/
Security configuration (tia® Connect)

Security configuration (tia® Connect)

 

Overview

 

 

Up to four application service principals are involved in securing the communication of the tia® Connect SharePoint process:

  1. tia® Connect SharedLink Authentication: This secures the request from the browser of a SharePoint user that got a ShareLink or open an archived document from SharePointUI

  2. tia® Connect Authentication: General authentication for all request from SharePoint (CustomConnector) against tia® Connect

  3. tia® Connect to tia® Core CMIS: Used for interprocess communication authentication between tia® Connect and tia® Core CMIS

  4. tia® Connect to Graph API: tia connect fetches document from SharePoint and uses this to secure and authenticate against Microsoft Graph.

 

 

1. tia® Connect SharedLink Authentication

This secures browser calls from user that got a share link or that try to open from SharePoint a archived document via direct access to the archive. The required permissions are: Required App Registrations | App Registrations for communication with tia® Connect via Browser/ Custom Conne...

Parent

Parameter

Description

Required

Default

Parent

Parameter

Description

Required

Default

tia.security

oidc.type

Type of the authentication

none | client_credentials | authorization_code

none

spring.security.oauth2.client.provider.azure

issuer-uri

Issuer URI of the authorization server

yes

 

spring.security.oauth2.client.provider.azure

user-name-attribute

The name of the attribute in the token that references the Name or Identifier of the end-user

no

 

spring.security.oauth2.client.registration.sharedlinkauth

provider

Name of the configured provider

yes

 

spring.security.oauth2.client.registration.sharedlinkauth

client-id

The client identifier

yes

 

spring.security.oauth2.client.registration.sharedlinkauth

client-secret

The client secret

yes

 

spring.security.oauth2.client.registration.sharedlinkauth

authorization-grant-type

A credential representing the resource owner's authorization used by the client to obtain an access token

yes

 

spring.security.oauth2.client.registration.sharedlinkauth

scope

The scope(s) requested by the client during the authorization request

yes

 

spring: security: oauth2: client: provider: azure: issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0 user-name-attribute: name registration: sharedlinkauth: provider: azure client-id: <client id> client-secret: <client secret> authorization-grant-type: authorization_code scope: - openid - email - profile

 

 

2. tia® Connect Authentication

This is an app registration that will be used to secure the connection between the custom connector and tia Connect. tia Connect will only validate token. The token requests are performed by the custom connector. The required permissions are Required App Registrations | App Registrations for communication with tia® Connect via Browser/ Custom Conne... .

Parent

Parameter

Description

Supported values

Default

Parent

Parameter

Description

Supported values

Default

tia.security

oidc.type

Type of the authentication, usually authorization_code

none | client_credentials | authorization_code

none

spring.security.oauth2.resourceserver.jwt

issuer-uri

Issuer URI of the authorization server

<user>

 

spring.security.oauth2.resourceserver.jwt

audience

Expected audience in the aud claim for the token validation

<user>

 

spring.security.oauth2.resourceserver.jwt

master-tenant-id

Expected tenant ID in the tid claim for the token validation

<user>

 

To ensure correct authentication functionality tia® Connect needs to be configured with tia.security.oidc.type=authorization_code .

The main authentication will be client credentials flow, but to ensure the authorization code flow for shared links this configuration needs to be done.

For an example see the https://kgs-software.atlassian.net/wiki/x/CgDf0

tia: security: oidc: type: authorization_code spring: security: oauth2: resourceserver: jwt: issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0 audience: <audience> master-tenant-id: <tenant id>

 

3. tia® Connect to tia®Core CMIS

There are two options

  • Authentication via client_secret

  • Authentication via certificate

For client_secret authentication, only a client ID and a client secret need to be configured.

For certificate authentication, a keystore containing the key pair must be provided. A certificate must be generated from this and imported into the app registration.
The client-authentication-method tls_client_auth or self_signed_tls_client_auth needs to get configured. The name of the configured SSL bundle needs to get configured into the tia.security.oidc.sslBundleName property.

How exactly this is configured is described as follows

You can use spring.security.oauth2.client.registration.cmisauth.cmisauthwithcert or spring.security.oauth2.client.registration.cmisauth never both.

