LogoLogo
  • Getting Started
    • Welcome to Teleskope.ai
    • Your Journey with Teleskope
  • The Platform
    • Data Catalog
    • Data Subject Rights
      • Integrations
      • Enroll Third Party Integrations
        • Amplitude
        • Google Analytics
        • Salesforce
        • Bazaar Voice
        • Intercom
      • Enroll Structured Databases
      • Deletion Methods
    • Policy Maker
    • Issues
    • API Service
      • Scanning API
        • v1/classify
        • v1/classifyCollection
        • v1/scan
      • Redaction API
        • v1/scrub
      • Data Subject Rights
        • GET v1/dsr/requests
        • POST v1/dsr/requests
      • Metadata
        • v1/aws/rds
        • v1/aws/s3
        • v1/snowflake
        • v1/snowflake/users
        • v1/gcp/bigquery
        • v1/gcp/cloudstorage
        • v1/gcp/cloudsql
  • Setup
    • Deployment
    • Role Based Access Control
    • SSO
      • Okta
      • Microsoft Entra
      • Google Auth
  • Specifications
    • Data Store Coverage
    • Compliance Frameworks
    • Redaction Methodologies
    • Data Elements
  • Connectors
    • AWS
      • Athena
      • RDS
      • DynamoDB
      • Redshift
      • S3
      • SNS
      • SQS
    • GCP
      • Cloud Storage
      • Grant Teleskope Access to BigQuery
      • CloudSQL
      • Grant Teleskope Access to CloudLogging
    • SaaS
      • Github
      • Google Drive
      • Jira
      • Segment
      • Zendesk
      • DropBox
      • Box
      • Bitbucket
      • Slack
      • Sharepoint Online
    • Snowflake
    • Azure
      • Azure SQL
      • Azure Database
      • Blob Storage
      • CosmosDB
      • Synapse
    • Databricks
  • DSR
  • Alerting Integrations
    • Slack
    • Tines
Powered by GitBook
On this page
  • Requirements
  • Integration

Was this helpful?

  1. Connectors
  2. SaaS

Sharepoint Online

PreviousSlackNextSnowflake

Last updated 20 days ago

Was this helpful?

Requirements

  • Within Azure, an Entra App was created and configured as described

  • Within Teleskope, you have a Teleskope Account with the Admin role

Integration

1

Grant the Teleskope App Microsoft Graph API scopes

Navigate to your App Registration, then Manage -> API Permissions, and assign the following Graph API scopes via Application Permissions:

  • Directory.Read.All

  • ExternalUserProfile.Read.All

  • Files.Read.All

  • Group.Read.All

  • GroupMember.Read.All

  • RoleManagement.Read.All

  • SharePointTenantSettings.Read.All

  • Sites.Read.All

  • User.Read

Optional Permissions to enable features in 'Policy Maker'

  • InformationProtectionPolicy.Read.All

  • Files.ReadWrite.All

Lastly, grant admin consent to all of the permissions.

2

Grant the Teleskope App Sharepoint API scopes

  • AllSites.Manage

  • Sites.FullControl.All

  • Sites.Manage.All

  • Sites.Read.All

  • Sites.Search.All

  • TermStore.Read.All

  • User.Read.All

3

Enable Metered APIs and Services

Follow instructions and enable Metered API and Services for Azure

4

Generate a certificate

  1. Create an Azure certificate with a public key by following the Microsoft instructions to

    1. Base64 encode the .pfx file. For example, in PowerShell, run the following command:

      1. $fileBytes = [System.IO.File]::ReadAllBytes("example.txt")
        $base64 = [Convert]::ToBase64String($fileBytes)
        $base64
    2. (If using MacOS) Please use the script to generate the credentials mentioned in the docs above, the base 64 encoding is included in the script.

  2. Go to Certificates & secrets.

  3. Go to the Certificates tab and then click Upload certificate, and upload the certificate (.cer file) you generated

  4. Follow Microsoft's instructions to

5

Enroll SharePoint in Teleskope

  1. Navigate to Settings > Connector > Azure

  2. Click Enroll New Tenant

  3. Input your Tenant ID, Domain, Base64 encoding of your pfx file, and password

here
these
Create and export your public certificate
certificate.sh
Export your public certificate with its private key