Microsoft OneDrive/SharePoint trading partner
This trading partner exchanges data with a Microsoft OneDrive or SharePoint service. MFT Server will initiate the connection to the trading partner. It is assumed that the Microsoft Azure administrator has provided you with the details needed to set up this trading partner.
Adding the Microsoft OneDrive trading partner
In the desired domain, navigate to the AUTOMATION > Trading Partners
module. Click on the Add
button, or right click anywhere in the grid area and select Add
from the pop-up menu. In the Add Trading Partner dialog window, select Microsoft OneDrive/SharePoint
as the Protocol, then click OK
. The Add "Microsoft OneDrive/SharePoint" Trading Partner
dialog will appear as depicted in the image below.
Basic
Name - The unique name to assign to this trading partner. Enter a name that best describes the trading partner, as you will be selecting the name when using the partner in MFT Server features that support it.
Company - The name of the company that this trading partner represents.
E-mail - The primary email address for this trading partner.
Authentication
The authentication fields are obtained using the MS Entra ID admin, after an app registration is created using this application. Click on this link: Microsoft Entra ID application registration for details on how to register the application.
Directory ID - Directory (tenant) ID as taken from the Overview
page of the Microsoft Entra admin center.
Client ID - Application (client) ID as taken from the Applications > App registrations
page of the Microsoft Entra admin center. Locate your application and copy the Application (client) ID.
Client Secret - Client secret as taken from the Applications > App registrations
page of the Microsoft Entra admin center. Select your application, then click on Certificates & secrets
, then copy the client secret's Value
field.
Username - Enter any valid Entra ID UPN. This field is not in use at this time.
User root drive access only - When checked, access will be limited to the user's default drive (the root drive, named OneDrive). Leave this box unchecked so that access to users and their associated drives can be obtained through SharePoint site(s).
Tags
Tags - If specified, this is the one or more tags that are used to limit which administrators have access to this trading partner.
Microsoft Entra ID application registration
Go to the Microsoft Entra ID admin center application.
From the left-hand side menu, select Applications >
App registrations
.
Click on + New registration
and enter a Name
. Click on the Register
button.
From the App Registrations > Overview
section, click on the Add a certificate or secret
link.
From the App Registrations > Certificates & Secrets
page, select + New client secret
.
Enter a Description
and choose a value for the Expires
field. This indicates how long the client secret is valid for.
Click on the Add
button, then copy-paste the Value
field, which is the actual client secret. You will see this on the App registrations page, where your newly added client secret record is displayed.
From the App Registrations > Manage
section, select API permissions
. The registered application's API Permissions
determines OneDrive/Site access. See below.
Click on + Add a permission
, then click on Microsoft Graph
.
Click on Application permissions
(not Delegated permissions).
Enter sites
in the Select permissions
search bar, then expand Sites
. The permissions to use (check) reduce down to two options: check any one of the Sites.xxxxx.All
options - or check Sites.Selected
.
Checking a
Sites.xxxxx.All
option is the least complicated because that is all you will need to do. It is also the only choice if running an MFT Server version prior to 2024.2. However, this grants the App registration access to all SharePoint sites and therefore MFT Server as well.
Checking
Sites.Selected
limits the sites that the App registration can access. An Entra ID admin must explicitly grant permissions to the sites that it can access. Please note that this only works with MFT Server 2024.2 and higher.
After making your selection, click on the Add permissions
button.
On the API permissions (configured permissions page), click Grant admin consent for <domain>
button, then click Yes
to confirm.