Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
  • Overview
  • 1. Locate the SharePoint Site Slug
  • 2. Get the Drive Name
  • 3. Create a Confidencial Application
  • 4. Gather the Tenant Id and Client Id
  • 5. Add a Client Secret
  • 6. Complete the form in Cloud Protector Settings
Export as PDF
  1. Cloud Protector

Connecting Microsoft SharePoint

PreviousConnecting Microsoft OneDriveNextConnecting Server Message Block

Last updated 1 day ago

Overview

In order to connect Cloud Protector to your SharePoint file system, your administrator will need to log into and collect a few values (Make sure to use the Azure link provided):

  • Site Slug (SharePoint site name used in the URL)

  • Drive Name (The document library you want to access)

  • Tenant Id

  • Client Id

  • Client Secret (Copy and save the secret right after creating it; you won't be able to view it later.)


1. Locate the SharePoint Site Slug

The Site Slug is the identifier for your SharePoint site used in its URL.

Example:

If your SharePoint URL looks like this:

https://your-domain.sharepoint.com/sites/HRDocuments

Then your Site Slug is: HRDocuments

To find it:

  1. Go to your SharePoint site in a browser

  2. Look at the part of the URL after /sites/ — that is your Site Slug


2. Get the Drive Name

Each SharePoint site can have multiple document libraries (drives). You’ll need to specify the Drive Name that you want Cloud Protector to connect to.

To get the Drive Name:

  1. Open your SharePoint site

  2. Click Documents or the library you want to use

  3. The name at the top is the Drive Name

    (e.g., "Documents", "Policies", or "Shared Files")

Make sure to copy the name exactly as it appears.


3. Create a Confidencial Application

  1. Name: Confidencial Cloud Protector App

  2. Settings: account in this org only

3.2 API Permissions > Add permissions > Microsoft Graph

3.3 Application permission > Search: Files.ReadWrite

3.4 Select Files.ReadWrite.All > Add Permissions

3.5 Delegate Permissions > Search: Files.readwrite

3.6 Select Files.ReadWrite

3.7 Select Files.ReadWrite.All > add Permissions

3.8 Application Permission > Search Sites.read.all

3.9 Select: Sites.Read.All > Add Permissions

3.10 Delegated Permissions > Search User.read

3.11 Select: User.Read

3.12 Select: User.Read.All > Add permissions

3.13 Application Permissions > User.Read.All

3.14 Select: User > User.Read.All > Add permissions


4. Gather the Tenant Id and Client Id

Navigate to: App Registration > All Applications > Confidencial Cloud Protector App (Your new application)

Collect the two values and save on a separate sheet:

  • Application (Client) ID

  • Directory (Tenant) ID


5. Add a Client Secret

After your app is registered, you can create a client secret. Click the link next to Client Credentials (also shown) and add a secret.

Be sure to copy the secret value (not the secret ID) immediately after creation—you won't be able to see it again once you leave the page!


6. Complete the form in Cloud Protector Settings

6.1 Navigate to Cloud Protector > Settings > Add Source

6.2 Select Type > SharePoint

  1. Give your source a name that will help you recognize it.

  2. Input the Path: the actual file path in the cloud storage that you want to analyze, encrypt, or both. Leaving this as "root" will include the whole file system.

  3. Input the other values you have gathered.

  4. Click “Test Connection & Save”.


SharePoint Connection is now Complete.


An application must be created within with permissions granted to Confidencial.

3.1 Navigate to the page and create an application.

Microsoft Azure
Azure Portal App Registrations
Azure portal App registration