Post

Unatended access to sharepoint

Unatended access to sharepoint

imperfect image generated by AI Imperfect image generated by AI

Sharepoint - unatended access

Being able to upload some files from CI/CD pipeline directly to Sharpoint was something on my wish list for a long time. It was possible but at the cost of security - the pipeline would have access to all the Sharepoint sites in your organisation.

This changed when Site.Selected permission had been introduced. Once I read this blog post decided to give it a go.

This is not going to be full CI/CD pipeline solution but fundations allowing application to manipulate files on Sharepoint. What is most important, the application will use ‘application credential flow’ meaning it will have own identity and will have full access to single Sharepoint site.

In the future I plan to investigate more granural level access and describe using rclone for upload of the artifacts.

Setup - Sharepoint

The first step is to create Sharepoint site. You can find short instruction for creating site here. Something to keep in mind is that document library is called drive when accessing it through Microsoft Graph Api

Setup - EntraID

The next thing is to setup App Registration in EntraID. App Registration is an object in Azure holding information about your application. One of these information are api permissions the application have.

Install Azure Cli

Follow instructions given here.

Log in with Azure Cli

1
az login

Create app registration

1
2
az ad app create `
  --display-name <your-app-name>

Create service principal for the app registration

1
 az ad sp create --id <app-id>

Store id from the output. This is something which is know as client-id and we will need that in the following steps.

Create client secret

1
2
3
az ad app credential reset `
  --id <app-id> `
  --display-name <secret-name>

The output be like this:

1
2
3
4
5
{
  "appId": "cryptic-guid",
  "password": "cryptic-password",
  "tenant": "cryptic-guid"
}

Store password. I will call it client-secret in the following steps.
Store tennant. I will call it tenant-id in the following steps.
Store appId. I will call it client-id in the following steps.

Assign permissions to app

When you do it for the first time it is probably easier to do it from azure portal. However, I am writing this post also for my future self and I prefer to do it this way. Once you click on permission azure portal you will see the same information I am sharing here.

We need give Sites.Selected permission to Graph Api.

1
2
3
4
az ad app permission add `
  --id <appId> `
  --api 00000003-0000-0000-c000-000000000000 `
  --api-permissions 883ea226-0bf2-4a8f-9f9d-92c9162a727d=Role

=Role means this is an application permision and not a delegated permission.
00000003-0000-0000-c000-000000000000 is Microsoft Graph Api id.
883ea226-0bf2-4a8f-9f9d-92c9162a727d is Site.Selected permission id.
883ea226-0bf2-4a8f-9f9d-92c9162a727d=Role means that Site.Selected is an application permission.

Grant admin consnent

1
 az ad app permission admin-consent --id <app-id> 

Setup - Microsoft Graph

Install Microsoft Graph Cli

Follow instructions given here.

Login

Running the following command will open browser and perform authentication.

1
 mgc login --scopes Sites.Manage.All --strategy InteractiveBrowser

List sites

This step is a bit tricky. For the reason described here it is not possible to use simple https://graph.microsoft.com/v1.0/sites and i did not want to complicate this post with creating additional application flow authentication. mgc sites list --search "**" won’t work when using mgc. It does work when using Graph Explorer.

All the sharpoint sites will have a word “site” in it, so you can use the folowing command. Additionaly the output is limited only to id, webUrl and displayName.

1
mgc sites list --search "site" --select id,webUrl,displayName

One item of the array will look like this:

1
2
3
4
5
  {
    "id": "your-company.sharepoint.com,guid-1,guid-2",
    "webUrl": "https://your-company-name.sharepoint.com/sites/YourSite",
    "displayName": "YourSite"
  }

The display name should match the name of your Sharpoint site.

Note: You need to use full ‘your-company.sharepoint.com,guid-1,guid-2’ as site-id.

List site permisions

1
 mgc sites permissions list --site-id <site-id>

Create site permission

We don’t need more than read. This is orgin of body

1
2
3
mgc sites permissions create `
 --site-id <site-id> `
 --body '{"roles":["fullcontrol"],"grantedToIdentities":[{"application":{"id":"<client-id>","displayName":"<som-name>"}}]}'

Confirm permission

1
2
3
mgc sites permissions get `
 --site-id <site-id> `
 --permission-id <permission-id>

Testing - delegated credentials flow

I call this section ‘delegated credentials flow’ because this is what is being used when loging in using mgc login --scopes Sites.Manage.All --strategy InteractiveBrowser. You delegate your own permissions to mgc. This is not so exciting but let’s play with some command here and then repeat the process with ‘application credentials flow’.

List drives in site

1
2
3
mgc sites drives list `
  --site-id <site-id> `
  --select id,name

The name should match document library name in Sharepoint.

Get root folder of the drive

Files are not stored directly on drive object but on the root of the drive. Therfore we need to find it’s id.

1
2
mgc drives root get `
  --drive-id  <drive-id>

List drive items (folders/files) on the drive’s root item

1
2
3
4
mgc drives items children list `
 --drive-id  <drive-id> `
 --drive-item-id <root-item-id> `
 --select id,name,folder

List drive itmes (folder/files) in a drive item (folder)

You can run exactly the same command as before but just using chosen folder id.

1
2
3
4
mgc drives items children list `
 --drive-id  <drive-id> `
 --drive-item-id <your-nested-folder-item-id> `
 --select id,name,folder

Download file from Sharepoint

Upload some file to Sharpoint manually. Then find it’s id using mgc drives items children list command and download.

1
2
3
4
mgc drives items content get `
  --drive-id <drive-id> `
  --drive-item-id <drive-item-id> `
  --output-file c:\download-test-file.txt 

Update existing file content

Create local file manualy. Then update content of the file on Sharepoint with content of the local file.

1
2
3
4
mgc drives items content put `
  --drive-id <drive-id> `
  --drive-item-id <drive-item-id> `
  --input-file c:\update-test-file.txt

Logout

1
 mgc logout

Testing - application credentials flow

Now the fun starts. Provided we have done everything correctly we should be able to perform all the tests but not using our credentials but application credentials.

Login

There are various ways of doing it. For full list of strategies run mgc login --help. I have decided on simplicity here (at least in terms of authentication) therfore using enviroment variables and client secret.

Set enviromental variables:

This is not the best method for setting environmental variables because secret will be stored in your powershell history. Choose your own method, just wanted to present what variables are required.

1
2
3
$env:AZURE_TENANT_ID = <tenant-id>
$env:AZURE_CLIENT_ID = <client-id>
$env:AZURE_CLIENT_SECRET = <client-secret>

Run login command:

1
mgc login --strategy Environment

Test with application credentials flow

This is the place where fun starts. If the setup is correct you will be able to repeat the test you did with delegated credentials.

Summary

As I have mentioned in the begining this is no complete solution for CI/CD but it is the most difficult part. Using mgc is definitely not most convinient way of manipulating files on Sharepoint. You probably noticed that I haven’t even tried things like creating file or directory. In the future will present how using rclone can make things simpler.

This post is licensed under CC BY 4.0 by the author.