docs/channels/msteams.md
Status: text + DM attachments are supported; channel/group file sending requires sharePointSiteId + Graph permissions (see Sending files in group chats). Polls are sent via Adaptive Cards. Message actions expose explicit upload-file for file-first sends.
Microsoft Teams ships as a bundled plugin in current OpenClaw releases, so no separate install is required in the normal packaged build.
If you are on an older build or a custom install that excludes bundled Teams, install the npm package directly:
openclaw plugins install @openclaw/msteams
Use the bare package to follow the current official release tag. Pin an exact version only when you need a reproducible install.
Local checkout (when running from a git repo):
openclaw plugins install ./path/to/local/msteams-plugin
Details: Plugins
The @microsoft/teams.cli handles bot registration, manifest creation, and credential generation in a single command.
1. Install and log in
npm install -g @microsoft/teams.cli@preview
teams login
teams status # verify you're logged in and see your tenant info
2. Start a tunnel (Teams can't reach localhost)
Install and authenticate the devtunnel CLI if you haven't already (getting started guide).
# One-time setup (persistent URL across sessions):
devtunnel create my-openclaw-bot --allow-anonymous
devtunnel port create my-openclaw-bot -p 3978 --protocol auto
# Each dev session:
devtunnel host my-openclaw-bot
# Your endpoint: https://<tunnel-id>.devtunnels.ms/api/messages
Alternatives: ngrok http 3978 or tailscale funnel 3978 (but these may change URLs each session).
3. Create the app
teams app create \
--name "OpenClaw" \
--endpoint "https://<your-tunnel-url>/api/messages"
This single command:
The output will show CLIENT_ID, CLIENT_SECRET, TENANT_ID, and a Teams App ID — note these for the next steps. It also offers to install the app in Teams directly.
4. Configure OpenClaw using the credentials from the output:
{
channels: {
msteams: {
enabled: true,
appId: "<CLIENT_ID>",
appPassword: "<CLIENT_SECRET>",
tenantId: "<TENANT_ID>",
webhook: { port: 3978, path: "/api/messages" },
},
},
}
Or use environment variables directly: MSTEAMS_APP_ID, MSTEAMS_APP_PASSWORD, MSTEAMS_TENANT_ID.
5. Install the app in Teams
teams app create will prompt you to install the app — select "Install in Teams". If you skipped it, you can get the link later:
teams app get <teamsAppId> --install-link
6. Verify everything works
teams app doctor <teamsAppId>
This runs diagnostics across bot registration, AAD app config, manifest validity, and SSO setup.
For production deployments, consider using federated authentication (certificate or managed identity) instead of client secrets.
<Note> Group chats are blocked by default (`channels.msteams.groupPolicy: "allowlist"`). To allow group replies, set `channels.msteams.groupAllowFrom`, or use `groupPolicy: "open"` to allow any member (mention-gated). </Note>By default, Microsoft Teams is allowed to write config updates triggered by /config set|unset (requires commands.config: true).
Disable with:
{
channels: { msteams: { configWrites: false } },
}
DM access
channels.msteams.dmPolicy = "pairing". Unknown senders are ignored until approved.channels.msteams.allowFrom should use stable AAD object IDs.channels.msteams.dangerouslyAllowNameMatching: true.Group access
channels.msteams.groupPolicy = "allowlist" (blocked unless you add groupAllowFrom). Use channels.defaults.groupPolicy to override the default when unset.channels.msteams.groupAllowFrom controls which senders can trigger in group chats/channels (falls back to channels.msteams.allowFrom).groupPolicy: "open" to allow any member (still mention‑gated by default).channels.msteams.groupPolicy: "disabled".Example:
{
channels: {
msteams: {
groupPolicy: "allowlist",
groupAllowFrom: ["[email protected]"],
},
},
}
Teams + channel allowlist
channels.msteams.teams.groupPolicy="allowlist" and a teams allowlist is present, only listed teams/channels are accepted (mention‑gated).Team/Channel entries and stores them for you.channels.msteams.dangerouslyAllowNameMatching: true is enabled.Example:
{
channels: {
msteams: {
groupPolicy: "allowlist",
teams: {
"My Team": {
channels: {
General: { requireMention: true },
},
},
},
},
},
}
If you can't use the Teams CLI, you can set up the bot manually through the Azure Portal.
