Microsoft SharePoint Connector Data Sheet
Release Notes
Released Versions
SDK 1.4 (ViaWorks 2.8)
SDK 1.5 (Locator 2.9)
SDK 1.6 (Locator 2.10 and Locator 2.11)
SDK 3.0 (Locator 3.0)
Supported SharePoint Versions
SharePoint 2007, 2010, 2013, or 2016 server (Foundation, Standard, and Enterprise) located within the same domain as the Locator Server.
SharePoint Online
Limitations
Claims-based authentication not supported
SAML token-based authentication not supported
Prerequisites
A license for the SharePoint Connector.
In order to save Source Credentials and search SharePoint Online repositories, users must have at least "Read" permissions to the root site collection https://[tenant].sharepoint.com and not have Azure Multi-Factor Authentication (MFA) enabled.
If you are to index a Ecspand repository a license for the Ecspand plugin is required.
For Sharepoint Online, if you choose to use Azure AD Application instead of an index user, the Azure AD connector needs to be installed and configured with a connection to the same tenant
Official support for Index User credentials has been deprecated as of August 2023. While the connector will continue to accept them as an option until further notice, the Azure AD Application option should be used instead.
For details, please consult FAQ - Deprecation of support for Index User credentials in Sharepoint Online and OneDrive connections
For SharePoint Online, if you choose to use an index user then the LegacyAuthProtocolsEnabled tenant setting has to be set to True. If you choose to use Azure AD Application instead of an index user then LegacyAuthProtocolsEnabled setting can be left untouched.
Supported Data Types
The connector supports indexing the following data types:
Crawl Methods
Full Crawl: The SharePoint Connector supports scheduling periodic full scans of the source system.
Incremental Crawl: SharePoint Change Sets are supported for SharePoint 2013, SharePoint, 2016 and SharePoint Online.
DocumentHandler
Not required.
Other information
Conditional Access:
Make sure that you don't have any conditional access rules which disable access to Office365 applications. Check if there is no restrictions for index user's location, device etc...
Also in 'Grand' tab under Access Control "MFA" shouldn't be checked, because connector doesn't support it.
For more info see: https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-block-access
ayfie