Skip to main content

Connection - Sharepoint

The SharePoint Connection stores connect and logon properties for local SharePoint instances or the SharePoint online cloud service from Microsoft.

It is recommended for using On Prem server (Sharepoint 2016, etc), the "Sharepoint" connection.

It is recommended for using Sharepoint within the O365 environment, the "Sharepoint Online" connection.

Overall, the SharePoint Connection is used for the SharePoint Tasks:

SharePoint Instance

Manage Connections > Add > SharePoint > Common settings tab

Name

The unique name for the Connection.

Group

Connection's group name.

Timeout

The connection timeout in seconds. Connection will fail after this time period.

Code page

Code page being used.

Manage Connections > Add > SharePoint > Connection settings tab

SharePoint version

Select between SharePoint Online or a local installation (SharePoint 2010/2013/2016).

Address

SharePoint site's address (either on-premises or online). For SharePoint Online, use the site address from the SharePoint admin console — not the admin URL itself (e.g. https://yourtenant.sharepoint.com/sites/yoursitename).

Authentication type

Select the type of authentication on the SharePoint server:

  • Default — Windows authentication. Uses the running service account if the username matches; otherwise uses the supplied credentials.
  • Basic — Standard username and password credentials.
  • Form — Forms-based authentication using a username and password login form.
  • Anonymous — No credentials required.
  • ADFS — Active Directory Federation Services authentication. Requires username, password, and an STS URL (entered in the STS URL field).
  • AppOnly — App-only client credentials using an Azure AD-registered application. The Username field is the Client Id and the Password field is the Client Secret. Requires a Tenant Id.
  • Azure AD Application (Certificate) — Certificate-based Azure AD authentication. The Username field is the App ID. Requires a certificate and a Tenant Id.

Username

The username for the server. When using AppOnly, enter the Client Id. When using Azure AD Application (Certificate), enter the App ID.

Password

The password for the server. When using AppOnly, enter the Client Secret. Not used for Azure AD Application (Certificate).

STS URL

(ADFS authentication only) The URL to the ADFS Security Token Service endpoint.

Certificate

(Azure AD Application (Certificate) authentication only) Select a VisualCron certificate whose public key has been uploaded to the Azure AD application's certificate credentials.

Tenant Id

(AppOnly and Azure AD Application (Certificate) authentication only) The Azure AD Tenant ID (GUID) for your Microsoft 365 organization. Found in Microsoft Entra under the application's Overview page as Directory (tenant) ID.


SharePoint Online Instance

SharePoint Online (Protocol type: SharePoint Online) is a dedicated connection type for Microsoft 365 cloud environments. It always authenticates via Azure AD OAuth.

To register a new application or use an existing one, log into Microsoft Entra and navigate to App registrations. You can create a new registration or select an existing app. From the application's Overview page, note the Application (client) ID (Client Id) and Directory (tenant) ID (Tenant Id) — these are entered into the VisualCron connection settings.

Manage Connections > Add > SharePoint Online > Common settings tab

Address

Use the site address from the SharePoint admin console — not the admin URL itself (e.g. https://yourtenant.sharepoint.com/sites/yoursitename).

Select the appropriate authentication type from the Authentication type dropdown.

Basic Authentication — Deprecated Microsoft has permanently disabled Basic Authentication across its services, including Exchange Online, SharePoint Online, and Microsoft Graph. Any connection configured to use Basic Authentication will fail with an authorization error and cannot be restored. Basic Authentication is disabled at the Microsoft platform level and is not configurable by VisualCron or your system administrator. Affected connections must be reconfigured to use a supported authentication type.

AppOnly (Client credentials)

Username

The Client Id of the Azure AD app registration.

Password

The Client Secret of the Azure AD app registration.

Tenant Id

The Azure AD Tenant ID (GUID) for your Microsoft 365 organization.

Certificate

Client Id

The Application (Client) ID of the Azure AD app registration. Found in Microsoft Entra under the application's Overview page as Application (client) ID.

Tenant Id

The Azure AD Tenant ID (GUID) for your Microsoft 365 organization. Found in Microsoft Entra under the application's Overview page as Directory (tenant) ID.

