Overview
About
Security (Permissions Model)
Permissions in this integration are managed through a Delegated Permissions model. This means that actions are authenticated according to a User's existing SharePoint permissions.
File Links (SharePoint Document ID)
For this API, GNC Go relies on SharePoint’s Document ID property to generate stable links to uploaded files.
What is Document ID?
The Document ID property is a unique and permanent identifier assigned by SharePoint to each document stored in a site collection. This ID is used to generate a persistent URL that continues to work even if the document is moved to another folder or renamed.
Why We Use It
Reliable Linking. GNC Go uses the Document ID-based URL when referencing uploaded files. This ensures that links remain valid, regardless of changes to file location or name.
User Experience. Users can confidently access documents via saved links, bookmarks, or system-generated references.
Simplified Integration. It eliminates the need to track file paths or update links after a document is moved within SharePoint.
Known Issues
Enabling Document ID
Setup Steps
Step 1. Set up Document ID in SharePoint
For each relevant SharePoint site:
1.1 Go to the SharePoint Site Settings
Open your SharePoint site in a browser.
Click the settings (gear) icon in the upper-right corner.
Select Site Information > View all site settings (or directly Site Settings if you're using classic view).
1.2 Activate the "Document ID Service" Site Collection Feature
Under Site Collection Administration, click Site collection features.
Find Document ID Service in the list.
Click Activate.
1.3 Configure Document ID Settings
After activation, go back to Site Settings.
Under Site Collection Administration, click Document ID Settings.
Choose to assign IDs automatically to documents, and if you wish, define a custom prefix (e.g., GNC-).
Click OK to save.
Step 2. Register a New App in Azure
2.1 You or your Azure administrator go to https://portal.azure.com/
2.2 Navigate to Azure Active Directory → App registrations
Click "New registration"
Set: Name: [Application name of your choice]
Supported account types: "Single tenant"
Redirect URI:
https://[your URL].gncgo.com/sharepoint_callbackThe Redirect URL field accepts multiple valid URLs, so you can add your Sandbox and Live sites.
Step 3. Configure API Permissions in Azure
3.1 Go to your app → API permissions
3.2 Click "Add a permission" → Microsoft Graph → Delegated permissions
3.3 Add the following:
Files.ReadWrite// Provide access to files the user has.Sites.ReadWrite.All// Allow upload/edit on SharePoint sites the user has access to.offline_access// Get refresh-tokens for background uploads.
Step 4. Create a Client Secret in Azure
4.1 In Azure, go to your new app → Certificates & secrets
4.2 Click “Add a client secret” and set:
Description: // Up to you
Expires: // Up to you
You should now have the following ready to add to GNC Go:
Tenant ID
Client ID
Client Secret.
Step 5. Add Azure Connection details in GNC Go
In GNC Go → CADM Admin → SharePoint Application
5.1 Input the Connection details from Azure
Tenant ID
Client ID
Client Secret.
5.2 Validate and Save
Click: Validate Configuration to confirm the connection.
Click: Save Changes.

Incident Response
In case of a security incident or compromise, access granted to the Azure AD app can be quickly revoked to protect customer data. The following steps outline how to do this:
Step 1. Revoke Access to the SharePoint Site
1.1 Remove Site-Specific Permissions
Use PowerShell or Microsoft Graph to revoke the app’s permission to the SharePoint site.
Revoke-PnPAzureADAppSitePermission -AppId "<Azure-AD-App-Id>" -Site "[full site URL]"
1.2 Remove the App's Azure AD Permissions (if needed)
Go to Azure Portal → Azure Active Directory → App Registrations.
Locate the app.
Under API permissions, remove Sites.Selected, which should be the only permission granted.
1.3. Disable or Delete the App Registration
Go to Azure Portal → App Registrations.
Disable the app (change status) or delete it entirely to prevent further token issuance.
1.4. Revoke Existing Tokens
Revoke active tokens by resetting the client secret or changing the app’s credentials.
Step 2. Notify GNC Go
2.2 Inform the GNC Go team [support@gncspace.com] of the access revocation, and coordinate follow-up.
Step 3. Audit and Review
3.1 Review Microsoft 365 audit logs for any unusual activity.
3.2 Document the incident and actions taken as part of your internal security policy.
