Skip to main content

Certificate-Based Authentication

Certificate-based authentication provides a secure way to connect to SharePoint and supports both basic integration and permission sync functionality. Use certificate authentication when:
  • You need permission sync capabilities
  • You prefer certificate-based security over client secrets
  • Your organization requires certificate-based authentication
For basic SharePoint integration without permission sync, you can also use client secret authentication.

Setting up

Step 1: Create Azure App Registration

1

Open Azure Portal

Log in to Azure Portal for your organization.
2

Open App registrations

Navigate to “App registrations” using the search bar.
3

Create registration

Click New Registration.
4

Name and register app

Name it something like “Gorbit SharePoint Connector - Certificate”, leave everything else as default, and click Register.
5

Save IDs

Under “Essentials” in the overview tab, you will find the Application (client) ID and Directory (tenant) ID. Save those for later.

Step 2: Generate and Upload Certificate

Option A: Generate Self-Signed Certificate

# Generate private key
openssl genrsa -out sharepoint-cert.key 2048

# Generate certificate signing request
openssl req -new -key sharepoint-cert.key -out sharepoint-cert.csr

# Generate self-signed certificate (valid for 1 year)
openssl x509 -req -days 365 -in sharepoint-cert.csr -signkey sharepoint-cert.key -out sharepoint-cert.crt

# Convert to PFX format
openssl pkcs12 -export -out sharepoint-cert.pfx -inkey sharepoint-cert.key -in sharepoint-cert.crt

Option B: Use Organization Certificate

Obtain a certificate from your organization’s Certificate Authority (CA) following your internal security policies.
We only support PFX format for certificate uploads in Azure.

Step 3: Upload Certificate to Azure

1

Open Certificates & secrets

In your Azure App Registration, navigate to the “Certificates & secrets” tab.
2

Upload certificate

Click Upload certificate.
3

Select file

Select your certificate file (.crt, .pem, or .cer format).
4

Add certificate

Add a description and click Add.

Step 4: Configure API Permissions

1

Open API Permissions

Navigate to the “API Permissions” tab in the Azure Portal.
2

Add a permission

Click Add a permission.

Basic Permissions (No Permission Sync)

If you are not planning to enable permission sync, you only need basic permissions:
1

Choose Microsoft Graph

Click Microsoft Graph, then click on Application permissions.
2

Select Sites.Read.All

Navigate to the “Sites” permission group. Select the checkbox for Sites.Read.All.
  • Advanced: If you want to limit the sites this app has access to, select Sites.Selected. However, if you do this, you will need to add the App you are currently registering to each site you want to index.
If you selected Sites.Selected, you need to grant your app read access to each site you want to index.The steps below use Microsoft Graph Explorer, but you can also grant site permissions using:To use Graph Explorer, complete these steps:
1

Sign in

Sign in with a Global Admin or SharePoint Admin account.
2

Consent to permissions

Click your profile icon → Consent to permissions → enable Sites.FullControl.All. This grants Graph Explorer (not your Gorbit app) permission to manage site access.
3

Get the site ID

Run a GET request, replacing {tenant} and YourSiteName:
GET https://graph.microsoft.com/v1.0/sites/{tenant}.sharepoint.com:/sites/YourSiteName?$select=id
Copy the id from the response (format: gorbit.sharepoint.com,guid1,guid2).
4

Grant Read permission

Change the method to POST:
POST https://graph.microsoft.com/v1.0/sites/{site-id}/permissions
Request body:
{
  "roles": ["read"],
  "grantedToIdentitiesV2": [{
    "application": {
      "id": "<Gorbit App Client ID>",
      "displayName": "Gorbit SharePoint Connector"
    }
  }]
}
5

Verify

Change the method to GET:
GET https://graph.microsoft.com/v1.0/sites/{site-id}/permissions
Confirm "roles": ["read"] appears for the Gorbit app.
Repeat steps 3–5 for each site you want to index.
3

Add and grant

Click Add permissions. Finally, click Grant admin consent for <Organization name> and click Confirm.

