Skip to content
English
  • There are no suggestions because the search field is empty.

Cloud Connector: How do I set up Cloud Connector to transfer Microsoft 365 Data into CloudNine Review? 

Third Party Connection Setup and Configuration for Microsoft 365

A downloadable PDF version of this article is available here. 

About CloudNine’s Cloud Connector

Use Cloud Connector to securely pull Microsoft 365 email and OneDrive data directly into CloudNine Review. Cloud Connector eliminates the need to download content and generate mail stores (PSTs) and related files; instead, Microsoft 365 data is transferred and processed directly in CloudNine Review. Before using Cloud Connector, you must configure Microsoft Entra ID to securely grant this third-party application access to your Microsoft 365 tenant

Create the Connection in Microsoft Entra ID

This guide provides a high-level overview of how to register an application in Microsoft Entra ID. Your organization is responsible for determining how to securely connect Microsoft Entra ID—and your data—to third-party applications in accordance with your security and compliance requirements. 

Helpful Links
  1. Register an Application: The foundational guide for creating an app identity in Entra ID.
  2. Configure API Permissions: Detailed steps on how to add and authorize permissions for your registered app.
  3. Add a Redirect URI: Security feature for Microsoft Entra ID authentication is sent to the intended recipient.
  4. Microsoft Graph Permissions Reference: A complete list of all scopes for emails (Mail.*) and files (Files.*).
  5. Granting Admin Consent: Instructions for administrators to approve high-privilege permissions tenant-wide.
  6. Restrict App to Users: Provides information on restricting users that can access the app.
Prerequisites
  • Global Administrator or Application Administrator role in Microsoft Entra ID.
  • Assumed knowledge of Microsoft Entra ID and how to register an application.
  • Active Microsoft 365 Subscription.

Step-by-Step Configuration in Microsoft Entra ID

Step 1: Register the Application in Microsoft Entra ID

Create an app identity that allows the third-party connector to authenticate.

  1. Sign in to the Microsoft Entra Admin center and navigate to Manage-App Registrations.
  2. Select New Registration.
  3. Enter a Name for the application: For example, CloudNine Cloud Connector.
  4. Set the Supported account types.
  5. Accounts in this organizational directory only (Single tenant).
  6. Redirect URI (See Step 2: Add a Redirect URI):
    1. CloudNine Connector settings:
      1. Public client/native (mobile/desktop).
      2. http://Localhost:5000.
    2. Click Register to create the app.

Step 2: Add a Redirect URI (required)

Establishes the desktop connections for CloudNine Discovery Portal to Cloud Connector to send data directly to CloudNine Review.

  1. Under Manage, select Authentication.
  2. Under Platform Configurations, select Add a platform.
  3. Choose Mobile and desktop
  4. For Redirect URL, type LocalHost:5000.
  5. Select Configure to complete.

Step 3: Configure API Permissions

Next, Microsoft Graph permissions must be added to access emails and files.

  1. In your app registration, under Manage, click API Permissions – Add a permission – Microsoft Graph.
  2. Select the Permissions
    1. Delegated Permissions (accesses API as a signed-in user).
  3. Add the required scopes, for example:
    1. Emails: Select Mail.Read.
    2. OneDrive Files: Files.Read.
    3. Calendars: Calendar.Read
  4. Grant Admin Consent: To apply these privileges across the organization, you must select Grant admin consent for [Tenant Name].

Step 4: Generate Authentication Credentials

To complete the configuration, the Cloud Connector needs the following credentials found on the App Overview page.

  • Application (client) ID
  • Directory (tenant) ID
  • Client credentials: Next to Client credentials, click Add a certificate or secret to create a new client secret.
    • On the Certificates & secrets page, select Client Secrets
    • Click New client secret. Add a client secret appears at the right.
      • Enter a Description for the secret.
      • Expires: Choose when the secret expires, the MS Recommended is 180 days (6 months) and is automatically selected.
      • Click
    • Immediately Copy the Secret ID
      • Note: The Secret ID is hidden when you navigate away from the page. You will want to copy this until you are ready to add the connector to CloudNine Review. 

Copy these three values: Application (client) ID, Directory (tenant) ID, and Client Secret to make the connection in CloudNine Review. 

Optional: Restricting User Access for Registered Apps

Once the Registered App is created, you can restrict the apps permission to selected users in the organization. Select All Applications - <Registered Application> - Manage to set user roles. 

  • Properties - Enable Assignment Required: Users must be assigned to access the registered app. 
  • Users and groups: Specify users that can acces the app. Users not assigned to the registered app connection will fail. 

Multiple Connectors can be added to CloudNine Review, allowing your IT administrator to register apps in Microsoft Entra ID to better control user access to specific data. For example, you may wish to have connectors created by location or department. 

Configuring Cloud Connector in CloudNine Review 

Transferring data to CloudNine Review