SharePoint

  • 21 Jul

    Microsoft identity platform and OAuth 2.0 authorization code flow

    Microsoft Sharepoint identity platform and OAuth 2.0 authorization code flow

    In version v2022.5.21.0 we added a new way to authenticate to SharePoint. It is in experimental phase and we would like to receive feedback from our users.

    Please select ‘OAuth 2.0 Authoziation Code Flow’ as Auth Type within your SharePoint setup.

    OAuth 2.0 authorization code flow

    In the OAuth2 setup you’ll need to add:

    • Authorization Endpoint URL:  https://login.microsoftonline.com/%realm/oauth2/v2.0/authorize
    • Token Endpoint URL:  https://login.microsoftonline.com/%realm/oauth2/v2.0/token
    • Client ID
    • Client Secret
    • Scope, provide the Scope(s) for your Sharepoint, depends on how you did the authentication setup for the Client ID:
      • offline_access web.manage
        • offline_access is a must otherwise we’ll not receive the Refresh Token
      • offline_access Sites.Manage.All
      • offline_access AllSites.Manage
      • offline_access ???
    •  Redirect URI:  https://localhost/
    • Redirect Port: 3017

    Click the <Get> button. This should fill the Realm field and after confirmation in your browser it should fill the Refresh and Access Token.

    Note: If you are not allowed to receive the Realm then you can enter this manually. In our case we’ll use the SharePoint Tenant ID as Realm parameter: link.

    OAuth 2.0 authorization code flow

    If you need any help with this ‘authorization code flow’, please let us know.

    Best Regards,

    Limagito Team

  • 25 Nov

    Added SharePoint OAuth2 Authentication in Limagito File Mover

    Added SharePoint OAuth2 Authentication

    In version v2020.22.25.0 we added OAuth2 Authentication as a fourth method for connecting to SharePoint.

    Please select ‘Online Authentication using OUath2’ as Authentication Type (Setup Tab). After selection the OAuth2 Tab will be visible.

    Limagito FileMover SharePoint OAuth2

    We received the following information from the customer (thank you Brad):

    • Client Id
    • Client Secret
    • Redirect URI

     

    Update March 2022

    We had a user getting the following error when trying to Get the OAuth2 Token: AADSTS70000

    He had to change App Domain  to: www.localhost.com

    and

    Redirect URI to the Site url (without the  default.aspx  at the end) in the SharePoint Application setup AND Limagito OAuth2 setup

    We used the information from the customer and added them in the OAuth2 Setup:

    1. Client ID
    2. Client Secret
    3. Scope, we used Web.Manage
    4. Redirect URI

    Limagito File Mover SharePoint OAuth2 Setup

    Next, click <GET>

    At this moment we’ll start a request for the Realm and Principal ID of the SharePoint Site. A Dialog will appear with information about the next step.

    Limagito File Mover SharePoint Bearer Realm

    Now you’ll need to click ‘Trust It’ to continue to the next step:

     

    Limagito File Mover SharePoint Trust It

    The Authorization Code will appear in the address bar of your browser.

    Limagito File Mover SharePoint OAuth2 authorization code

    Please COPY / PASTE this complete URL (https://…) in the ‘Auth Code’ field of the OAth2 Setup screen. We’ll strip the part we need and trigger a request for a Refresh and Access token. The response will be added to the ‘Refresh Token’ and ‘Access Token’ field of the OAuth2 setup.

    Please click <Save> to save these Tokens which we’ll need to connect.

    Limagito File Mover SharePoint OAuth2 RefreshCode

    If you need any help with our ‘SharePoint OAuth2 Authentication’ option, please let us know.

    Best Regards,

    Limagito Team

  • 08 Nov

    Added SharePoint as Source in Limagito File Mover

    In version v2020.11.8 we added SharePoint as Source in Limagito File Mover. Once more, special thanks to Brad who helped us with the test account, much appreciated. In the next couple of weeks we’ll add SharePoint to the Web Remote Tool.

    Limagito File Mover Sharepoint as Source

    SharePoint Source Setup:

    We currently provide 4 authentication methods:

    1. Online Authentication Method:
      • Is the one we used during our tests. The end result of authentication is to establish an HTTP cookie, named “SPOIDCRL”, that contains a binary security token to be sent in subsequent SharePoint HTTPS requests. This cookie is kept in memory (not saved to disk).
      • We need your Username (i.e. myname@mycompany.com) and Password
    2. NTLM Authentication Method (Windows classic mode authentication):
      • For example, imagine our SharePoint endpoint is ‘https://xyzoffice.mycompany.com/’
        • The Site Url would be: https://xyzoffice.mycompany.com
        • The NTLM Domain would be: mycompany.com
        • The Username would be just the name, not a full email address.
          • For example: myname instead of myname@mycompany.com.
    3. Online Authentication using Client Credentials without User Dialog
      • In this case you don’t need to use the Username and Password fields
      • We will use your Client ID and Client Secret from the OAuth2 tab instead
    4. Online Authentication using OAth2

    >Screenshot setup using authentication method 1)

    Limagito File Mover Sharepoint as Source Setup

    >Screenshots setup using authentication method 3)

    Limagito File Mover SharePoint Setup

    Limagito File Mover SharePoint Client Credentials

    SharePoint RunTime Log result

    Limagito File Mover Sharepoint as Source RunTime Log

    If you need any help with ‘SharePoint as Source’, please let us know.

    Best Regards,

    Limagito Team

1 2