no relay dependencies, and complete delivery visibility through your own Microsoft 365 admin centre.

If you do not have Microsoft 365 or prefer to use our relay, Option C is available with the DNS configuration below.

If you proceed with this option, the following DNS changes are required on your domain:

DNS record

What to add

Purpose

SPF (TXT record)

Add our sending IP range to your existing SPF record using an include: or ip4: mechanism.

Authorises our relay to send emails as your domain.

DMARC (TXT record)

Review your DMARC policy to ensure it aligns with your SPF configuration. We can advise on appropriate settings during setup.

Controls how receiving servers handle emails that fail authentication checks.

Setup required

You (or your IT team / DNS provider) must update your domain’s DNS records. Contact support to obtain the specific IP addresses or include mechanism to add. You are responsible for maintaining these records if our infrastructure changes.

Your ongoing responsibilities

Maintain your SPF record, monitor your domain’s DMARC reports, and update records if notified of infrastructure changes.

Option D — Your own SMTP server (Microsoft 365 only)

Configure MicrOpay to send email through your own Microsoft 365 SMTP endpoint rather than our centralised relay.

⚠️ Important: This is not recommended as significant restrictions apply.

Due to network restrictions in the hosted environment, outbound SMTP connections on port 587 are only permitted to Microsoft 365 endpoints (smtp.office365.com). Connections to non-Microsoft SMTP servers are blocked. This means Option D is only available to clients with a Microsoft 365 subscription.

Microsoft Graph API is a significantly better option for Microsoft 365 — it provides the same branded email capability with none of the credential, firewall, or monitoring limitations of SMTP.

If you do not have Microsoft 365, Options A or B are the only viable configurations.

If you choose to proceed with Option D, the following requirements apply:

  • Microsoft 365 subscription with Exchange Online

  • SMTP AUTH must be enabled on the sending mailbox (disabled by default in Microsoft 365)

  • Port 587 with STARTTLS to smtp.office365.com (the only external SMTP endpoint reachable from the hosted environment)

  • Credentials that do not expire and do not require multi-factor authentication (MFA)

  • Basic authentication or app passwords are configured for the sending account

If you have Microsoft 365, use Graph API instead

Option D requires Microsoft 365 — but so does Graph API. If you already have Microsoft 365, Graph API gives you everything Option D provides plus full delivery visibility, no credential management, no SMTP AUTH dependency, and error reporting back to MicrOpay. There is no scenario where Option D is a better choice than Graph API for Microsoft 365 clients

Delivery Beyond Your SMTP Server

Successfully delivering the email from MicrOpay to smtp.office365.com is only the first step. Your Microsoft 365 tenant must then deliver the email onward to the recipient’s email provider. The recipient’s provider will check authentication (SPF, DKIM, DMARC) against your sending domain — the checks described in email authentication.

If your domain’s authentication records are not correctly configured in Microsoft 365, the recipient’s provider may silently reject the email even though Microsoft 365 accepted it from MicrOpay.

This means Option D has three potential failure points:

  1. MicrOpay connecting to smtp.office365.com.

  2. Microsoft 365 accepting and processing the email.

  3. The recipient’s provider accepting the email based on your domain’s authentication records.

We have no visibility to any of these stages.

What we provide

What we do not provide

Configure MicrOpay with your Microsoft 365 SMTP settings as requested.

Monitoring of your Microsoft 365 SMTP delivery or mailbox availability.

Confirm MicrOpay is submitting emails to smtp.office365.com.

Troubleshooting of your Microsoft 365 tenant, mailbox, or SMTP AUTH configuration.

Advise on MicrOpay-side SMTP settings.

Bounce tracking or delivery reports from your Microsoft 365 tenant.

Escalation path if MicrOpay itself is not generating emails.

SLA coverage for email delivery failures caused by your Microsoft 365 SMTP configuration.

Verification or troubleshooting of your domain’s SPF, DKIM, or DMARC configuration.

Setup required

Provide your M365 SMTP credentials (email address and app password or SMTP AUTH-enabled password) to support. You must ensure SMTP AUTH is enabled on the sending mailbox in your Microsoft 365 tenant. The SMTP endpoint is smtp.office365.com on port 587.

Your ongoing responsibilities

Maintain your Microsoft 365 mailbox, credentials (including rotation and MFA exclusions), and SMTP AUTH enablement. Ensure your domain’s SPF, DKIM, and DMARC records are correctly configured within your Microsoft 365 tenant. Monitor your own bounce reports and delivery logs through the Microsoft 365 admin centre.


