Skip to content

Commit b9b48f6

Browse files
authored
Merge pull request #198 from netwrix/feature/1s-spo-data-classification
Added SharePoint Online user-hosted classification config
2 parents e1194d7 + cd609a5 commit b9b48f6

12 files changed

+148
-1
lines changed
121 KB
Loading

docs/1secure/admin/organizations/sourcesandconnectors/sharepointonline.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ pane is displayed.
5353

5454
**Step 6 –** Click **Next**.
5555

56-
![Choose New Connector %28Step 3 of 3%29 pane](/images/1secure/admin/organizations/sourcesandconnectors/addsourcesharepointonlineconnector.webp)
56+
![Choose New Connector %28Step 3 of 3%29 pane](addconnectorspo.png)
5757

5858
**Step 7 –** The Choose new connector (Step 3 of 3) pane lists three connectors for SharePoint
5959
Online. Specify the following:
@@ -78,6 +78,9 @@ Online. Specify the following:
7878
switch to ON to allow 1Secure to read the documents in order to classify and label them based on
7979
the type of data they contain.
8080

81+
- Establish connection to your Classifier app – See the
82+
[Configure SharePoint Online Classification App](/docs/1secure/configuration/registerconfig/1secure-classifier-setup-guide.md)
83+
topic for additional information.
8184
- Run OCR to improve classification of images (increases processing time) – Toggle this switch
8285
to ON to use Optical Character Recognition (OCR) to scan images for text, which helps to
8386
classify the sensitive data more effectively. Note that this increases the processing time for
Lines changed: 144 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,144 @@
1+
---
2+
title: "Configure SharePoint Online Classification App"
3+
description: "Setup guide for 1Secure SPO Data Classification Connector and Azure classifier deployment"
4+
sidebar_position: 30
5+
---
6+
7+
# Configure SharePoint Online Classification App
8+
9+
## Create 1Secure SPO Data Classification Connector
10+
11+
* Log in to 1Secure
12+
* Go to Configuration
13+
* Go to Managed organizations
14+
* Select the child tenant you're working within
15+
* Select the SharePoint Online source's Connectors
16+
* Add/Edit SharePoint Online Data Classification
17+
18+
## Deploy and Configure the Classifier in Azure
19+
20+
* Create new resource group
21+
* Give current user at least: Domain Services Contributor, Contributor, Key Vault Secrets Officer, Key Vault Certificates User, and Role Based Access Control Administrator within resource group
22+
* Add "Netwrix 1Secure Classifier" from marketplace
23+
24+
\
25+
![The configuration screen for deploying the 1Secure classifier app](attachments/c8e939c8-8634-4a60-9cba-a931ef38e8f1.png " =599x391")
26+
* Set Region
27+
* Set Resource name `<prefix>`e.g. CompanyName-1Secure
28+
* After creation go to resource group
29+
* Go to `<prefix>`-textextraction
30+
* Open Functions page and go to App Keys
31+
* Copy "default" key
32+
* Go to `<prefix>`-classifier
33+
* Open Settings folder and go to Environment variables
34+
* Paste "default" key into "TextExtraction__ApiKey" value
35+
36+
## Register the Classifier in 1Secure
37+
38+
* In Azure classifier app, go to Overview
39+
* Click on the "Default domain" link and copy the full url (see below)
40+
41+
\
42+
![](attachments/0138b931-17d4-4266-ade7-d619757f14e2.png " =1890x197")
43+
44+
45+
* In 1Secure and paste as "Classifier Function App Url"
46+
* Go to `<prefix>`-sb-core
47+
* Open Settings Folder and go to Shared access policies
48+
* Create new shared access policy, only 'Send' claims are required
49+
50+
51+
![](attachments/0fff23ad-9695-406b-b172-636c384d5fba.png " =1678x899")
52+
53+
54+
* Copy the "Primary connection string"
55+
* Swap to 1Secure tab and paste as "Service Bus SAS Connection String"
56+
57+
58+
![](attachments/b27669d7-bc3f-4c61-9722-118b77a3d0c2.png " =642x303")
59+
60+
61+
* Press Register
62+
