Configure OneDrive Integration
For information
OneDrive integration allows you to set hyperlinks to files in OneDrive in the PLANTA client.
This feature uses the Microsoft Graph API and requires prior registration of the application in Azure Active Directory.
Standard users need a Microsoft account to use the application and must agree to the terms of use.
Advantages
Direct link to files in OneDrive.
No uploading or copying to the PLANTA database required.
Always up-to-date access to the original file.
Requirements
For information
Microsoft Azure Active Directory tenant
Microsoft account for users
Azure app registration with required permissions
Configuring the client ID and tenant ID in PLANTA project
Azure app registration
Procedure
Log in to the Azure Portal.
„App Registrations“ → „New Registration“.
Allocate a name, e.g. "PLANTA OneDrive Integration".
Select account type: Accounts in this organizational directory.
Set redirect URI – the URL under which the web client runs must be specified here.
Complete registration.
API Authorizations
In the created app → "API Authorizations" → "Add authorization".
Microsoft Graph → Delegated permissions
Add the following authorizations:
Files.Read
Files.Read.All (optional access to all files in the organization)
(4. Save changes.)
Client ID and Tenant ID
After registration you will find the following information under "Overview":
Application (Client) ID
Directory (Tenant) ID
Both of these values are stored in PLANTA.
Configuration in PLANTA project
Procedure
Open the PLANTA System Settings.
Enter the following values from your Azure app registration:
OneDrive Client ID → Application (Client) ID
OneDrive Tenant ID → Directory (Tenant) ID
Save these settings.
Notes
When you insert a OneDrive link for the first time, a Microsoft login is triggered via a pop-up window. Users must authorize access to OneDrive via Microsoft Graph.
The links always point directly to the original file in OneDrive. The file itself is not stored in the PLANTA database.
Details
The integration uses OAuth 2.0 with Microsoft Graph.
Users can revoke access at any time in their Microsoft account.
Changes to the Azure app registration (e.g., revocation of permissions) may impair functionality in PLANTA.
In environments with multiple Azure tenants, the correct tenant ID must be stored.
Required Microsoft Graph permissions
Authorization | Type | Description |
|---|---|---|
User.Read | Delegated | Read user profile |
Files.ReadWrite.All | Delegated | Read and write all files to which the user has access |
Note
Files.ReadWrite.Allis considered a far-reaching authorization and usually requires admin consent in Azure.Admin consent can be granted in the Azure portal or via admin consent URL:
https://login.microsoftonline.com/{tenant-id}/adminconsent?client_id={client-id}
Tip
Carefully document the Azure app registration (e.g., permissions, redirect URIs) so that changes (e.g., new app, new certificates) can be easily adapted.