Set up Client Secret Connection to SharePoint

Steps in Microsoft Azure

  1. Navigate to and login.

  2. Navigate to Azure Active Directory > App Registrations > New Registration

    Step 2 in Microsoft Azure

  3. Register your Application.

    1. Enter an Application name.

    2. Select which account types you wish to access this API.

    3. Click Register.

    Step 3 in Microsoft Azure

  4. Copy the Application (client) ID and note it for later use.

    Step 4 in Microsoft Azure

  5. Create a new Client Secret for the Application.

    1. Select Certificates & secrets > New Client Secret

    2. Enter a description, select an expiry duration and click Add.

      Step 5 in Microsoft Azure

  6. Copy the client secret and note it for later use. Make sure to copy the Value field, as below.

    Step 6 in Microsoft Azure

  7. Grant Admin Consent.

    1. Select API Permissions

    2. Under API Permissions, make sure SharePoint is Given Delegated AllSites.FullControl.All permission.

    3. After Permission is added click “Grant Admin Consent”.

Steps in SharePoint

  1. Navigate to the following URL in your SharePoint Online Instance. <YourSharePointSite>/sites/<Site>/_layouts/15/appinv.aspx.
  2. Paste the Application Id generated earlier on Azure ID into the App ID slot and hit the Lookup button.
  3. Provide the App Domain and Redirect URL of your Portal Site..

  4. In App’s Permissions Request XML, paste the following. Do not modify the scope, it’s in a URI format specified by Microsoft.

    <AppPermissionRequests AllowAppOnlyPolicy="true">
        <AppPermissionRequest Scope="http://sharepoint/content/sitecollection" Right="FullControl"/>

  5. Click Create.

Steps in Sitefinity

  1. Navigate to the backend of your portal site

  2. Go to Administration > The Portal Connector > Configuration > SharePoint Connection Settings

  3. Fill in the SharePoint Connection settings

    1. Under Connection Type select Client Secret

    2. Under SharePoint URL, Enter the URL to your SharePoint site using the appropriate format, examples of which are displayed below the field.

    3. Under Tenant (client) ID, paste the Tenant Id of the tenant in Azure Active Directory.

    4. Under ApplicationId, paste the Application (Client) Id of the App Registration in Azure Active Directory..

    5. Under Client Secret, paste the Client Secret copied and noted previously in the Azure Active Directory section.

    6. Finally, Select the Access Control Service Environment Type from the drop-down menu.

  4. Click Save, then Test Connection.