Skip to main content

Connecting Microsoft SharePoint to Axiamatic

Connect SharePoint to enable agents to analyze files, resolve link metadata, and identify ownership gaps across integrated data sources

A
Written by Axiamatic
Updated this week

Connecting Microsoft SharePoint to Axiamatic allows the platform to analyze your files and collaboration activity securely, based on the access granted by your Microsoft 365 administrator. With the latest update, organizations with stricter controls can now limit Axiamatic’s access to only specific SharePoint sites approved by their admin.


Step 1: Open Settings and Integrations

Log in to your Axiamatic account and click your profile icon in the top navigation. From the dropdown, select Settings, then open the Integrations section.

Step 2: Connect to SharePoint

On the Integrations page, locate the File Sync section and find the SharePoint integration card. Click the Connect button on the SharePoint card to begin the setup.

You will now see a pop-up confirming the action.

Step 3: Choose Shared or Private Connection

When prompted, select how you want to scope this connection.​

  • Shared Connection: Makes this SharePoint connection available to all current and future projects or business units using Axiamatic in your workspace. This is the recommended option for most teams.

  • Private Connection: Limits this SharePoint connection to the current project or account only. Future projects will need their own separate SharePoint connection.

Choose the option that best fits how your organization manages projects and data.

Step 4: Choose the Access Mode

Next, choose how Axiamatic should access your SharePoint sites.​

  • Option 1 – Default Authentication: Axiamatic can access all SharePoint sites and content that you (the connecting user) can access, based on the delegated permissions granted to the app. Use this if you do not need to restrict Axiamatic to a subset of sites.

  • Option 2 – Access Only for Selected Sites: Axiamatic will only be able to read data from specific SharePoint sites that your Microsoft 365 admin later grants access to. Use this if your organization has strict policies and wants to tightly control which sites Axiamatic can access.

Select the option that aligns with your internal security and compliance requirements

How to get Azure Tenant Id?

Follow these steps to retrieve the ID for a Microsoft Entra tenant in the Azure portal.

  1. Sign in to the Azure portal.

  2. Confirm that you are signed into the tenant for which you want to retrieve the ID. If not, switch directories so that you're working in the right tenant.

  3. Under the Azure services heading, select Microsoft Entra ID. If you don't see Microsoft Entra ID here, use the search box to find it.

  4. Find the Tenant ID in the Basic information section of the Overview screen.

  5. Copy the Tenant ID by selecting the Copy to clipboard icon shown next to it. You can paste this value into a text document or other location.

Step 5: Authenticate with Microsoft and Request Approval

A Microsoft sign-in window opens and asks you to choose the email account whose SharePoint will be connected to Axiamatic.​

  • If this is the first time your organization is connecting Axiamatic to SharePoint, your Microsoft 365 admin must approve the app.

  • The Microsoft consent screen will show the permissions Axiamatic is requesting (such as read-only access to files and sites you can access).

  • You may see a field to justify your request to the admin. Enter a clear reason, such as reporting, project analytics, or data analysis, so your admin understands why approval is needed.​

If you're not logged into Microsoft:

  1. Enter your Microsoft account credentials (email and password)

  2. Click Sign in

  3. Review the requested permissions

Click Request approval (or the equivalent consent button shown) to submit the request to your admin. At this point, your admin receives the approval request and needs to review and grant consent in the Azure portal.

Note: This authentication is handled securely by Microsoft. Your credentials are not stored by Axiamatic.

Step 6: Wait for Admin Approval

Your request now appears in the Admin consent requests section of Microsoft Entra ID (Azure AD) for an administrator to review. Once the admin reviews the permissions and approves the request, you will receive an email notification from Microsoft indicating that the app has been approved.​

If admins or users do not see consent requests as expected, your IT administrator may need to adjust Admin consent and User consent settings in the Azure portal as described in the Troubleshooting section of this article.

Note: Approval times vary by organization.

