Connecting Microsoft SharePoint to Axiamatic allows the platform to analyze your files and collaboration activity securely, based on the access granted by your Microsoft 365 administrator. With the latest update, organizations with stricter controls can now limit Axiamatic’s access to only specific SharePoint sites approved by their admin.
Step 1: Open Settings and Integrations
Log in to your Axiamatic account and click your profile icon in the top navigation. From the dropdown, select Settings, then open the Integrations section.
Step 2: Connect to SharePoint
On the Integrations page, locate the File Sync section and find the SharePoint integration card. Click the Connect button on the SharePoint card to begin the setup.
You will now see a pop-up confirming the action.
Step 3: Choose Shared or Private Connection
When prompted, select how you want to scope this connection.
Shared Connection: Makes this SharePoint connection available to all current and future projects or business units using Axiamatic in your workspace. This is the recommended option for most teams.
Private Connection: Limits this SharePoint connection to the current project or account only. Future projects will need their own separate SharePoint connection.
Choose the option that best fits how your organization manages projects and data.
Step 4: Choose the Access Mode
Next, choose how Axiamatic should access your SharePoint sites.
Option 1 – Default Authentication: Axiamatic can access all SharePoint sites and content that you (the connecting user) can access, based on the delegated permissions granted to the app. Use this if you do not need to restrict Axiamatic to a subset of sites.
Option 2 – Access Only for Selected Sites: Axiamatic will only be able to read data from specific SharePoint sites that your Microsoft 365 admin later grants access to. Use this if your organization has strict policies and wants to tightly control which sites Axiamatic can access.
Select the option that aligns with your internal security and compliance requirements
How to get Azure Tenant Id?
How to get Azure Tenant Id?
Follow these steps to retrieve the ID for a Microsoft Entra tenant in the Azure portal.
Sign in to the Azure portal.
Confirm that you are signed into the tenant for which you want to retrieve the ID. If not, switch directories so that you're working in the right tenant.
Under the Azure services heading, select Microsoft Entra ID. If you don't see Microsoft Entra ID here, use the search box to find it.
Find the Tenant ID in the Basic information section of the Overview screen.
Copy the Tenant ID by selecting the Copy to clipboard icon shown next to it. You can paste this value into a text document or other location.
Step 5: Authenticate with Microsoft and Request Approval
A Microsoft sign-in window opens and asks you to choose the email account whose SharePoint will be connected to Axiamatic.
If this is the first time your organization is connecting Axiamatic to SharePoint, your Microsoft 365 admin must approve the app.
The Microsoft consent screen will show the permissions Axiamatic is requesting (such as read-only access to files and sites you can access).
You may see a field to justify your request to the admin. Enter a clear reason, such as reporting, project analytics, or data analysis, so your admin understands why approval is needed.
If you're not logged into Microsoft:
Enter your Microsoft account credentials (email and password)
Click Sign in
Review the requested permissions
Click Request approval (or the equivalent consent button shown) to submit the request to your admin. At this point, your admin receives the approval request and needs to review and grant consent in the Azure portal.
Note: This authentication is handled securely by Microsoft. Your credentials are not stored by Axiamatic.
Step 6: Wait for Admin Approval
Your request now appears in the Admin consent requests section of Microsoft Entra ID (Azure AD) for an administrator to review. Once the admin reviews the permissions and approves the request, you will receive an email notification from Microsoft indicating that the app has been approved.
If admins or users do not see consent requests as expected, your IT administrator may need to adjust Admin consent and User consent settings in the Azure portal as described in the Troubleshooting section of this article.
Note: Approval times vary by organization.
Step 7: Reconnect After Approval
After your admin has approved Axiamatic:
Return to Axiamatic and go back to Settings → Integrations.
On the SharePoint card, click Connect again.
Repeat Step 3 (choose Shared or Private Connection) and Step 4 (select Default Authentication or Access Only for Selected Sites).
Integration complete! Your SharePoint account is now connected and ready to use with Axiamatic.
A Microsoft window will appear asking you to select the email account again, but the detailed permissions screen will usually be skipped because the admin has already granted consent. Select the correct email account and proceed to complete the connection.
Once the connection succeeds, the SharePoint card in Axiamatic will show a "Connected" status, confirming that the integration is ready to use.
Granting Site Access for “Selected Sites Only”
If you chose Access Only for Selected Sites in Step 4, an additional step is required so Axiamatic can start reading data from specific SharePoint sites.
Your Microsoft 365 admin must explicitly grant Axiamatic access to the desired SharePoint sites using tools like Microsoft Graph Explorer or PowerShell.
By granting access only to selected sites, admins ensure that Axiamatic can read documents and metadata only from those approved locations, even if the connecting user has broader access in SharePoint.
Once site-level permissions are configured, Axiamatic will begin syncing and analyzing data from the allowed sites only.
Troubleshooting
If admins are not receiving access requests or team members cannot submit requests, these Azure settings may need to be configured by your IT administrator.
Issue: Admin Not Receiving Requests
Admin Solution: Enable Admin Consent Requests
Access Azure Portal:
Sign in to the Azure Portal (
portal.azure.com) with admin credentials
Configure Admin Consent Settings:
Issue: Team Members Cannot Submit Consent Requests
Admin Solution: Configure User Consent Settings
Access User Consent Settings:
From the same Consent and permissions section, click User consent settings
This option appears directly above Admin consent settings
Select Appropriate Permission Level:
Choose one of the more permissive options at the bottom of the page
This allows people to either consent directly or submit requests for admin review
Admin Approval Process
While team members wait for approval, Azure administrators need to review and approve the access request through the Azure Portal.
For Azure Administrators:
Step 1: Access Azure Portal
Sign in to https://portal.azure.com/ with your admin credentials
Step 2: Navigate to Admin Consent Requests
Go to Microsoft Entra ID
Click Enterprise applications
In the left navigation, click Admin consent requests (under Activity)
Step 3: Review and Approve Request
Locate the Axiamatic application under My pending or All tabs
Click on the application to open the review panel on the right
Click Review permissions and consent
Approval complete! The requesting team member will receive an email notification and can go ahead with the integration.
Need additional guidance? For detailed information on the admin consent process, refer to Microsoft's comprehensive documentation: Review admin consent requests
How Axiamatic Uses Your SharePoint Data
Read-only access only - Axiamatic cannot modify, delete, or create any data in your SharePoint account.
What Axiamatic accesses:
File Access (Critical)
Permission:
files.read.allWhat it does: Reads all files that you can access in SharePoint
Used for: Downloading SharePoint files and folders for analysis
Site Information (Critical)
Permission:
sites.read.allWhat it does: Reads items across all sites you can access in SharePoint
Used for: Resolving SharePoint links and fetching drive and folder IDs
User Information (Enhanced Features)
Permission:
user.readbasic.allWhat it does: Reads user profile information
Used for: Attributing files and managing ownership assignments to users
Your data security: All permissions are delegated, meaning Axiamatic only accesses information you already have permission to view in SharePoint and never makes changes to your account.
For pricing information, demo requests, or assistance, contact us at [email protected]