* After success, save and swap back to Azure Portal (tab 1)
63+
64+
## Set Up Classifier Link to SPO
65+
66+
**On Azure Portal (tab 1):**
67+
68+
* Go to `<prefix>`-kv
69+
* Open Objects folder and go to Secrets![](attachments/ac55f3e0-fee7-4318-a86b-58e9899c3a10.png " =1738x283")
70+
* Swap to Azure Portal (tab 2)
71+
72+
**On Azure Portal (tab 2):**
73+
74+
* Open your SharePoint App Registration
75+
76+
77+
![](attachments/9ed38a58-714f-4733-98c2-dc6fbc7c7ce4.png " =642x320")
78+
79+
80+
* Copy App Registration tenant ID
81+
* Swap to Azure Portal (tab 1)
82+
* Click on the secret with the name "source-auth-key-\{Guid\}-__tenant-id__"
83+
* Click "+New Version"
84+
* Paste the tenant ID as the secret value
85+
* Click Create\n![](attachments/beabf83e-a591-4914-be74-37cd6755fe25.png " =1510x876")
86+
* Copy App Registration client ID
87+
* Swap to Azure Portal (tab 1)
88+
* Click on the secret with the name "source-auth-key-\{Guid\}-__client-id__"
89+
* Click "+New Version"
90+
* Paste the client ID as the secret value
91+
* Click Create
92+
93+
94+
95+
96+
**On Azure Portal (tab 1):**
97+
98+
99+
![](attachments/2dfd2ba5-c013-43b5-ae8f-c813dda8e9a0.png " =1852x685")
100+
101+
* Go to Certificates
102+
* Click on "sharepoint-auth-\{Guid\}"
103+
* Click on current version
104+
* Click on "Download in CER format"
105+
* Swap to Azure Portal (tab 2)
106+
107+
**On Azure Portal (tab 2):**
108+
109+
* Open Manage folder in App Registration and click Certificates & Secrets
110+
* Go to Certificates
111+
* Click "Upload certificate"
112+
* Upload the downloaded certificate and give it a name
113+
114+
115+
![](attachments/3b0612ed-6b25-40c4-b091-7a5a73921914.png " =1409x817")
116+
117+
## Troubleshooting
118+
119+
### General Errors
120+
121+
**Classification connector successfully registers but shows status 'New' even after a successful state crawl**
122+
123+
* There could be errors in the classifier app - check the Application Insights resource (in the classifier resource group, resource ending in `-ai`) for more detailed errors - use the below section for further troubleshooting steps
124+
125+
### Application Insights Errors
126+
127+
**No ClientId was specified**
128+
129+
*(Full error: Microsoft.Graph.ServiceException: Code: generalException Message: An error occurred sending the request. ---> MSAL.NetCore.4.70.2.0.MsalClientException: ErrorCode: no_client_id……)*
130+
131+
* Check that the client ID and tenant ID secrets are set in the KeyVault instance
132+
133+
**The maximum entity size has been reached or exceeded for queue**
134+
135+
* The classifier has been unable to process service bus messages and the queue is now full, the queue can be emptied. The classifications should be processed successfully on the next crawl.
136+
* In the classifier resource group, find the service bus namespace resource (named `<classifier-name>`**-class-sb-core**)
137+
* Open the **state-classification** queue, and click **Service Bus Explorer** in the left-hand side bar
138+
* Click **Peek Mode** and change it to **Receive Mode**, then click **Purge messages**
139+
140+
**Name or service not known**
141+
142+
*(Example error: Microsoft.Graph.ServiceException: Code: generalException*\n*Message: An error occurred sending the request.*\n *---> System.AggregateException: Retry failed after 4 tries. Retry settings can be adjusted in ClientOptions.Retry or by configuring a custom retry policy in ClientOptions.RetryPolicy. (Name or service not known (*`<classifier-name>`*-kv:443))*
143+
144+
* One of the environment variables may be incorrect in the classifier or text extraction app. Ensure that URLs in the variables are valid (for example variables `FileDownload__ClientCredentialsKeyVaultUrl` and `TextExtraction__ApiBaseUrl`)
63.8 KB
Loading
67.6 KB
Loading
54 KB
Loading
68.9 KB
Loading
47.7 KB
Loading
36.2 KB
Loading
36.8 KB
Loading

0 commit comments

Comments
 (0)