msteams in ~/.openclaw/openclaw.json (or env vars) and start the gateway./api/messages by default.Go to Create Azure Bot
Fill in the Basics tab:
| Field | Value |
|---|---|
| Bot handle | Your bot name, e.g., openclaw-msteams (must be unique) |
| Subscription | Select your Azure subscription |
| Resource group | Create new or use existing |
| Pricing tier | Free for dev/testing |
| Type of App | Single Tenant (recommended - see note below) |
| Creation type | Create new Microsoft App ID |
appIdappPasswordtenantIdhttps://your-domain.com/api/messagesbot entry with botId = <App ID>.personal, team, groupChat.supportsFiles: true (required for personal scope file handling).outline.png (32x32) and color.png (192x192).manifest.json, outline.png, color.png.{
channels: {
msteams: {
enabled: true,
appId: "<APP_ID>",
appPassword: "<APP_PASSWORD>",
tenantId: "<TENANT_ID>",
webhook: { port: 3978, path: "/api/messages" },
},
},
}
Environment variables: MSTEAMS_APP_ID, MSTEAMS_APP_PASSWORD, MSTEAMS_TENANT_ID.
The Teams channel starts automatically when the plugin is available and msteams config exists with credentials.
Added in 2026.4.11
For production deployments, OpenClaw supports federated authentication as a more secure alternative to client secrets. Two methods are available:
Use a PEM certificate registered with your Entra ID app registration.
Setup:
Config:
{
channels: {
msteams: {
enabled: true,
appId: "<APP_ID>",
tenantId: "<TENANT_ID>",
authType: "federated",
certificatePath: "/path/to/cert.pem",
webhook: { port: 3978, path: "/api/messages" },
},
},
}
Env vars:
MSTEAMS_AUTH_TYPE=federatedMSTEAMS_CERTIFICATE_PATH=/path/to/cert.pemUse Azure Managed Identity for passwordless authentication. This is ideal for deployments on Azure infrastructure (AKS, App Service, Azure VMs) where a managed identity is available.
How it works:
@azure/identity to acquire tokens from the Azure IMDS endpoint (169.254.169.254).Prerequisites:
169.254.169.254:80) from the pod/VMConfig (system-assigned managed identity):
{
channels: {
msteams: {
enabled: true,
appId: "<APP_ID>",
tenantId: "<TENANT_ID>",
authType: "federated",
useManagedIdentity: true,
webhook: { port: 3978, path: "/api/messages" },
},
},
}
Config (user-assigned managed identity):
{
channels: {
msteams: {
enabled: true,
appId: "<APP_ID>",
tenantId: "<TENANT_ID>",
authType: "federated",
useManagedIdentity: true,
managedIdentityClientId: "<MI_CLIENT_ID>",
webhook: { port: 3978, path: "/api/messages" },
},
},
}
Env vars:
MSTEAMS_AUTH_TYPE=federatedMSTEAMS_USE_MANAGED_IDENTITY=trueMSTEAMS_MANAGED_IDENTITY_CLIENT_ID=<client-id> (only for user-assigned)For AKS deployments using workload identity:
Enable workload identity on your AKS cluster.
Create a federated identity credential on the Entra ID app registration:
az ad app federated-credential create --id <APP_OBJECT_ID> --parameters '{
"name": "my-bot-workload-identity",
"issuer": "<AKS_OIDC_ISSUER_URL>",
"subject": "system:serviceaccount:<NAMESPACE>:<SERVICE_ACCOUNT>",
"audiences": ["api://AzureADTokenExchange"]
}'
Annotate the Kubernetes service account with the app client ID:
apiVersion: v1
kind: ServiceAccount
metadata:
name: my-bot-sa
annotations:
azure.workload.identity/client-id: "<APP_CLIENT_ID>"
Label the pod for workload identity injection:
metadata:
labels:
azure.workload.identity/use: "true"
Ensure network access to IMDS (169.254.169.254) — if using NetworkPolicy, add an egress rule allowing traffic to 169.254.169.254/32 on port 80.
| Method | Config | Pros | Cons |
|---|---|---|---|
| Client secret | appPassword | Simple setup | Secret rotation required, less secure |
| Certificate | authType: "federated" + certificatePath | No shared secret over network | Certificate management overhead |
| Managed Identity | authType: "federated" + useManagedIdentity | Passwordless, no secrets to manage | Azure infrastructure required |
Default behavior: When authType is not set, OpenClaw defaults to client secret authentication. Existing configurations continue to work without changes.
