Microsoft SharePoint action integration
Use the Microsoft SharePoint action connector to manage lists, items, files, and Excel workbooks directly in Amazon Quick through natural language.
Setting up this integration involves two steps. First, you register an application in Microsoft Entra and configure its permissions. Then, you create the integration in Amazon Quick and connect it to your Entra app. For information about the authentication methods that Amazon Quick supports, see Authentication methods.
Before you begin
Make sure you have the following before you set up the integration.
-
A Microsoft 365 account with SharePoint access.
-
Access to the Microsoft Entra admin center
with at least Application Developer permissions. -
For subscription requirements, see Set up integrations in the console.
Configure Microsoft Entra
Before you configure Amazon Quick, create an app registration in Microsoft Entra. Complete all of the following steps in Entra before moving to the Amazon Quick console.
For more information about app registrations, see Register an application with the Microsoft identity platform
Register the application
-
Open the Microsoft Entra admin center
. -
In the left navigation, choose Entra ID, then choose App registrations.
-
Choose New registration.
-
For Name, enter a descriptive name for your integration.
-
For Supported account types, choose Accounts in this organizational directory only.
-
For Redirect URI, select Web and enter
https://. Replace{region}.quicksight.aws.amazon.com/sn/oauthcallback{region}with the AWS Region where your Amazon Quick instance is deployed. -
Choose Register.
-
On the overview page, copy the Application (client) ID and Directory (tenant) ID. You need these values for the Amazon Quick configuration.
Create a client secret
Amazon Quick needs a client secret to authenticate with Microsoft Entra. This secret acts as a password for the app registration.
-
From your app registration, choose Certificates & secrets.
-
Choose New client secret.
-
Enter a description and choose an expiration period.
-
Choose Add.
-
Copy the Value immediately. This value is only displayed once.
Important
Copy the secret Value, not the Secret ID. The Value is the longer string used for authentication.
Configure API permissions
Microsoft Graph supports two permission types for this integration.
Delegated permissions allow the app to act on behalf of a signed-in user.
Application permissions allow the app to act without a signed-in user. For
more information, see Overview of Microsoft Graph permissions
-
From your app registration, choose API permissions.
-
Choose Add a permission, then choose Microsoft Graph.
-
Choose Delegated permissions or Application permissions based on your authentication method, and add the permissions from the appropriate table below.
-
Choose Grant admin consent for [your tenant name] to approve the permissions.
For user authentication (delegated permissions):
Add the following as Delegated permissions in your Entra app registration.
For the full permissions reference, see Microsoft Graph permissions reference
| Permission | Description |
|---|---|
Files.ReadWrite |
Allows the app to read, create, update, and delete the signed-in user's files. |
Sites.ReadWrite.All |
Allows the application to edit or delete documents and list items in all site collections on behalf of the signed-in user. |
offline_access |
Allows the app to refresh access tokens without requiring the user to sign in again. This reduces how often users need to re-authenticate. |
For service authentication (application permissions):
Add the following as Application permissions in your Entra app registration.
| Permission | Description |
|---|---|
Sites.ReadWrite.All |
Allows the app to create, read, update, and delete documents and list items in all site collections without a signed-in user. |
Important
With service authentication, all actions execute as the service account. Any user with access to this integration can perform actions across all site collections that the service account can access. Scope the application permissions appropriately for your organization's security requirements.
Record your credentials
Before leaving the Microsoft Entra admin center, confirm you have the following values. You need them for the Amazon Quick configuration.
| Value | Where to find it |
|---|---|
| Application (client) ID | App registration overview page |
| Directory (tenant) ID | App registration overview page |
| Client secret value | Certificates & secrets page |
Set up the integration in Amazon Quick
After you complete the Entra configuration, create the integration in Amazon Quick.
-
In the Amazon Quick console, choose Integrations.
-
Choose Microsoft SharePoint and choose the Add (plus "+") button.
-
Choose the Actions tab.
-
Choose Perform actions in Microsoft SharePoint.
-
Fill in the integration details:
-
Name – Descriptive name for your SharePoint integration.
-
Description (Optional) – Purpose of the integration.
-
-
Choose your connection type and fill in the connection settings:
-
For User authentication (OAuth), configure the following fields:
Base URL –
https://graph.microsoft.com/v1.0Client ID – Application (client) ID from your Entra app registration.
Client Secret – Client secret value from your Entra app registration.
Token URL –
https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/tokenAuth URL –
https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/authorizeRedirect URL –
https://{region}.quicksight.aws.amazon.com/sn/oauthcallback
-
For Service authentication, configure the following fields:
Client ID – Application (client) ID from your Entra app registration.
Client Secret – Client secret value from your Entra app registration.
Token URL –
https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/tokenScope –
.default
-
-
Choose Create and continue.
-
Choose users to share the integration with.
-
Choose Next.
Available actions
After you set up the integration, the following actions are available.
| Category | Action | Description |
|---|---|---|
| Lists and items | View items | Get the collection of items in a list. |
| Lists and items | Get Item | Returns the metadata for an item in a list. |
| Lists and items | Get List | Returns the metadata for a list. |
| Lists and items | Update Item | Update the properties on a list item. |
| Lists and items | Delete Item | Removes an item from a list. |
| Files | Upload File | Upload a new file or update an existing file. Supports files up to 250 MB. |
| Files | Search Site Drive Items | Search the hierarchy of items matching a query. |
| Excel workbooks | List Sheets | Retrieve a list of worksheet objects. |
| Excel workbooks | Add Sheet | Add a new worksheet to the workbook. |
| Excel workbooks | Read Sheet | Retrieve the properties of a worksheet object. |
| Excel workbooks | Update Sheet | Update the properties of a worksheet object. |
| Excel workbooks | Delete Sheet | Delete the worksheet from the workbook. |
| Excel workbooks | Read Cell | Get the value of a single cell by row and column number. |
| Excel workbooks | Write Cell | Set the value of a single cell by row and column number. |
| Excel workbooks | Read Range | Get the values of a range. |
| Excel workbooks | Write Range | Update the values of a range. |
| Excel workbooks | Clear Range | Clear range values, format, fill, and border. |
| Excel workbooks | Delete Range | Delete the cells associated with the range. |
| Excel workbooks | Get Used Range | Get the smallest range that encompasses cells with a value or formatting. |
Manage and troubleshoot
To edit, share, or delete your integration, see Managing existing integrations.
Authentication issues
-
Incorrect app registration – Verify the app registration in Microsoft Entra includes the required API permissions and that admin consent has been granted.
-
Expired client secret – Check if the client secret has expired in Certificates & secrets and generate a new one if needed.
-
Incorrect redirect URI – Verify the redirect URI in Microsoft Entra matches
https://.{region}.quicksight.aws.amazon.com/sn/oauthcallback
Common error messages
-
Access denied. You do not have permission to perform this action– The authenticated user does not have the required permissions. Contact your administrator to verify and grant appropriate permissions. -
AADSTS50020: User account from identity provider does not exist in tenant– The user account is not configured in the correct Microsoft Entra tenant. Verify the user account exists in the tenant that matches the Directory (tenant) ID in your app registration.