Step 7: Reconnect After Approval

After your admin has approved Axiamatic:​

  1. Return to Axiamatic and go back to Settings → Integrations.

  2. On the SharePoint card, click Connect again.

  3. Repeat Step 3 (choose Shared or Private Connection) and Step 4 (select Default Authentication or Access Only for Selected Sites).

Integration complete! Your SharePoint account is now connected and ready to use with Axiamatic.

A Microsoft window will appear asking you to select the email account again, but the detailed permissions screen will usually be skipped because the admin has already granted consent. Select the correct email account and proceed to complete the connection.​

Once the connection succeeds, the SharePoint card in Axiamatic will show a "Connected" status, confirming that the integration is ready to use.

Granting Site Access for “Selected Sites Only”

If you chose Access Only for Selected Sites in Step 4, an additional step is required so Axiamatic can start reading data from specific SharePoint sites.​

  • Your Microsoft 365 admin must explicitly grant Axiamatic access to the desired SharePoint sites using tools like Microsoft Graph Explorer or PowerShell.

  • By granting access only to selected sites, admins ensure that Axiamatic can read documents and metadata only from those approved locations, even if the connecting user has broader access in SharePoint.

Once site-level permissions are configured, Axiamatic will begin syncing and analyzing data from the allowed sites only.


Troubleshooting

If admins are not receiving access requests or team members cannot submit requests, these Azure settings may need to be configured by your IT administrator.

Issue: Admin Not Receiving Requests

Admin Solution: Enable Admin Consent Requests

  1. Access Azure Portal:

    • Sign in to the Azure Portal (portal.azure.com) with admin credentials

  2. Configure Admin Consent Settings:

    • Go to Enterprise applications > Consent and permissions > Admin consent settings

    • Ensure "Users can request admin consent to apps they are unable to consent to" is set to Yes

    • Optional: Add specific reviewers below the toggle to designate who can approve these requests

Issue: Team Members Cannot Submit Consent Requests

Admin Solution: Configure User Consent Settings

  1. Access User Consent Settings:

    • From the same Consent and permissions section, click User consent settings

    • This option appears directly above Admin consent settings

  2. Select Appropriate Permission Level:

    • Choose one of the more permissive options at the bottom of the page

    • This allows people to either consent directly or submit requests for admin review


Admin Approval Process

While team members wait for approval, Azure administrators need to review and approve the access request through the Azure Portal.

For Azure Administrators:

Step 1: Access Azure Portal

Sign in to https://portal.azure.com/ with your admin credentials

Step 2: Navigate to Admin Consent Requests

  1. Go to Microsoft Entra ID

  2. Click Enterprise applications

  3. In the left navigation, click Admin consent requests (under Activity)

Step 3: Review and Approve Request

  1. Locate the Axiamatic application under My pending or All tabs

  2. Click on the application to open the review panel on the right

  3. Click Review permissions and consent

Approval complete! The requesting team member will receive an email notification and can go ahead with the integration.

Need additional guidance? For detailed information on the admin consent process, refer to Microsoft's comprehensive documentation: Review admin consent requests


How Axiamatic Uses Your SharePoint Data

Read-only access only - Axiamatic cannot modify, delete, or create any data in your SharePoint account.

What Axiamatic accesses:

File Access (Critical)

  • Permission: files.read.all

  • What it does: Reads all files that you can access in SharePoint

  • Used for: Downloading SharePoint files and folders for analysis

Site Information (Critical)

  • Permission: sites.read.all

  • What it does: Reads items across all sites you can access in SharePoint

  • Used for: Resolving SharePoint links and fetching drive and folder IDs

User Information (Enhanced Features)

  • Permission: user.readbasic.all

  • What it does: Reads user profile information

  • Used for: Attributing files and managing ownership assignments to users

Your data security: All permissions are delegated, meaning Axiamatic only accesses information you already have permission to view in SharePoint and never makes changes to your account.


For pricing information, demo requests, or assistance, contact us at [email protected]

Did this answer your question?