Comparison of Options

A: Standard

B: Client-ID

C: Your Domain

D: Microsoft 365 SMTP

From address

[YourID]@cloud.micropay.com.au

Your choice (Microsoft 365 mailbox)

Port

25 (internal relay)

25 (internal relay)

25 (internal relay)

587 to smtp.office365.com only

Requires Microsoft 365

No

No

No

Yes

SPF

✅ Pass

✅ Pass

✅ Pass (if configured)

Your responsibility

DKIM

✅ Pass

✅ Pass

✅ Pass (with DNS configuration)

Your responsibility

DMARC

✅ Pass

✅ Pass

✅ Pass (with DNS configuration)

Your responsibility

Authentication managed by

The Access Group (both hops)

The Access Group (both hops)

Shared — we handle relay, you handle DNS

Entirely your organisation

Delivery chain

MicrOpay → our relay → recipient (we manage end-to-end)

MicrOpay → our relay → recipient (we manage end-to-end)

MicrOpay → our relay → recipient (relay managed by us, DNS by you)

MicrOpay → smtp.office365.com → recipient (you manage both hops)

Deliverability

Best

Best

Good (requires correct DNS setup)

Depends on your Microsoft 365 config and DNS

Setup effort

None

Minimal (support request)

DNS changes required

Significant (SMTP AUTH, credentials, MFA exclusions)

Ongoing maintenance

None

None

You maintain DNS records

You maintain credentials, SMTP AUTH, DNS, and delivery monitoring

SRE monitoring

✅ Full

✅ Full

✅ Relay side only

❌ None

SLA coverage

✅ Yes

✅ Yes

⚠️ Partial

❌ No


Configuration to avoid

Configuration

Problems caused

Setting the From address to your own domain without DNS changes (Option C prerequisites).

Our infrastructure is not authorised to send as your domain. All authentication checks fail and emails are silently dropped.

Using a free email address (Gmail, Hotmail, Yahoo) as the From address.

These providers publish strict DMARC reject policies. Any email sent from a non-Gmail/Hotmail server with their domain in the From address is guaranteed to be rejected.

Enabling SMTP authentication against our relay.

Our centralised relay does not require authentication. Enabling it in MicrOpay causes 535 authentication errors and all emails will fail to send.

Using SMTP credentials that expire or require MFA (Option D).

Credential-based failures are invisible to MicrOpay users. Emails stop sending with no notification.

Configuring an external SMTP server on port 25.

Port 25 is blocked for all external destinations. Only internal relay traffic to mail.hostedmicropay.local is permitted on port 25.

Using a non-Microsoft SMTP server for Option D.

Port 587 is only open to Microsoft 365 endpoints (smtp.office365.com). Connections to Gmail, Yahoo, or any other SMTP provider are blocked at the network level and will fail silently.

Using port 80 or other non-SMTP ports for email.

Port 80 is HTTP, not SMTP. MicrOpay will attempt an SMTP handshake against a non-SMTP service and fail silently. Emails will never be sent.

Using port 465 (legacy SMTPS).

Port 465 is blocked in the hosted environment. Use port 587 with STARTTLS to smtp.office365.com, or use Graph API on port 443.


Microsoft Graph API - Recommended for branded email

If your organisation wants emails to come from your own domain (e.g., [email protected]) with full authentication and complete delivery visibility, Microsoft Graph API integration is recommended.

Unlike Options C and D, which require DNS changes or your own SMTP server and still leave gaps in visibility or ongoing maintenance, Graph API sends email directly through your own Microsoft 365 tenant. This means your organisation’s existing email infrastructure handles the sending — the same infrastructure that sends your regular business email.

Why Graph API Is the Best Path for Branded Email

  • Full authentication: Emails are sent from your Microsoft 365 tenant, so SPF, DKIM, and DMARC all align with your domain automatically. No DNS changes, no SPF record maintenance, no relay dependencies.

  • Complete visibility: Delivery tracking, bounce reports, and message traces are available through your own Microsoft 365 admin centre — the same tools your IT team already uses for business email.

  • No credentials to manage: Authentication uses Azure AD application tokens with automatic refresh. No passwords that expire, no MFA complications, no shared credentials.

  • No firewall or network dependencies: Graph API uses HTTPS (port 443), which is confirmed open to both graph.microsoft.com and login.microsoftonline.com from the hosted environment. Unlike SMTP ports, there are no restrictions on which endpoints can be reached.

  • Your IT team retains full control: The sending identity, mailbox, and application permissions are all managed within your own Azure AD tenant.

  • No ongoing maintenance: Once configured, it simply works. No DNS records to update if our infrastructure changes, no credentials to rotate.

