Using Sharepoint Modern Authentication
Step 1: Preparing an Application Certificate
Prepare the application certificate as follows:
- Create (or load) an IIS certificate on NDC Server (recommended).
NOTE: This certificate should be installed for the local machine so that it can be accessed by Netwrix Data Classification and other services. - Export the certificate (
.CERfile):- Open the certificate in IIS management console.
- Go to the Details tab.
- Select Copy to File.
NOTE: Do not export private key. - Set file type to DER-encoded
CER.
Step 2: Creating and Registering a New App in Microsoft Entra ID (formerly Azure AD)
To register a new application, do the following:
- Sign into the Microsoft 365 Admin Center (with your Global Administrator, Application Administrator or Cloud Application Administrator account).
- Search for and select the Microsoft Entra admin center.
- Under the Azure Directory select the App registrations section.
- Select New registration.

- In the Name field, enter the application name.
- In the Supported account types select who can use this application – use the Accounts in this organizational directory only option.
- Click the Register button.

NOTE: Application redirect URL is optional; you can leave it blank on this step. - Copy your application ID from the Overview section to a safe location.
Step 3: Granting Required Permissions
Next, you need to grant your new application the required API permissions. Azure AD applications can be assigned Delegated or Application permissions:
- Delegated permissions require a signed-in user present who consents to the permissions every time an API call is sent.
- Application permissions are consented by an administrator once granted.
For the newly created app, you should use Application permissions.
NOTE: By default, a new application is granted one delegated permission for Microsoft Graph API – User.Read. It is not required and can be removed.
Do the following: When found, click on the entry and proceed with adding the necessary permissions. The steps from here on remain the same, so in most cases you would need the Application permissions entry, and the relevant set of permissions therein.
- Select the relevant entries, then click Add permissions.
- On the Request API permissions → Microsoft APIs pane, scroll down and select SharePoint.
- Select Application Permissions.
- Apply the following permissions:
- Graph – Application permissions (With admin consent granted)
Sites.FullControl.All(Crawling)
- SharePoint – Application permissions (With admin consent granted)
Sites.FullControl.All(Crawling)TermStore.ReadWrite.All(Term Set access)
NOTE: For taxonomy manager to fully operate you must also make the userapp@sharepointa taxonomy admin (or group admin)

- Graph – Application permissions (With admin consent granted)
- Click Add permissions.
Step 4: Configuring Certificates & Secrets
Having configured the app, you can upload its application certificate.
- In the app settings, click Certificates & secrets and select Upload certificate.
- Upload the
.CERfile you prepared in Step 1: Preparing an Application Certificate (see https://docs.netwrix.com/docs/dataclassification/5_7). - Copy the certificate thumbprint to a safe location.
Step 5: Obtaining Tenant ID
- Open Microsoft Entra admin center.
- Select Azure Active Directory > Overview section for the required Exchange Online organization.
- Locate the Tenant ID and copy it to a safe location.