Teams can't reach localhost. Use a persistent dev tunnel so your URL stays the same across sessions:
# One-time setup:
devtunnel create my-openclaw-bot --allow-anonymous
devtunnel port create my-openclaw-bot -p 3978 --protocol auto
# Each dev session:
devtunnel host my-openclaw-bot
Alternatives: ngrok http 3978 or tailscale funnel 3978 (URLs may change each session).
If your tunnel URL changes, update the endpoint:
teams app update <teamsAppId> --endpoint "https://<new-url>/api/messages"
Run diagnostics:
teams app doctor <teamsAppId>
Checks bot registration, AAD app, manifest, and SSO configuration in one pass.
Send a test message:
teams app get <id> --install-link)All config keys can be set via environment variables instead:
MSTEAMS_APP_IDMSTEAMS_APP_PASSWORDMSTEAMS_TENANT_IDMSTEAMS_AUTH_TYPE (optional: "secret" or "federated")MSTEAMS_CERTIFICATE_PATH (federated + certificate)MSTEAMS_CERTIFICATE_THUMBPRINT (optional, not required for auth)MSTEAMS_USE_MANAGED_IDENTITY (federated + managed identity)MSTEAMS_MANAGED_IDENTITY_CLIENT_ID (user-assigned MI only)OpenClaw exposes a Graph-backed member-info action for Microsoft Teams so agents and automations can resolve channel member details (display name, email, role) directly from Microsoft Graph.
Requirements:
Member.Read.Group RSC permission (already in the recommended manifest)User.Read.All Graph Application permission with admin consentThe action is gated by channels.msteams.actions.memberInfo (default: enabled when Graph credentials are available).
channels.msteams.historyLimit controls how many recent channel/group messages are wrapped into the prompt.messages.groupChat.historyLimit. Set 0 to disable (default 50).allowFrom / groupAllowFrom), so thread context seeding only includes messages from allowed senders.ReplyTo* derived from Teams reply HTML) is currently passed as received.channels.msteams.dmHistoryLimit (user turns). Per-user overrides: channels.msteams.dms["<user_id>"].historyLimit.These are the existing resourceSpecific permissions in our Teams app manifest. They only apply inside the team/chat where the app is installed.
For channels (team scope):
ChannelMessage.Read.Group (Application) - receive all channel messages without @mentionChannelMessage.Send.Group (Application)Member.Read.Group (Application)Owner.Read.Group (Application)ChannelSettings.Read.Group (Application)TeamMember.Read.Group (Application)TeamSettings.Read.Group (Application)For group chats:
ChatMessage.Read.Chat (Application) - receive all group chat messages without @mentionTo add RSC permissions via the Teams CLI:
teams app rsc add <teamsAppId> ChannelMessage.Read.Group --type Application
Minimal, valid example with the required fields. Replace IDs and URLs.
{
$schema: "https://developer.microsoft.com/en-us/json-schemas/teams/v1.23/MicrosoftTeams.schema.json",
manifestVersion: "1.23",
version: "1.0.0",
id: "00000000-0000-0000-0000-000000000000",
name: { short: "OpenClaw" },
developer: {
name: "Your Org",
websiteUrl: "https://example.com",
privacyUrl: "https://example.com/privacy",
termsOfUseUrl: "https://example.com/terms",
},
description: { short: "OpenClaw in Teams", full: "OpenClaw in Teams" },
icons: { outline: "outline.png", color: "color.png" },
accentColor: "#5B6DEF",
bots: [
{
botId: "11111111-1111-1111-1111-111111111111",
scopes: ["personal", "team", "groupChat"],
isNotificationOnly: false,
supportsCalling: false,
supportsVideo: false,
supportsFiles: true,
},
],
webApplicationInfo: {
id: "11111111-1111-1111-1111-111111111111",
},
authorization: {
permissions: {
resourceSpecific: [
{ name: "ChannelMessage.Read.Group", type: "Application" },
{ name: "ChannelMessage.Send.Group", type: "Application" },
{ name: "Member.Read.Group", type: "Application" },
{ name: "Owner.Read.Group", type: "Application" },
{ name: "ChannelSettings.Read.Group", type: "Application" },
{ name: "TeamMember.Read.Group", type: "Application" },
{ name: "TeamSettings.Read.Group", type: "Application" },
{ name: "ChatMessage.Read.Chat", type: "Application" },
],
},
},
}
bots[].botId must match the Azure Bot App ID.webApplicationInfo.id must match the Azure Bot App ID.bots[].scopes must include the surfaces you plan to use (personal, team, groupChat).bots[].supportsFiles: true is required for file handling in personal scope.authorization.permissions.resourceSpecific must include channel read/send if you want channel traffic.To update an already-installed Teams app (e.g., to add RSC permissions):
