Rename Azure Active Directory to Microsoft Entra ID (#128351) (#128360)

* Rename Azure Active Directory to Microsoft Entra ID

Based on Microsoft change: https://learn.microsoft.com/en-us/entra/fundamentals/new-name

* Update docs/reference/search-connectors/es-connectors-sharepoint-online.md



* Update docs/reference/search-connectors/es-connectors-sharepoint-online.md



* Update docs/reference/search-connectors/es-connectors-sharepoint-online.md



---------


(cherry picked from commit b977b04a2e)

Co-authored-by: Carles Salvador <carles.salvador@elastic.co>
This commit is contained in:
Liam Thompson 2025-05-23 12:15:38 +02:00 committed by GitHub
parent 90ef3285e1
commit 10cabe06d5
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -49,7 +49,7 @@ To get started, first log in to SharePoint Online and access your administrative
Follow these steps:
* Sign in to [https://portal.azure.com/](https://portal.azure.com/) and click on **Azure Active Directory**.
* Sign in to [https://portal.azure.com/](https://portal.azure.com/) and click on **Microsoft Entra ID** (formerly Azure Active Directory).
* Locate **App Registrations** and Click **New Registration**.
* Give your app a name - like "Search".
* Leave the **Redirect URIs** blank for now.
@ -133,9 +133,9 @@ Refer to the following documentation for setting [SharePoint permissions](https:
#### Granting `Sites.Selected` permissions [es-connectors-sharepoint-online-sites-selected-permissions-self-managed]
To configure `Sites.Selected` permissions, follow these steps in the Azure Active Directory portal. These permissions enable precise access control to specific SharePoint sites.
To configure `Sites.Selected` permissions, follow these steps in the Microsoft Entra ID (formerly Azure Active Directory) portal. These permissions enable precise access control to specific SharePoint sites.
1. Sign in to the [Azure Active Directory portal](https://portal.azure.com/).
1. Sign in to the [Microsoft Entra ID (formerly Azure Active Directory) portal](https://portal.azure.com/).
2. Navigate to **App registrations** and locate the application created for the connector.
3. Under **API permissions**, click **Add permission**.
4. Select **Microsoft Graph** > **Application permissions**, then add `Sites.Selected`.
@ -603,4 +603,4 @@ See [Troubleshooting](/reference/search-connectors/es-connectors-troubleshooting
### Security [es-connectors-sharepoint-online-client-security]
See [Security](/reference/search-connectors/es-connectors-security.md).
See [Security](/reference/search-connectors/es-connectors-security.md).