partner
884 TopicsEncodian, AppJetty, and KAISPE offer transactable partner solutions in Microsoft Marketplace
Microsoft partners like Encodian, AppJetty, and KAISPE deliver transact-capable offers, which allow you to purchase directly from Microsoft Marketplace. Learn about these offers in this blog post.36Views1like0CommentsSharePoint Embedded security features: A comprehensive Q&A guide
š Authentication & identity management Q: How does SharePoint Embedded integrate with Microsoft Entra ID? A: SharePoint Embedded requires all users to authenticate through Microsoft Entra ID Single sign-on (SSO): Seamless authentication across Microsoft 365 services Multi-factor authentication (MFA): Configurable per-organization security policies Guest access: Secure B2B collaboration using Entra ID B2B guest accounts Key requirement: All users accessing SharePoint Embedded containers must exist as either: Member users in your Entra ID tenant Guest users invited through Entra ID B2B collaboration Q: What's the difference between delegated and application permissions? A: Understanding these permission models is critical for security and auditability: Delegated permissions (recommended): Application acts on behalf of an authenticated user User context preserved in audit logs Users must authenticate before accessing containers Enables file search capabilities within containers Use case: Interactive applications where user identity matters Application-only permissions (restricted Use): Application acts without user context No user tracking in audit logs (shows as application) Search capabilities are limited Use case: Background jobs, system integrations, automated processes Best practice: Use delegated permissions whenever possible to maintain proper audit trails and security accountability. Q: How do we secure service principals and application secrets? A: SharePoint Embedded supports multiple secure authentication methods: Managed identities (Most Secure): No secrets or certificates to manage Identity tied to Azure resources Cannot be used outside your Azure environment Eliminates credential exposure risk Certificate-based authentication: More secure than client secrets Longer validity periods Can be stored in Azure Key Vault Client secrets (use with caution): Store in Azure Key Vault, never in code or config files Enable automatic rotation (recommended: 90-day rotation) Configure expiration alerts Security hardening: Apply Conditional Access policies to service principals Restrict to corporate IP ranges using Named Locations Implement Privileged Identity Management (PIM) for credential access Enable Azure Policy to enforce certificate-based authentication Domain limitations if applicable š”ļø Container-level security features Q: What security controls are available at the container level? A: SharePoint Embedded provides granular security controls for each container: Sensitivity labels: Enforce encryption and access policies Automatically applied to all content in container Integrated with Microsoft Purview Information Protection Block download policy: View-only access for high-sensitivity content Prevents data exfiltration Supports watermarking in Office web apps Container permissions: Four permission levels available: Owners: Full control including container deletion Managers: Manage content and permissions (cannot delete container) Writers: Add, update, and delete content Readers: View-only access Q: How does SharePoint Embedded handle external user collaboration? A: SharePoint Embedded supports secure external collaboration through multiple mechanisms: Authentication options: Entra ID guest users: External users invited as B2B guests Email-based sharing: Send secure access links with expiration Anonymous links: View-only or edit links without authentication (configurable) Security controls: Container-level sharing policies may supersede tenant default settings; however, they do not impact other configurations within the tenant. Link expiration dates and access revocation Audit trail for all external user activities Integration with Data Loss Prevention (DLP) policies Sharing configuration best practices: Enable guest sharing only for required applications Require email verification for sensitive content Monitor external access through Microsoft Purview audit logs Real-world scenarios: Legal firms: Share case documents with external counsel using time-limited guest access Construction projects: Collaborate with subcontractors while maintaining security boundaries Financial services: Enable secure document exchange with clients using DLP policies š Compliance & data governance Q: What Microsoft Purview features are supported? A: SharePoint Embedded integrates with the full Microsoft Purview compliance suite: Audit logging: All user and admin operations captured in unified audit log Enhanced with ContainerTypeId for filtering Search and export capabilities through Microsoft Purview Retention up to 10 years (with E5 license) eDiscovery: Search across all SharePoint Embedded containers Place legal holds on container content Review content to determine if it should be tagged and included in the case Export content for litigation or investigation Data lifecycle management (DLM): Apply retention policies to containers Automatic deletion after retention period Hold policies for litigation or investigation Label-based retention rules Implementation: Retention policies apply to "All Sites" automatically to include SPE containers Selective enforcement using container URLs Graph API for programmatic label application Data loss prevention (DLP): Identify and protect sensitive information Prevent external sharing of classified content Policy tips and user notifications Automatic encryption and access restrictions DLP policy enforcement: Real-time scanning of uploaded content Block external sharing based on content type Business justification workflows (app-dependent) Integration with sensitivity labels Q: How are DLP policies enforced in SharePoint Embedded? A: DLP works similarly to SharePoint Online with some considerations: Supported scenarios: Automatic detection of sensitive information (PII, financial data, etc.) Policy enforcement on upload, download, and sharing Alert generation for policy violations Integration with Microsoft Purview compliance center Application responsibilities: Since SharePoint Embedded has no built-in UI, applications must: Display policy tips to users when DLP flags content Handle business justification workflows for policy overrides Implement sharing restrictions when DLP blocks external access Use Graph APIs to retrieve DLP policy status Best practice: Test DLP policies on pilot containers before organization-wide deployment. š Advanced security scenarios Q: How do we implement least-privilege access for SharePoint Embedded? A: Follow these principles for robust security architecture: Q: What are common security misconfigurations to avoid? A: Learn from real customer experiences: ā Common Mistake 1: Assigning application permissions to user activities Problem: No audit trail, all actions appear as "application" Solution: Use delegated permissions for interactive scenarios ā Common Mistake 2: Storing secrets in application code Problem: Credential exposure in version control Solution: Use Azure Key Vault with managed identities ā Common Mistake 3: Ignoring conditional access configuration Problem: Service principals accessible from any network Solution: Configure named locations and conditional access policies ā Common Mistake 4: Not testing admin consent flow Problem: Consuming tenant onboarding failures Solution: Use admin consent URL method: https://login.microsoftonline.com/{tenant-id}/v2.0/adminconsent?client_id={client-id}&redirect_uri={redirect-uri} š¢ Enterprise security best practices Q: What security hardening steps should we implement? A: Follow this layered security approach: Level 1: Basic hardening Access controls: [ ] Implement least privilege principles [ ] Use delegated permissions for user-facing operations [ ] Regular permission audits (quarterly) [ ] Remove unused API permissions Authentication: [ ] Enable certificate-based authentication [ ] Configure MFA for all admin accounts [ ] Implement password-less authentication where possible [ ] Use managed identities for Azure-hosted apps Network security: [ ] Configure Conditional Access policies [ ] Define trusted IP ranges (Named Locations) [ ] Block legacy authentication protocols [ ] Enable sign-in risk policies Level 2: Advanced hardening Monitoring & alerting: [ ] Enable Microsoft Defender for Cloud Apps [ ] Configure alerts for suspicious activities: Unusual download volumes Access from unexpected locations Permission changes Guest user additions [ ] Integrate audit logs with SIEM (Sentinel, Splunk) [ ] Establish baseline for normal activity Compliance: [ ] Apply sensitivity labels to containers [ ] Implement DLP policies for sensitive data [ ] Configure retention policies [ ] Regular compliance assessments Incident response: [ ] Document container emergency access procedures [ ] Define escalation paths for security incidents [ ] Test access revocation processes [ ] Maintain audit log retention for forensics Level 3: Zero trust architecture Continuous verification: [ ] Device compliance requirements [ ] Session-based access controls [ ] Real-time risk assessment [ ] Automated response to anomalies š Additional resources Official documentation Security and Compliance Overview Container Permissions API Microsoft Purview DLP Conditional Access Policies Security best practices SharePoint Embedded Admin Guide Entra ID Application Security Zero Trust Security Model Have more questions or want to talk to the team, contact us: SharePointEmbedded@microsoft.com177Views1like0CommentsMarketplace offer live? Now make it shine!š
Microsoft gives you the tools, best practices, and guidance to boost visibility, drive traffic, and turn interest into real customers fast. And the quickest path? App Advisor. š Start with App Advisor: Your Marketplace growth playbook App Advisor is your selfāserve hub packed with stepābyāstep best practices, optimization guidance, and proven GTM strategies designed to your help app or agent rise above the noise and stand out to buyers. š ļø Optimize your listing Sharpen your sales page with clearer, benefitsāforward messaging Strengthen SEO so your offer is easier to find Enable a trial - the strongest conversion accelerator Offer public plans with clear tiers (Basic / Standard / Premium) to support direct sales Add visuals, screenshots, and short videos to show value instantly š Boost visibility Crossālink your website, G2 profile, blogs, and social posts back to your listing Understand factors that influence Marketplace search rankings and views Review your category selections - they directly affect discoverability Encourage customer reviews - including from G2, which flows into your listing! š£ Promote with confidence App Advisor provides guidance around: Readyātoāuse templates Partnerātested messaging Campaign ideas to drive awareness and demand Be sure to: Link all channels (website ā Marketplace ā G2 ā social ā email) Use OCIDs to see exactly which channels move the needle in Marketplace Insights Double down on what moves the needle š Unlock Marketplace Rewards When you publish a transactable offer, Marketplace Rewards kick in automatically, giving your listing additional promotional lift. Rewards include: Personalized listing optimization recommendations Marketplace blog and newsletter promotion Extra visibility for your listing Editorial + press release templates GTM enablement that grows with performance Marketplace Rewards + App Advisor = compounding growth momentum. š§² Build a product-led growth motion Sales donāt happen by accident - they happen with a smart GTM motion. App Advisor walks you through: Segmenting your target market Defining messaging that resonates with real buyers Building educational content (blogs, case studies, guides, emails) Nailing SEO & SEM basics Creating a conversionāready experience that shows quick wins Tracking performance with OCIDs + Marketplace Insights Strengthening your digital presence Encouraging reviews and customer storytelling Running targeted ads to your ideal audiences This motion turns Marketplace visibility into pipeline, and pipeline into wins. š¤ Expand your reach through channel partners Once youāve optimized your offer and are promoting it consistently, itās time to extend your reach even further. Forge relationships with channel partners - let them sell for you. By leveraging channel partners, you can make your solution available for system integrators, distributors and resellers to sell to their customers. You can sell through or with channel partners by leveraging resale enabled offers (REO), multi-party private offers (MPO), or Cloud Solution Provider (CSP) offers. That means: Your offer appears in their reseller catalogs They bring your solution into their customer conversations You tap into existing, trusted partnerātoācustomer relationships You gain scale without extra headcount or marketing spend A small switch. A massive multiplier. Enable resale so channel partners can open doors you couldnāt reach alone. ā Where to go next Start with App Advisor to sharpen your listing + GTM motion Add public plans + trial Strengthen SEO and performance signals Track success using OCIDs Publish a transactable offer to unlock Marketplace Rewards Enable REO to let channel partners help scale you globally ā go deeper in this REO-focused post. Ready to make your offer shine? Head to App Advisor and get started.323Views5likes0Comments