# Download, edit, and re-upload the manifest
teams app manifest download <teamsAppId> manifest.json
# Edit manifest.json locally...
teams app manifest upload manifest.json <teamsAppId>
# Version is auto-bumped if content changed
After updating, reinstall the app in each team for new permissions to take effect, and fully quit and relaunch Teams (not just close the window) to clear cached app metadata.
<details> <summary>Manual manifest update (without CLI)</summary>manifest.json with the new settingsversion field (e.g., 1.0.0 → 1.1.0)manifest.json, outline.png, color.png)Works:
Does NOT work:
Adds:
| Capability | RSC Permissions | Graph API |
|---|---|---|
| Real-time messages | Yes (via webhook) | No (polling only) |
| Historical messages | No | Yes (can query history) |
| Setup complexity | App manifest only | Requires admin consent + token flow |
| Works offline | No (must be running) | Yes (query anytime) |
Bottom line: RSC is for real-time listening; Graph API is for historical access. For catching up on missed messages while offline, you need Graph API with ChannelMessage.Read.All (requires admin consent).
If you need images/files in channels or want to fetch message history, you must enable Microsoft Graph permissions and grant admin consent.
ChannelMessage.Read.All (channel attachments + history)Chat.Read.All or ChatMessage.Read.All (group chats)Additional permission for user mentions: User @mentions work out of the box for users in the conversation. However, if you want to dynamically search and mention users who are not in the current conversation, add User.Read.All (Application) permission and grant admin consent.
Teams delivers messages via HTTP webhook. If processing takes too long (e.g., slow LLM responses), you may see:
OpenClaw handles this by returning quickly and sending replies proactively, but very slow responses may still cause issues.
Teams markdown is more limited than Slack or Discord:
code, linksKey settings (see /gateway/configuration for shared channel patterns):
channels.msteams.enabled: enable/disable the channel.channels.msteams.appId, channels.msteams.appPassword, channels.msteams.tenantId: bot credentials.channels.msteams.webhook.port (default 3978)channels.msteams.webhook.path (default /api/messages)channels.msteams.dmPolicy: pairing | allowlist | open | disabled (default: pairing)channels.msteams.allowFrom: DM allowlist (AAD object IDs recommended). The wizard resolves names to IDs during setup when Graph access is available.channels.msteams.dangerouslyAllowNameMatching: break-glass toggle to re-enable mutable UPN/display-name matching and direct team/channel name routing.channels.msteams.textChunkLimit: outbound text chunk size.channels.msteams.chunkMode: length (default) or newline to split on blank lines (paragraph boundaries) before length chunking.channels.msteams.mediaAllowHosts: allowlist for inbound attachment hosts (defaults to Microsoft/Teams domains).channels.msteams.mediaAuthAllowHosts: allowlist for attaching Authorization headers on media retries (defaults to Graph + Bot Framework hosts).channels.msteams.requireMention: require @mention in channels/groups (default true).channels.msteams.replyStyle: thread | top-level (see Reply Style).channels.msteams.teams.<teamId>.replyStyle: per-team override.channels.msteams.teams.<teamId>.requireMention: per-team override.channels.msteams.teams.<teamId>.tools: default per-team tool policy overrides (allow/deny/alsoAllow) used when a channel override is missing.channels.msteams.teams.<teamId>.toolsBySender: default per-team per-sender tool policy overrides ("*" wildcard supported).channels.msteams.teams.<teamId>.channels.<conversationId>.replyStyle: per-channel override.channels.msteams.teams.<teamId>.channels.<conversationId>.requireMention: per-channel override.channels.msteams.teams.<teamId>.channels.<conversationId>.tools: per-channel tool policy overrides (allow/deny/alsoAllow).channels.msteams.teams.<teamId>.channels.<conversationId>.toolsBySender: per-channel per-sender tool policy overrides ("*" wildcard supported).toolsBySender keys should use explicit prefixes:
id:, e164:, username:, name: (legacy unprefixed keys still map to id: only).channels.msteams.actions.memberInfo: enable or disable the Graph-backed member info action (default: enabled when Graph credentials are available).channels.msteams.authType: authentication type — "secret" (default) or "federated".channels.msteams.certificatePath: path to PEM certificate file (federated + certificate auth).channels.msteams.certificateThumbprint: certificate thumbprint (optional, not required for auth).channels.msteams.useManagedIdentity: enable managed identity auth (federated mode).channels.msteams.managedIdentityClientId: client ID for user-assigned managed identity.channels.msteams.sharePointSiteId: SharePoint site ID for file uploads in group chats/channels (see Sending files in group chats).agent:<agentId>:<mainKey>).agent:<agentId>:msteams:channel:<conversationId>agent:<agentId>:msteams:group:<conversationId>Teams recently introduced two channel UI styles over the same underlying data model:
| Style | Description | Recommended replyStyle |
|---|---|---|
| Posts (classic) | Messages appear as cards with threaded replies underneath | thread (default) |
| Threads (Slack-like) | Messages flow linearly, more like Slack | top-level |
The problem: The Teams API does not expose which UI style a channel uses. If you use the wrong replyStyle:
thread in a Threads-style channel → replies appear nested awkwardlytop-level in a Posts-style channel → replies appear as separate top-level posts instead of in-threadSolution: Configure replyStyle per-channel based on how the channel is set up:
{
channels: {
msteams: {
replyStyle: "thread",
teams: {
"19:[email protected]": {
channels: {
"19:[email protected]": {
replyStyle: "top-level",
},
},
},
},
},
},
}
Current limitations:
action=upload-file with media / filePath / path; optional message becomes the accompanying text/comment, and filename overrides the uploaded name.Without Graph permissions, channel messages with images will be received as text-only (the image content is not accessible to the bot).
By default, OpenClaw only downloads media from Microsoft/Teams hostnames. Override with channels.msteams.mediaAllowHosts (use ["*"] to allow any host).
Authorization headers are only attached for hosts in channels.msteams.mediaAuthAllowHosts (defaults to Graph + Bot Framework hosts). Keep this list strict (avoid multi-tenant suffixes).
Bots can send files in DMs using the FileConsentCard flow (built-in). However, sending files in group chats/channels requires additional setup:
| Context | How files are sent | Setup needed |
|---|---|---|
| DMs | FileConsentCard → user accepts → bot uploads | Works out of the box |
| Group chats/channels | Upload to SharePoint → share link | Requires sharePointSiteId + Graph permissions |
| Images (any context) | Base64-encoded inline | Works out of the box |
Bots don't have a personal OneDrive drive (the /me/drive Graph API endpoint doesn't work for application identities). To send files in group chats/channels, the bot uploads to a SharePoint site and creates a sharing link.
Add Graph API permissions in Entra ID (Azure AD) → App Registration:
Sites.ReadWrite.All (Application) - upload files to SharePointChat.Read.All (Application) - optional, enables per-user sharing linksGrant admin consent for the tenant.
Get your SharePoint site ID:
# Via Graph Explorer or curl with a valid token:
curl -H "Authorization: Bearer $TOKEN" \
"https://graph.microsoft.com/v1.0/sites/{hostname}:/{site-path}"
# Example: for a site at "contoso.sharepoint.com/sites/BotFiles"
curl -H "Authorization: Bearer $TOKEN" \
"https://graph.microsoft.com/v1.0/sites/contoso.sharepoint.com:/sites/BotFiles"
# Response includes: "id": "contoso.sharepoint.com,guid1,guid2"
Configure OpenClaw:
{
channels: {
msteams: {
// ... other config ...
sharePointSiteId: "contoso.sharepoint.com,guid1,guid2",
},
},
}
| Permission | Sharing behavior |
|---|---|
Sites.ReadWrite.All only | Organization-wide sharing link (anyone in org can access) |
Sites.ReadWrite.All + Chat.Read.All | Per-user sharing link (only chat members can access) |
Per-user sharing is more secure as only the chat participants can access the file. If Chat.Read.All permission is missing, the bot falls back to organization-wide sharing.
| Scenario | Result |
|---|---|
Group chat + file + sharePointSiteId configured | Upload to SharePoint, send sharing link |
Group chat + file + no sharePointSiteId | Attempt OneDrive upload (may fail), send text only |
| Personal chat + file | FileConsentCard flow (works without SharePoint) |
| Any context + image | Base64-encoded inline (works without SharePoint) |
Uploaded files are stored in a /OpenClawShared/ folder in the configured SharePoint site's default document library.
