feat: experimental transfer sharepoint authentication to AzureAD#326
feat: experimental transfer sharepoint authentication to AzureAD#326mateuszkuprowski wants to merge 16 commits intomainfrom
Conversation
| permissions_config = SharepointPermissionsConfig( | ||
| permissions_application_id=None, | ||
| permissions_tenant=tenant, | ||
| permissions_client_cred=None, # or SecretStr(...) |
There was a problem hiding this comment.
should we provide with a value for permissions_client_cred and permissions_application_id here? otherwise this integration test would fail in CI pipeline
There was a problem hiding this comment.
It won't actually fail (and it doesn't) as this connector can work in 2 modes, either with or without permissions. There's a separate e2e test for that in the test_e2e/dest/sharepoint.sh and sharepoint_with_permissions.sh
| ) | ||
| token_result = app.acquire_token_for_client( | ||
| scopes=[ | ||
| f"https://{self.permissions_config.permissions_tenant}.sharepoint.com/.default" |
There was a problem hiding this comment.
when I use SHAREPOINT_PERMISSIONS_TENANT value in Keeper, this line reports an error. After I remove the second part of the string and only keeps the first part, it works.
There was a problem hiding this comment.
I might need a little more explanation on this not sure which part do you mean? Like it works without the /.default/ but it doesn't with it?
on the platform UI, what's differences between permissions and AccessConfig? Aren't both of them shown on the UI? |
Unfortunately there's no permission config to be setup in the UI. All I need is tenant for this to work. Actually you indirectly input a tenant when you give link to the proper site, I was wondering if simple copy that info to tenant wouldn't work. In tests it's exactly like that. |
Refined authentication method to get rid of deprecated login/password with sharepoint client in favour of EntraID auth.