You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/solution-guidance/security-apponly-azureacs.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Granting access using SharePoint App-Only
3
3
description: Granting access using SharePoint App-Only
4
-
ms.date: 12/27/2022
4
+
ms.date: 02/26/2022
5
5
ms.prod: sharepoint
6
6
author: vesajuvonen
7
7
ms.author: vesaj
@@ -14,7 +14,7 @@ ms.localizationpriority: medium
14
14
SharePoint App-Only is the older, but still very relevant, model of setting up app-principals. This model works for both SharePoint Online and SharePoint 2013/2016/2019 on-premises and is ideal to prepare your applications for migration from SharePoint on-premises to SharePoint Online. Below steps show how to setup an app principal with tenant full control permissions, but obviously you could also grant just read permissions using this approach.
15
15
16
16
> [!IMPORTANT]
17
-
> Azure Access Control (ACS), a service of Azure Active Directory (Azure AD), has been retired on November 7, 2018. This retirement does not impact the SharePoint Add-in model, which uses the `https://accounts.accesscontrol.windows.net` hostname (which is not impacted by this retirement). For more information, see [Impact of Azure Access Control retirement for SharePoint Add-ins](https://devblogs.microsoft.com/microsoft365dev/impact-of-azure-access-control-deprecation-for-sharepoint-add-ins/). For new tenants, apps using an ACS app-only access token is disabled by default. We recommend using the Azure AD app-only model which is modern and more secure. But you can change the behavior by running ‘set-spotenant -DisableCustomAppAuthentication $false' (needs the latest SharePoint admin PowerShell).
17
+
> Azure Access Control (ACS), a service of Azure Active Directory (Azure AD), has been retired on November 7, 2018. This retirement does not impact the SharePoint Add-in model, which uses the `https://accounts.accesscontrol.windows.net` hostname (which is not impacted by this retirement). For more information, see [Impact of Azure Access Control retirement for SharePoint Add-ins](https://devblogs.microsoft.com/microsoft365dev/impact-of-azure-access-control-deprecation-for-sharepoint-add-ins/). For new tenants, apps using an ACS app-only access token is disabled by default. We recommend using the Azure AD app-only model which is modern and more secure. But you can change the behavior by running 'set-spotenant -DisableCustomAppAuthentication $false' (needs the latest SharePoint admin PowerShell).
18
18
19
19
## Setting up an app-only principal with tenant permissions
20
20
@@ -48,7 +48,7 @@ With the preparation work done let's continue to the next chapter showing how yo
48
48
49
49
## Using this principal with PnP PowerShell
50
50
51
-
If you want to utilize the generated app-only registration with [PnP PowerShell](https://aka.ms/pnp-powershell), you can do so by connecting to your SharePoint On-Premises or Online environment using:
51
+
If you want to utilize the generated app-only registration with [PnP PowerShell](https://aka.ms/pnp/powershell), you can do so by connecting to your SharePoint On-Premises or Online environment using:
## Using this principal in your application using the PnP Framework library
60
60
61
-
In a first step, you add the PnP Framework library nuget package: https://www.nuget.org/packages/PnP.Framework. Once that’s done you can use below code construct:
61
+
In a first step, you add the PnP Framework library nuget package: https://www.nuget.org/packages/PnP.Framework. Once that's done you can use below code construct:
0 commit comments