Parent

Parameter

Description

Required

Parent

Parameter

Description

Required

spring.security.oauth2.client.provider.azure

issuer-uri

Issuer URI of the authorization server

yes

spring.security.oauth2.client.provider.azure

user-name-attribute

The name of the attribute in the token that references the Name or Identifier of the end-user

no

spring.security.oauth2.client.registration.cmisauth

provider

Name of the configured provider

yes

spring.security.oauth2.client.registration.cmisauth

client-id

The client identifier

yes

spring.security.oauth2.client.registration.cmisauth

client-secret

The client secret

yes

spring.security.oauth2.client.registration.cmisauth

authorization-grant-type

client_credentials

yes

spring.security.oauth2.client.registration.cmisauth

scope

<client-id>/.default

yes

spring.security.oauth2.client.registration.cmisauth

client-authentication-method

The authentication method used when authenticating the client with the authorization server.

Only needs to get overwritten with tls_client_auth or self_signed_tls_client_auth if the client_redentials flow should authenticate with a certificate

no

spring.ssl.bundle.jks.selfsignedcertificate.key

alias

Key alias

no

spring.ssl.bundle.jks.selfsignedcertificate.key

password

Key password

no

spring.ssl.bundle.jks.selfsignedcertificate.keystore

location

Path to the keystore

no

spring.ssl.bundle.jks.selfsignedcertificate.keystore

password

Keystore password

no

spring.ssl.bundle.jks.selfsignedcertificate.keystore

type

Type of the keystore, e.g. PKCS12

no

tia.security.oidc

sslBundleName

Name of the configured SSL bundle.

Only needed if spring.security.oauth2.client.registration.cmisauth.client-authentication-method is configured to tls_client_auth or self_signed_tls_client_auth

<user>

spring.security.oauth2.client.registration.cmisauth.cmisauthwithcert

provider

Name of the configured provider

yes

spring.security.oauth2.client.registration.cmisauth.cmisauthwithcert

client-id

The client identifier

yes

spring.security.oauth2.client.registration.cmisauth.cmisauthwithcert

client-authentication-method

The authentication method used when authenticating the client with the authorization server.

Only needs to get overwritten with tls_client_auth or self_signed_tls_client_auth if the client_redentials flow should authenticate with a certificate

yes

spring.security.oauth2.client.registration.cmisauth.cmisauthwithcert

authorization-grant-type

A credential representing the resource owner's authorization used by the client to obtain an access token

yes

spring.security.oauth2.client.registration.cmisauth.cmisauthwithcert

scope

The scope(s) requested by the client during the authorization request

yes

Client secret:

spring: security: oauth2: client: provider: azure: issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0 user-name-attribute: name registration: cmisauth: provider: azure client-id: <client id> client-secret: <client secret> authorization-grant-type: client_credentials scope: <client id>/.default tia: instances: default: cmis: url: <cmis-URL>/browser repositoryid: <repoid> auth: type: oauth2 oauth2: clientRegistrationId: cmisauth

Certificates:

spring: security: oauth2: client: provider: azure: issuer-uri: https://login.microsoftonline.com/<tenant id>/v2.0 user-name-attribute: name registration: cmisauthwithcert: provider: azure client-id: <client id> client-authentication-method: self_signed_tls_client_auth authorization-grant-type: client_credentials scope: <client id>/.default ssl: bundle: jks: selfsignedcertificate: key: alias: <key alias> password: <key password> keystore: location: <path to>\<keystore>.p12 password: <keystore password> type: PKCS12 tia: instances: default: cmis: url: <cmis-URL>/browser repositoryid: <repoid> auth: type: oauth2 oauth2: clientRegistrationId: cmisauthwithcert

4. tia® Connect to Graph API

After the inital request from Power Automate through the Custom Connector, tia connect get the file itself from Microsoft Graph Api. Required permissions are minimum: Required App Registrations | App Registrations for metadata and file content (sites) .

