Skip to content

Commit cd19627

Browse files
authored
1Secure classifier app config
1 parent 8035122 commit cd19627

File tree

1 file changed

+138
-0
lines changed

1 file changed

+138
-0
lines changed
Lines changed: 138 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,138 @@
1+
# 🏷️ 1Secure Classifier Setup Guide
2+
3+
# Create 1Secure SPO Data Classification Connector
4+
5+
* Log in to 1Secure
6+
* Go to Configuration
7+
* Go to Managed organizations
8+
* Select the child tenant you're working within
9+
* Select the SharePoint Online source's Connectors
10+
* Add/Edit SharePoint Online Data Classification
11+
12+
# Deploy and Configure the Classifier in Azure
13+
14+
* Create new resource group
15+
* Give current user at least: Domain Services Contributor, Contributor, Key Vault Secrets Officer, Key Vault Certificates User, and Role Based Access Control Administrator within resource group
16+
* Add "Netwrix 1Secure Classifier" from marketplace
17+
18+
\
19+
![The configuration screen for deploying the 1Secure classifier app](attachments/c8e939c8-8634-4a60-9cba-a931ef38e8f1.png " =599x391")
20+
* Set Region
21+
* Set Resource name `<prefix>`e.g. CompanyName-1Secure
22+
* After creation go to resource group
23+
* Go to `<prefix>`-textextraction
24+
* Open Functions page and go to App Keys
25+
* Copy "default" key
26+
* Go to `<prefix>`-classifier
27+
* Open Settings folder and go to Environment variables
28+
* Paste "default" key into "TextExtraction__ApiKey" value
29+
30+
# Register the Classifier in 1Secure
31+
32+
* In Azure classifier app, go to Overview
33+
* Click on the "Default domain" link and copy the full url (see below)
34+
35+
\
36+
![](attachments/0138b931-17d4-4266-ade7-d619757f14e2.png " =1890x197")
37+
38+
39+
* In 1Secure and paste as "Classifier Function App Url"
40+
* Go to `<prefix>`-sb-core
41+
* Open Settings Folder and go to Shared access policies
42+
* Create new shared access policy, only 'Send' claims are required
43+
44+
45+
![](attachments/0fff23ad-9695-406b-b172-636c384d5fba.png " =1678x899")
46+
47+
48+
* Copy the "Primary connection string"
49+
* Swap to 1Secure tab and paste as "Service Bus SAS Connection String"
50+
51+
52+
![](attachments/b27669d7-bc3f-4c61-9722-118b77a3d0c2.png " =642x303")
53+
54+
55+
* Press Register
56+
* After success, save and swap back to Azure Portal (tab 1)
57+
58+
# Set Up Classifier Link to SPO
59+
60+
## On Azure Portal (tab 1)
61+
62+
* Go to `<prefix>`-kv
63+
* Open Objects folder and go to Secrets![](attachments/ac55f3e0-fee7-4318-a86b-58e9899c3a10.png " =1738x283")
64+
* Swap to Azure Portal (tab 2)
65+
66+
## On Azure Portal (tab 2)
67+
68+
* Open your SharePoint App Registration
69+
70+
71+
![](attachments/9ed38a58-714f-4733-98c2-dc6fbc7c7ce4.png " =642x320")
72+
73+
74+
* Copy App Registration tenant ID
75+
* Swap to Azure Portal (tab 1)
76+
* Click on the secret with the name "source-auth-key-{Guid}-__tenant-id__"
77+
* Click "+New Version"
78+
* Paste the tenant ID as the secret value
79+
* Click Create\n![](attachments/beabf83e-a591-4914-be74-37cd6755fe25.png " =1510x876")
80+
* Copy App Registration client ID
81+
* Swap to Azure Portal (tab 1)
82+
* Click on the secret with the name "source-auth-key-{Guid}-__client-id__"
83+
* Click "+New Version"
84+
* Paste the client ID as the secret value
85+
* Click Create
86+
87+
88+
\
89+
90+
## On Azure Portal (tab 1)
91+
92+
93+
![](attachments/2dfd2ba5-c013-43b5-ae8f-c813dda8e9a0.png " =1852x685")
94+
95+
* Go to Certificates
96+
* Click on "sharepoint-auth-{Guid}"
97+
* Click on current version
98+
* Click on "Download in CER format"
99+
* Swap to Azure Portal (tab 2)
100+
101+
## On Azure Portal (tab 2)
102+
103+
* Open Manage folder in App Registration and click Certificates & Secrets
104+
* Go to Certificates
105+
* Click "Upload certificate"
106+
* Upload the downloaded certificate and give it a name
107+
108+
109+
![](attachments/3b0612ed-6b25-40c4-b091-7a5a73921914.png " =1409x817")
110+
111+
# Troubleshooting
112+
113+
## General Errors
114+
115+
### Classification connector successfully registers but shows status 'New' even after a successful state crawl
116+
117+
* There could be errors in the classifier app - check the Application Insights resource (in the classifier resource group, resource ending in `-ai`) for more detailed errors - use the below section for further troubleshooting steps
118+
119+
## Application Insights Errors
120+
121+
### No ClientId was specified
122+
123+
*(Full error: Microsoft.Graph.ServiceException: Code: generalException Message: An error occurred sending the request. ---> MSAL.NetCore.4.70.2.0.MsalClientException: ErrorCode: no_client_id……)*
124+
125+
* Check that the client ID and tenant ID secrets are set in the KeyVault instance
126+
127+
### The maximum entity size has been reached or exceeded for queue
128+
129+
* The classifier has been unable to process service bus messages and the queue is now full, the queue can be emptied. The classifications should be processed successfully on the next crawl.
130+
* In the classifier resource group, find the service bus namespace resource (named `<classifier-name>`**-class-sb-core**)
131+
* Open the **state-classification** queue, and click **Service Bus Explorer** in the left-hand side bar
132+
* Click **Peek Mode** and change it to **Receive Mode**, then click **Purge messages**
133+
134+
### Name or service not known
135+
136+
*(Example error: Microsoft.Graph.ServiceException: Code: generalException*\n*Message: An error occurred sending the request.*\n *---> System.AggregateException: Retry failed after 4 tries. Retry settings can be adjusted in ClientOptions.Retry or by configuring a custom retry policy in ClientOptions.RetryPolicy. (Name or service not known (*`<classifier-name>`*-kv:443))*
137+
138+
* One of the environment variables may be incorrect in the classifier or text extraction app. Ensure that URLs in the variables are valid (for example variables `FileDownload__ClientCredentialsKeyVaultUrl` and `TextExtraction__ApiBaseUrl`)

0 commit comments

Comments
 (0)