Extended Permissions (With Permission Sync)

If you plan to enable permission sync, you’ll need additional permissions:
1

Add another permission

Click Add a permission again.
2

Microsoft Graph application permissions

Click Microsoft Graph, then click on Application permissions. Add the following additional Microsoft Graph permissions:
  • Directory.Read.All - Used to query the overall organizational directory structure, including how users, groups, organizational units, and other directory objects relate to each other.
  • Group.Read.All - Used to read detailed group-specific information such as group properties, settings, types (Security vs Microsoft 365), and configurations.
  • GroupMember.Read.All - Used to retrieve and expand all members within a group, including nested group memberships. This allows Gorbit to determine which users have access to SharePoint content through group membership.
  • Member.Read.Hidden - Allows reading memberships of security groups that are marked as “hidden” in Entra ID.
  • User.Read.All - Used to retrieve complete user profiles and enumerate all users in the directory. Click Add permissions.
3

Microsoft Graph delegated permission

Click Add a permission again in API Permissions tab. Click Microsoft Graph, then click on Delegated permissions. Add the following delegated permission:
  • User.Read - This delegated permission allows the application to sign in on behalf of a user and read the signed-in user’s basic profile information. Unlike application permissions which work without a user context, this delegated permission is required when the app needs to establish an authenticated identity context for making API calls to Microsoft Graph and SharePoint. It provides the minimum required access for user authentication flows. Click Add permissions.
4

SharePoint application permissions

Click Add a permission again in API Permissions tab. Click SharePoint, then click on Application permissions. Add the following SharePoint permissions:
  • Sites.FullControl.All - Despite the name, Gorbit only uses this to retrieve details about permissions. No write operations are performed. If you selected Sites.Selected and need to grant fullcontrol only for specific sites, see the Using Sites.Selected with Permission Sync section below.
  • User.Read.All - Used to list all users within the directory for permission mapping. Click Add permissions.
5

Grant admin consent

Finally, click Grant admin consent for <Organization name> and click Confirm.
If you selected Sites.Selected instead of Sites.Read.All and plan to enable permission sync, you need to grant your app fullcontrol access to each site.The steps below use Microsoft Graph Explorer, but you can also grant site permissions using:To use Graph Explorer, complete these steps:
1

Sign in

Sign in with a Global Admin or SharePoint Admin account.
2

Consent to permissions

Click your profile icon → Consent to permissions → enable Sites.FullControl.All. This grants Graph Explorer (not your Gorbit app) permission to manage site access.
3

Get the site ID

Run a GET request, replacing {tenant} and YourSiteName:
GET https://graph.microsoft.com/v1.0/sites/{tenant}.sharepoint.com:/sites/YourSiteName?$select=id
Copy the id from the response (format: gorbit.sharepoint.com,guid1,guid2).
4

Grant FullControl permission

Change the method to POST:
POST https://graph.microsoft.com/v1.0/sites/{site-id}/permissions
Request body:
{
  "roles": ["fullcontrol"],
  "grantedToIdentitiesV2": [{
    "application": {
      "id": "<Gorbit App Client ID>",
      "displayName": "Gorbit SharePoint Connector"
    }
  }]
}
5

Verify

Change the method to GET:
GET https://graph.microsoft.com/v1.0/sites/{site-id}/permissions
Confirm "roles": ["fullcontrol"] appears for the Gorbit app.
Repeat steps 3–5 for each site you want to index.

Step 5: Configure in Gorbit

1

Open SharePoint connector

Navigate to the Gorbit Admin Panel and select the SharePoint Connector.
2

Create Certificate credential

Click Create New credential and select the Certificate tab.
3

Enter credential details

  • Application (client) ID from Step 1
  • Directory (tenant) ID from Step 1
  • Certificate File: Upload your certificate file (.pfx file)
  • Certificate Password: Enter password which you used to export the certificate file
4

Save credentials

Click Create to save your credentials.

Step 6: Enable Permission Sync (Optional)

When creating your SharePoint connector with certificate authentication:
1

Locate Permission Sync option

In the connector configuration, you’ll see a Permission Sync option.
2

Enable Permission Sync

Enable this option to synchronize SharePoint permissions with Gorbit.
Permission sync is available only on Cloud and the Enterprise Edition of Gorbit.

Permission Sync Details

When permission sync is enabled:
  • Document-level permissions: Gorbit will respect SharePoint document permissions
  • Site-level permissions: Users will only see documents from sites they have access to
  • Group permissions: SharePoint group memberships are synchronized
  • Real-time sync: Permissions are updated regularly to reflect SharePoint changes
For basic SharePoint integration without permission sync, you can use client secret authentication.