OpenClaw sends Teams polls as Adaptive Cards (there is no native Teams poll API).
openclaw message poll --channel msteams --target conversation:<id> ...~/.openclaw/msteams-polls.json.Send semantic presentation payloads to Teams users or conversations using the message tool or CLI. OpenClaw renders them as Teams Adaptive Cards from the generic presentation contract.
The presentation parameter accepts semantic blocks. When presentation is provided, the message text is optional.
Agent tool:
{
action: "send",
channel: "msteams",
target: "user:<id>",
presentation: {
title: "Hello",
blocks: [{ type: "text", text: "Hello!" }],
},
}
CLI:
openclaw message send --channel msteams \
--target "conversation:19:[email protected]" \
--presentation '{"title":"Hello","blocks":[{"type":"text","text":"Hello!"}]}'
For target format details, see Target formats below.
MSTeams targets use prefixes to distinguish between users and conversations:
| Target type | Format | Example |
|---|---|---|
| User (by ID) | user:<aad-object-id> | user:40a1a0ed-4ff2-4164-a219-55518990c197 |
| User (by name) | user:<display-name> | user:John Smith (requires Graph API) |
| Group/channel | conversation:<conversation-id> | conversation:19:[email protected] |
| Group/channel (raw) | <conversation-id> | 19:[email protected] (if contains @thread) |
CLI examples:
# Send to a user by ID
openclaw message send --channel msteams --target "user:40a1a0ed-..." --message "Hello"
# Send to a user by display name (triggers Graph API lookup)
openclaw message send --channel msteams --target "user:John Smith" --message "Hello"
# Send to a group chat or channel
openclaw message send --channel msteams --target "conversation:19:[email protected]" --message "Hello"
# Send a presentation card to a conversation
openclaw message send --channel msteams --target "conversation:19:[email protected]" \
--presentation '{"title":"Hello","blocks":[{"type":"text","text":"Hello"}]}'
Agent tool examples:
{
action: "send",
channel: "msteams",
target: "user:John Smith",
message: "Hello!",
}
{
action: "send",
channel: "msteams",
target: "conversation:19:[email protected]",
presentation: {
title: "Hello",
blocks: [{ type: "text", text: "Hello" }],
},
}
/gateway/configuration for dmPolicy and allowlist gating.The groupId query parameter in Teams URLs is NOT the team ID used for configuration. Extract IDs from the URL path instead:
Team URL:
https://teams.microsoft.com/l/team/19%3ABk4j...%40thread.tacv2/conversations?groupId=...
└────────────────────────────┘
Team conversation ID (URL-decode this)
Channel URL:
https://teams.microsoft.com/l/channel/19%3A15bc...%40thread.tacv2/ChannelName?groupId=...
└─────────────────────────┘
Channel ID (URL-decode this)
For config:
/team/ (URL-decoded, e.g., 19:[email protected]; older tenants may show @thread.skype, which is also valid)/channel/ (URL-decoded)groupId query parameter for OpenClaw routing. It is the Microsoft Entra group ID, not the Bot Framework conversation ID used in incoming Teams activities.Bots have limited support in private channels:
| Feature | Standard Channels | Private Channels |
|---|---|---|
| Bot installation | Yes | Limited |
| Real-time messages (webhook) | Yes | May not work |
| RSC permissions | Yes | May behave differently |
| @mentions | Yes | If bot is accessible |
| Graph API history | Yes | Yes (with permissions) |
Workarounds if private channels don't work:
ChannelMessage.Read.All)channels.msteams.requireMention=false or configure per team/channel.outline.png, 192x192 for color.png).webApplicationInfo.id matches your bot's App ID exactlyChannelMessage.Read.Group for teams, ChatMessage.Read.Chat for group chats