Skip to content

Commit 860e9f6

Browse files
committed
Update comments
1 parent 691175e commit 860e9f6

File tree

1 file changed

+5
-36
lines changed

1 file changed

+5
-36
lines changed

articles/data-factory/connector-sharepoint-online-list.md

Lines changed: 5 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -72,18 +72,18 @@ The following properties are supported for a SharePoint Online List linked servi
7272
| type | The type property must be set to: **SharePointOnlineList**. | Yes |
7373
| siteUrl | The SharePoint Online site url, e.g. `https://contoso.sharepoint.com/sites/siteName`. | Yes |
7474
| servicePrincipalId | The Application (client) ID of the application registered in Microsoft Entra ID. | Yes |
75-
| servicePrincipalCredentialType | Specify the credential type to use for service principal authentication. Allowed values are `ServicePrincipalKey` and `ServicePrincipalCert`. | No |
76-
| ***For ServicePrincipalKey*** | | |
77-
| servicePrincipalKey | The application's key. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). Refer to this [section](#grant-permission-for-using-service-principal-key) for more details including the permission settings. | No |
75+
| servicePrincipalCredentialType | Specify the credential type to use for service principal authentication. Allowed values are `ServicePrincipalCert` and `ServicePrincipalKey`. | No |
7876
| ***For ServicePrincipalCert*** | | |
79-
| servicePrincipalEmbeddedCert | Specify the base64 encoded certificate of your application registered in Microsoft Entra ID, and ensure the certificate content type is **PKCS #12**. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). Refer to this [article](/sharepoint/dev/solution-guidance/security-apponly-azuread) for permission settings.| No |
77+
| servicePrincipalEmbeddedCert | Specify the base64 encoded certificate of your application registered in Microsoft Entra ID, and ensure the certificate content type is **PKCS #12**. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). You need to configure the permission settings referring this [article](/sharepoint/dev/solution-guidance/security-apponly-azuread).| No |
8078
| servicePrincipalEmbeddedCertPassword | Specify the password of your certificate if your certificate is secured with a password. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
79+
| ***For ServicePrincipalKey*** | | |
80+
| servicePrincipalKey | The application's key. Mark this field as a **SecureString** to store it securely, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
8181
| | | |
8282
| tenantId | The tenant ID under which your application resides. | Yes |
8383
| connectVia | The [Integration Runtime](concepts-integration-runtime.md) to use to connect to the data store. If not specified, the default Azure Integration Runtime is used. | No |
8484

8585
>[!Note]
86-
>Due to the sunset of service principal key authentication type by **November 1st, 2024**, please upgrade to service principal certificate authentication type before the date if you are currently using it. For more information, see this [article](https://learn.microsoft.com/sharepoint/dev/sp-add-ins/retirement-announcement-for-azure-acs).
86+
>If you are using service principal key authentication, which is based on Azure ACS (Access Control Services), we recommend switching to the **service principal certificate authentication** due to the [ACS retirement plan](https://learn.microsoft.com/sharepoint/dev/sp-add-ins/retirement-announcement-for-azure-acs).
8787
8888
**Example 1: Using service principal key authentication**
8989

@@ -138,37 +138,6 @@ The following properties are supported for a SharePoint Online List linked servi
138138
}
139139
}
140140
```
141-
### Grant permission for using service principal key
142-
143-
The SharePoint List Online connector uses service principal authentication to connect to SharePoint. Follow these steps to set it up:
144-
145-
1. Register an application with the Microsoft identity platform. To learn how, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). Make note of these values, which you use to define the linked service:
146-
147-
- Application ID
148-
- Application key
149-
- Tenant ID
150-
151-
2. Grant SharePoint Online site permission to your registered application by following the steps below. To do this, you need a site admin role.
152-
153-
1. Open your SharePoint Online site link. For example, the URL in the format `https://<your-site-url>/_layouts/15/appinv.aspx` where the placeholder `<your-site-url>` is your site.
154-
2. Search the application ID you registered, fill the empty fields, and click "Create".
155-
156-
- App Domain: `contoso.com`
157-
- Redirect URL: `https://www.contoso.com`
158-
- Permission Request XML:
159-
160-
```xml
161-
<AppPermissionRequests AllowAppOnlyPolicy="true">
162-
<AppPermissionRequest Scope="http://sharepoint/content/sitecollection/web" Right="Read"/>
163-
</AppPermissionRequests>
164-
```
165-
166-
:::image type="content" source="media/connector-sharepoint-online-list/sharepoint-online-grant-permission-admin.png" alt-text="Grant SharePoint Online site permission to your registered application when you have site admin role.":::
167-
168-
> [!NOTE]
169-
> In the context of configuring the SharePoint connector, the "App Domain" and "Redirect URL" refer to the SharePoint app that you have registered in Microsoft Entra ID to allow access to your SharePoint data. The "App Domain" is the domain where your SharePoint site is hosted. For example, if your SharePoint site is located at "https://contoso.sharepoint.com", then the "App Domain" would be "contoso.sharepoint.com". The "Redirect URL" is the URL that the SharePoint app will redirect to after the user has authenticated and granted permissions to the app. This URL should be a page on your SharePoint site that the app has permission to access. For example, you could use the URL of a page that displays a list of files in a library, or a page that displays the contents of a document.
170-
171-
3. Click "Trust It" for this app.
172141

173142
## Dataset properties
174143

0 commit comments

Comments
 (0)