Client Secret Authentication
Client secret authentication uses traditional Azure App Registration credentials to connect to SharePoint. This method is suitable for most basic SharePoint integrations. Note: Permission sync is not available with client secret authentication. Use certificate-based authentication if you need permission sync functionality.Setting up
Step 1: Create Azure App Registration
More detailed instructions can be found following the video below.Open Azure Portal
Log in to Azure Portal for your organization.
Name and register app
Name it something like “Gorbit SharePoint Connector”, leave everything else as default, and click Register.
Step 2: Create Client Secret
Important: Make sure to copy the secret value immediately as it won’t be visible again.
Step 3: Configure API Permissions
Select scope
Select the checkbox for Sites.Read.All.
- Advanced: If you want to limit the sites this app has access to, select Sites.Selected. However, if you do this, you will need to add the App you are currently registering to each site you want to index.
How to grant site-specific access
How to grant site-specific access
If you selected Sites.Selected, you need to grant your app read access to each site you want to index.The steps below use Microsoft Graph Explorer,
but you can also grant site permissions using:Repeat steps 3–5 for each site you want to index.
- PnP PowerShell (
Grant-PnPAzureADAppSitePermissioncmdlet) - Resource Specific Consent guide
Consent to permissions
Click your profile icon → Consent to permissions → enable Sites.FullControl.All.
This grants Graph Explorer (not your Gorbit app) permission to manage site access.
Get the site ID
Run a GET request, replacing Copy the
{tenant} and YourSiteName:id from the response (format: contoso.sharepoint.com,guid1,guid2).Step 4: Configure in Gorbit
Enter credential details
- Application (client) ID from Step 1
- Directory (tenant) ID from Step 1
- Client Secret Value from Step 2