Skip to content

Commit 2c2cada

Browse files
Merge pull request #286738 from v-luckywang/0914-Update_spo_spn_key_deprecation
[Doc update] Update SPO List SPN key deprecation
2 parents ab6ca37 + 9f0b738 commit 2c2cada

File tree

1 file changed

+10
-6
lines changed

1 file changed

+10
-6
lines changed

articles/data-factory/connector-sharepoint-online-list.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: jianleishen
66
ms.subservice: data-movement
77
ms.custom: synapse
88
ms.topic: conceptual
9-
ms.date: 08/29/2024
9+
ms.date: 09/14/2024
1010
ms.author: jianleishen
1111
---
1212
# Copy data from SharePoint Online List by using Azure Data Factory or Azure Synapse Analytics
@@ -72,16 +72,19 @@ The following properties are supported for a SharePoint Online List linked servi
7272
| type | The type property must be set to: **SharePointOnlineList**. | Yes |
7373
| siteUrl | The SharePoint Online site url, e.g. `https://contoso.sharepoint.com/sites/siteName`. | Yes |
7474
| servicePrincipalId | The Application (client) ID of the application registered in Microsoft Entra ID. | Yes |
75-
| servicePrincipalCredentialType | Specify the credential type to use for service principal authentication. Allowed values are `ServicePrincipalKey` and `ServicePrincipalCert`. | No |
76-
| ***For ServicePrincipalKey*** | | |
77-
| servicePrincipalKey | The application's key. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). Refer to this [section](#grant-permission-for-using-service-principal-key) for more details including the permission settings. | No |
75+
| servicePrincipalCredentialType | Specify the credential type to use for service principal authentication. Allowed values are `ServicePrincipalCert` and `ServicePrincipalKey`. | No |
7876
| ***For ServicePrincipalCert*** | | |
79-
| servicePrincipalEmbeddedCert | Specify the base64 encoded certificate of your application registered in Microsoft Entra ID, and ensure the certificate content type is **PKCS #12**. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). Refer to this [article](/sharepoint/dev/solution-guidance/security-apponly-azuread) for permission settings.| No |
77+
| servicePrincipalEmbeddedCert | Specify the base64 encoded certificate of your application registered in Microsoft Entra ID, and ensure the certificate content type is **PKCS #12**. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). You need to configure the permission settings referring this [article](/sharepoint/dev/solution-guidance/security-apponly-azuread).| No |
8078
| servicePrincipalEmbeddedCertPassword | Specify the password of your certificate if your certificate is secured with a password. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
79+
| ***For ServicePrincipalKey*** | | |
80+
| servicePrincipalKey | The application's key. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). Refer to this [section](#grant-permission-for-using-service-principal-key) for more details including the permission settings.| No |
8181
| | | |
8282
| tenantId | The tenant ID under which your application resides. | Yes |
8383
| connectVia | The [Integration Runtime](concepts-integration-runtime.md) to use to connect to the data store. If not specified, the default Azure Integration Runtime is used. | No |
8484

85+
>[!Note]
86+
>If you are using service principal key authentication, which is based on Azure ACS (Access Control Services), we recommend switching to the **service principal certificate authentication** due to the [ACS retirement plan](/sharepoint/dev/sp-add-ins/retirement-announcement-for-azure-acs).
87+
8588
**Example 1: Using service principal key authentication**
8689

8790
```json
@@ -135,6 +138,7 @@ The following properties are supported for a SharePoint Online List linked servi
135138
}
136139
}
137140
```
141+
138142
### Grant permission for using service principal key
139143

140144
The SharePoint List Online connector uses service principal authentication to connect to SharePoint. Follow these steps to set it up:
@@ -161,7 +165,7 @@ The SharePoint List Online connector uses service principal authentication to co
161165
```
162166

163167
:::image type="content" source="media/connector-sharepoint-online-list/sharepoint-online-grant-permission-admin.png" alt-text="Grant SharePoint Online site permission to your registered application when you have site admin role.":::
164-
168+
165169
> [!NOTE]
166170
> In the context of configuring the SharePoint connector, the "App Domain" and "Redirect URL" refer to the SharePoint app that you have registered in Microsoft Entra ID to allow access to your SharePoint data. The "App Domain" is the domain where your SharePoint site is hosted. For example, if your SharePoint site is located at "https://contoso.sharepoint.com", then the "App Domain" would be "contoso.sharepoint.com". The "Redirect URL" is the URL that the SharePoint app will redirect to after the user has authenticated and granted permissions to the app. This URL should be a page on your SharePoint site that the app has permission to access. For example, you could use the URL of a page that displays a list of files in a library, or a page that displays the contents of a document.
167171

0 commit comments

Comments
 (0)