There are several configuration options available:

4.1 Connection via client id and client secret

tia connect has credentials to direct authenticate against azure:

Parent

Parameter

Description

Supported values

Default

Parent

Parameter

Description

Supported values

Default

tia.instances.<instance|default>.sharepoint.graph

clientId

ID of the Azure app registration

<user>

 

tia.instances.<instance|default>.sharepoint.graph

clientSecret

Client Secret for the app registration

<user>

 

tia.instances.<instance|default>.sharepoint.graph

appregistrationtenantId

The tentantId of the app registration, only required when SharePoint Tentant and app registration tenant are different

<user>

 

tia: instances: default: sharepoint: graph: clientSecret: <clientSecret> clientId: <appregistrationURL>

4.2 Connection via PFX Certificate local stored

The Certificate must be inside an PFX store, which have to contain the private and public key (public certificate). see Create a self-signed public certificate to authenticate your application - Microsoft identity platform in general and for the export: https://learn.microsoft.com/en-us/entra/identity-platform/howto-create-self-signed-certificate#optional-export-your-public-certificate-with-its-private-key

Parent

Parameter

Description

Supported values

Default

Parent

Parameter

Description

Supported values

Default

tia.instances.<instance|default>.sharepoint.graph

clientId

ID of the Azure app registration

<user>

 

tia.instances.<instance|default>.sharepoint.graph

certificatePath

Location of a PFX certificate with private and public key (public certificate). Full path is required with filename.

<user>

 

tia.instances.<instance|default>.sharepoint.graph

certificatePassword

pfx keystore password

<user>

 

tia.instances.<instance|default>.sharepoint.graph

appregistrationtenantId

The tentantId of the app registration, only required when SharePoint Tentant and app registration tenant is different

<user>

 

tia: instances: default: sharepoint: graph: certificatePassword: <password> certificatePath: <fullPathToFileWithFilename> clientId: <appregistrationURL>

4.3 Connection via PFX Certificate in Azure Key Vault

After the inital request from Power Automate through the Custom Connector, tia connect get the file itself from Microsoft Graph Api. Required permissions are minimum: Required App Registrations | App Registrations for metadata and file content (sites) .

The Certificate must be in PFX Format and have contain the private and public key (public certificate). see Create a self-signed public certificate to authenticate your application - Microsoft identity platform.

An Azure Key Vault with certificate need to be prepared.

Parent

Parameter

Description

Supported values

Default

Parent

Parameter

Description

Supported values

Default

tia.instances.<instance|default>.sharepoint.graph

clientId

ID of the Azure app registration

<user>

 

tia.instances.<instance|default>.sharepoint.graph

certificateName

Name that was used in Azure Key Vault to import the certificate

<user>

 

tia.instances.<instance|default>.sharepoint.graph

certificateUri

URI for the Azure Key Vault in format https://<name>.vault.azure.net/ can be copied from Vault URI in Azure Key Vault overview page.

<user>

 

tia.instances.<instance|default>.sharepoint.graph

appregistrationtenantId

The tentantId of the app registration, only required when SharePoint Tentant and app registration tenant is different

<user>

 

The certificate is getting fetched from Azure Key Vault. There are two possible authentication ways available:

4.3.1 Authentication by client id and secret

The App registration need to have “Get“ Permissions for Certificates and Secrets in the access Policies of the Keystore.

Parent

Description

Supported values

Default

Parent

Description

Supported values

Default

AZURE_CLIENT_ID

Environment Variable for ID of the Azure app registration

<user>

 

AZURE_CLIENT_SECRET

Environment Variable for Client Secret for the app registration

<user>

 

AZURE_TENANT_ID

Environment Variable for tenantid where the key vault is located in

<user>

 

tia: instances: default: sharepoint: graph: certificateName: tiash certificateUri: <keyvaultURL> clientId: <appregistrationURL>

 

4.3.2 Authentication by managed identity

see https://learn.microsoft.com/en-us/azure/frontdoor/managed-identity

Parent

Parameter

Description

Supported values

Default

Parent

Parameter

Description

Supported values

Default

no configuration required

tia: instances: default: sharepoint: graph: certificateName: tiash certificateUri: <keyvaultURL> clientId: <appregistrationURL>

Related content