How It Works

Your IT team registers an application in your organisation’s Azure Active Directory (Entra ID) tenant and provides three values to us to configure in your MicrOpay database:

  • Tenant ID — identifies your Microsoft 365 tenant.

  • Client ID — identifies the registered application.

  • Client Secret — the application credential (rotated on your schedule).

MicrOpay then sends email directly through the Microsoft Graph API using your tenant’s identity. The email originates from your Microsoft 365 environment, so it is indistinguishable from any other email your organisation sends.

Requirements

  • Microsoft 365 subscription with Exchange Online

  • Azure AD (Entra ID) App Registration with Mail.Send application permission

  • Admin consent granted for the application

  • A shared mailbox or user mailbox to send from (no additional licence required for shared mailboxes)

Graph API vs Other Options for Branded Email

Option C (your domain via our relay)

Option D (Microsoft 365 SMTP)

Graph API (Recommended)

Authentication

You maintain SPF/DKIM DNS records

You maintain Microsoft 365 SMTP AUTH and DNS

Automatic — your Microsoft 365 tenant handles it

Delivery Visibility

We see relay side only

No visibility for either party

Full — your Microsoft 365 admin centre

Ongoing Maintenance

DNS record updates if our infra changes

Credentials, SMTP AUTH, MFA exclusions, DNS

None — set and forget

Failure Mode

Silent if DNS is misconfigured

Silent at multiple stages

Errors reported back to MicrOpay

Network Dependencies

Our relay must reach recipient

Port 587 to smtp.office365.com only

HTTPS only (port 443 — confirmed open)

Requires Microsoft 365

No

Yes

Yes

Getting started

Contact your Account Manager or The Access Group support team to enable Graph API email integration for your MicrOpay environment. We will provide a step-by-step setup guide for your IT team. Most organisations complete the setup within a single change window.


Frequently asked questions

Why are my email pay advice not being received?

The most common cause is a custom From address that fails email authentication. If your From address uses your own domain but the required DNS records are not correctly configured, receiving servers will silently discard the email. If you are experiencing delivery issues, support will recommend switching to the standard configuration (Option A) as the first step to restore email delivery.

Can I use my company’s email address as the From address?

Yes. The recommended approach is Microsoft Graph API integration, which sends email directly through your own Microsoft 365 tenant with full authentication and delivery visibility. If you don’t have Microsoft 365, Option C allows you to use your domain via our relay with DNS changes. Option B gives you a unique sender identity without any DNS configuration.

Will recipients see the Reply-To address when they receive the email?

Most email clients display the From address in the inbox view, but when a recipient clicks Reply, the response is addressed to the Reply-To address. This means replies go to your team even though the From address shows our domain.

What happens if I configure my own SMTP server and it goes down?

Only Option D supports connections to Microsoft 365 (smtp.office365.com on port 587). Non-Microsoft SMTP servers cannot be reached from the hosted environment. If your Microsoft 365 SMTP connection fails — due to credential expiry, SMTP AUTH being disabled, or MFA enforcement — MicrOpay will fail silently with no error displayed. If you report email issues while using Option D, support will recommend switching to the standard configuration to confirm MicrOpay is generating emails correctly.

Do you monitor email deliverability?

Yes. For Options A, B, and the relay side of Option C, our infrastructure team monitors sending IP reputation, blocklist status, and authentication pass rates. For Option D (your own SMTP server), we have no visibility and cannot monitor delivery.

I’m using a @gmail.com or @hotmail.com From address and emails aren’t arriving.

This is expected. Google and Microsoft publish strict DMARC policies (p=reject) that instruct all receiving servers to reject emails from unauthorised sources. Our relay is not authorised to send as gmail.com or hotmail.com. These domains cannot be used as From addresses regardless of your configuration. Change your From address to Option A or B to restore delivery.

What will support do if my non-standard email configuration isn’t working?

Support will always recommend reverting to the standard configuration (Option A) as the first troubleshooting step. This confirms that MicrOpay is generating and sending emails correctly through our authenticated relay. Once delivery is confirmed working on standard settings, we can work with you to re-establish your preferred configuration or explore Graph API as an alternative that avoids the common pitfalls of Options C and D.

How do I request a change to my email configuration?

Contact The Access Group support team with your preferred option and the relevant details. For Option B, provide your preferred client identifier. For Option C, our team will provide the DNS records you need to add. For Option D, provide your Microsoft 365 SMTP credentials (only Microsoft 365 SMTP is supported). For Graph API, let us know you’d like to enable it and we’ll provide the setup guide for your IT team.

Did this answer your question?