You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| servicePrincipalKey | Specify the application's key. Mark this field as a SecureString to store it securely. | Yes |
114
+
| servicePrincipalCredentialType | Specify the credential type to use for service principal authentication. Allowed values are `ServicePrincipalKey` and `ServicePrincipalCert`. | No |
115
+
|***For ServicePrincipalKey***|||
116
+
| servicePrincipalKey | Specify the application's key. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No (Required when `servicePrincipalCredentialType` is `ServicePrincipalKey`) |
117
+
|***For ServicePrincipalCert***|||
118
+
| servicePrincipalEmbeddedCert | Specify the base64 encoded certificate of your application registered in Azure Active Directory. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). Go to this [section](#save-the-service-principal-certificate-in-azure-key-vault) to learn how to save the certificate in Azure Key Vault. | No (Required when `servicePrincipalCredentialType` is `ServicePrincipalCert`) |
119
+
| servicePrincipalEmbeddedCertPassword | Specify the password of your certificate if your certificate has a password and you are using AadServicePrincipal authentication. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
120
+
||||
115
121
| connectVia | The Integration Runtime to be used to connect to the data store. If not specified, it uses the default Azure Integration Runtime. | No |
116
122
117
123
>[!NOTE]
118
124
> The difference between **office365TenantId** and **servicePrincipalTenantId** and the corresponding value to provide:
119
125
>- If you're an enterprise developer developing an application against Microsoft 365 (Office 365) data for your own organization's usage, then you should supply the same tenant ID for both properties, which is your organization's Microsoft Entra tenant ID.
120
126
>- If you're an ISV developer developing an application for your customers, then office365TenantId will be your customer's (application installer) Microsoft Entra tenant ID and servicePrincipalTenantId will be your company's Microsoft Entra tenant ID.
121
127
122
-
**Example:**
128
+
**Example 1: Using service principal key authentication**
123
129
124
130
```json
125
131
{
@@ -129,16 +135,65 @@ The following properties are supported for Microsoft 365 (Office 365) linked ser
"servicePrincipalId": "<AAD app service principal id>",
165
+
"servicePrincipalEmbeddedCert": "<AAD app service principal cert in base64>",
166
+
"servicePrincipalEmbeddedCertPassword": "<AAD app service principal cert password>"
167
+
},
168
+
"connectVia": {
169
+
"referenceName": "<name of Integration Runtime>",
170
+
"type": "IntegrationRuntimeReference"
137
171
}
138
172
}
139
173
}
140
174
```
141
175
176
+
#### Save the service principal certificate in Azure Key Vault
177
+
178
+
You have two options to save the service principal certificate in Azure Key Vault:
179
+
180
+
-**Option 1**
181
+
182
+
1. Convert the service principal certificate to a base64 string. Learn more from this [article](https://blog.tekspace.io/convert-certificate-from-pfx-to-base64-with-powershell/).
183
+
184
+
185
+
2. Save the base64 string as a secret in Azure Key Vault.
186
+
187
+
:::image type="content" source="media/connector-office-365/secrets.png" alt-text="Screenshot of secrets.":::
188
+
189
+
:::image type="content" source="media/connector-office-365/secret-value.png" alt-text="Screenshot of secret value.":::
190
+
191
+
-**Option 2**
192
+
193
+
If you can't download the certificate from Azure Key Vault, you can use this [template](https://supportability.visualstudio.com/256c8350-cb4b-49c9-ac6e-a012aeb312d1/_apis/git/repositories/da6cf5d9-0dc5-4ba9-a5e2-6e6a93adf93c/Items?path=/AzureDataFactory/.attachments/ConvertCertToBase64StringInAKVPipeline-47f8e507-e7ef-4343-a73b-733b9a7f8e4e.zip&download=false&resolveLfs=true&%24format=octetStream&api-version=5.0-preview.1&sanitize=true&includeContentMetadata=true&versionDescriptor.version=master) to save the converted service principal certificate as a secret in Azure Key Vault.
194
+
195
+
:::image type="content" source="media/connector-office-365/template-pipeline.png" alt-text="Screenshot of template pipeline to save service principal certificate as a secret in AKV.":::
196
+
142
197
## Dataset properties
143
198
144
199
For a full list of sections and properties available for defining datasets, see the [datasets](concepts-datasets-linked-services.md) article. This section provides a list of properties supported by Microsoft 365 (Office 365) dataset.
0 commit comments