I just can’t find a decent email client that looks like it’s from the last 20 years. Geary and Evolution both appear to be pretty modern but something about using Gmail with a Yubikey just doesn’t work and neither of them will connect to my account. Both on Fedora and OpenSUSE. Thunderbird works but it’s so old fashioned and Betterbird doesn’t look much better. What’s everyone else using?

    • Will@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      5 months ago

      doesn’t have to be outlook! davmail (configured with the outlook client id) can provide an imap bridge for mbsync, thunderbird, etc to access in even the most restrictive O365 environments.

      davmail.oauth.clientId=d3590ed6-52b3-4102-aeff-aad2292ab01c
      davmail.oauth.redirectUri=urn:ietf:wg:oauth:2.0:oob
      
      • MrTomich@tldr.ar
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        5 months ago

        That’s interesting. Do you know of something that can solve the contacts issue? I have 1 or 2 added contacts in Outlook but 140.000 other employees on the directory. When I need to send a mail I just type the name and Outlook web finds the person. I would really need that for a third party client. Also calendar. My company is super restrictive with this. No smtp access and no easy direct integration. I use web because Outlook (the program, but also everything Microsoft) sucks. On Android I use Outlook but I can’t copy text or take screenshots, which also sucks.

      • Evotech@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        5 months ago

        That’s great but not that useful or needed. I need full exchange support for calendar, contacts etc. IMAP just doesn’t cut it

        For corporate work it’s not really my stance on software that is important, it’s the company’s. And id rather be as frictionless as possible with company policy.

        • Will@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          5 months ago

          Give the aforementioned davmail main page a look! The diagram does a pretty good job showing it’s capabilities. Among other services, davmail bridges to LDAP (contacts) and calDav (calendar) too!

          I pull my work outlook calendar and personal google with vdirsync and khal on laptop and desktop.

        • Will@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          I get not wanting to find yourself in the crosshairs of IT policy people. And more so, having reverence for security measures. But, at least for the enterprise software I interact with, I don’t see security implications and don’t feel the effort to be frictionless is symmetric. I see the opposite. Policies increase insecure behavior and are obstacles to my job.

          Methinks those making purchase and policy decisions are not those who interact with the consequences (use the software in anger). I’ve been on the receiving end of some sales pitches – the users are often an afterthought, not a priority. It’s hard to respect the spirit (if not the letter) of bad policies, especially when the polices are hostile to me-the-user and getting-my-job-done.

          Currently grinding my gears: Why are we using MS Teams? Why does Teams block firefox (and safari, based on user-agent of all things!)? Why is IMAP disabled?

          • Evotech@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            5 months ago

            Teams because already use office / exchange and teams is integrated and “free”

            We primarily use slack for communication, so I don’t have to use teams much, except for meetings

            It’s all just tools and they work reasonably well if you use them as intended.

            I don’t share your views on policies though, it’s important that people don’t do their own security assessments and follow what the ciso / security architect has intended. If you disagree, take it up with them.