Certificate

Select a VisualCron certificate whose public key (.cer file) has been uploaded to the Azure AD application's Certificates & Secrets.

You can use an existing or new Azure AD application to access your SharePoint Online sites. Please note that certificate-only credentials are accepted. Create an application on Azure AD and import the certificate to both the Azure AD application credentials and VisualCron. Only Certificate applications will be granted access to the SharePoint site; otherwise you will receive an HTTP 401 error.

The application should be given proper API permissions. An example of full permissions is provided below:

Setting up a Certificate for SharePoint Online

The following steps walk through creating a certificate, importing it into VisualCron, uploading it to Microsoft Entra, and configuring the connection.

Step 1 — Create the certificate

Open Windows PowerShell as Administrator and run the following to create a self-signed certificate:

$cert = New-SelfSignedCertificate `
-Subject "CN=YourCertName" `
-CertStoreLocation "Cert:\CurrentUser\My" `
-KeyExportPolicy Exportable `
-KeySpec Signature `
-KeyLength 2048 `
-NotAfter (Get-Date).AddYears(3) `
-FriendlyName "YourCertName"

This script can be adapted to any environment — it is provided as a sample for testing purposes.

Step 2 — Export the certificate files

Run the following to export the certificate as a .pfx file (you will be prompted for a password):

Export-PfxCertificate -Cert $cert -FilePath "C:\Temp\MySPOApp.pfx" `
-Password (Read-Host -AsSecureString "Enter password")

To export the public key as a .cer file:

Export-Certificate -Cert $cert -FilePath "C:\Temp\MySPOApp.cer"

Both files will be saved to the specified path (e.g. C:\Temp\).

Step 3 — Import the certificate into VisualCron

In the VisualCron client, navigate to Global Objects > Certificates > Import Certificate and select the .pfx file. VisualCron will prompt for the password set during export. Once entered, the certificate will appear in the VisualCron certificate list.

Step 4 — Collect Client ID and Tenant ID from Microsoft Entra

Log into Microsoft Entra, navigate to App registrations, and open your SharePoint application. From the Overview page, collect the following values:

  • Application (client) ID — used as the Client Id in VisualCron
  • Directory (tenant) ID — used as the Tenant Id in VisualCron

Step 5 — Upload the certificate to Microsoft Entra

In the same app registration, navigate to Certificates & Secrets > Certificates and click Upload certificate. Upload the .cer file created in Step 2.

Step 6 — Set API permissions

In the app registration, navigate to API Permissions and ensure the following SharePoint permissions are granted (Application type):

  • Sites.FullControl.All
  • Sites.Manage.All
  • Sites.Read.All
  • Sites.ReadWrite.All

Grant admin consent for all required permissions.

Step 7 — Configure the connection in VisualCron

In the VisualCron client, open the SharePoint Online connection settings (Connection settings tab) and fill in:

  • Address — The SharePoint site URL from the SharePoint admin console (e.g. https://yourtenant.sharepoint.com/sites/yoursitename)
  • Authentication type — Certificate
  • Client Id — The Application (client) ID from Step 4
  • Tenant Id — The Directory (tenant) ID from Step 4
  • Certificate — The certificate imported in Step 3

Click Test to verify the connection.

Setting up a Secret for Sharepoint Online

To generate a Client Secret, navigate within the Microsoft Tenant to Certificates & Secrets > Client secrets and click New client secret. Set a description and expiry, then click Add. Copy the secret Value immediately — it will not be shown again.

To set API permissions, navigate to API Permissions and add the following SharePoint Application permissions:

  • Sites.FullControl.All
  • Sites.Manage.All
  • Sites.Read.All
  • Sites.ReadWrite.All

Click Grant admin consent to apply the permissions.

Troubleshooting and Sources

More information about AppOnly and Certificates can be found here(with PowerShell script sample for generating a certificate).

Cannot contact web site 'https://xxx.sharepoint.com/' or the web site does not support SharePoint Online credentials. The response status code is 'Unauthorized'

Allow access for Apps that don't use modern authentication.