Veritas Alta™ SaaS Protection Administrator's Guide
- Section I. Introduction to Veritas Alta™ SaaS Protection
- Section II. Administration portal
- Section III. Manage users and roles
- Section IV. Manage searches/eDiscovery/cases
- Section V. Configure policies
- Section VI. Perform restores
- About restore
- Prerequisites for restore
- Restore dashboard
- Restore Exchange Online mailboxes
- Restore SharePoint Online Sites and data
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chats and Teams Channel conversations
- Restore Audit logs
- Restore Box data
- Restore Google Drive data
- Restore Gmail data
- Restore Salesforce data and Metadata
- Restore Entra ID objects
- Restore Slack data
- Restore data to File server
- Restore options
- Section VII. Perform data share
- Section VIII. Perform data downloading
- Section IX. Add and configure connectors
- About connectors
- About connectors
- Overview of connectors
- Configuring the capture scope
- Configuring credentials
- Apps Consent Grant Utility
- Exchange Online connector
- Adding Exchange Online connectors
- Configuring the capture scope for Exchange connectors
- Configuring the capture scope for Exchange connectors
- SharePoint Online connector
- Teams Sites collections connector
- OneDrive connector
- Teams chat connector
- Audit log connector
- Google Drive connector
- Gmail connector
- Salesforce connector
- Entra ID (Azure AD) connector
- Box connector
- Slack connector
- EML connector
- Managing connectors
- About connectors
- Section X. Perform backups
- Section XI. Backup limitations
- Section XII. Events
- Section XIII. Manage Stors (Storages)
- Section XIV. Manage Scopes
- Section XV. Manage auditing
- Section XVI. Known Issues
Granting multiple admin consents using the App Consent Grant utility
Use the following procedure to grant consent to apps, considering the utility is correctly configured to connect the required tenant.
See About the Apps Consent Grant Utility.
To grant multiple admin consents using the App Consent Grant utility
- On the Windows computer on which the utility is installed, click Start > Veritas Alta SaaS Protection > Apps Consents Grant Utility.
Note:
If the currently logged-on user is not the computer administrator, run the utility as Administrator.
The Apps Consents Grant Utility window opens.
- Click Next.
- On the Process apps window, do the following:
From the Microsoft 365 domain drop-down list, select the required domain for which the application requires consent.
Click Fetch Inactive Apps.
The inactive applications in the selected domain are listed on the Fetching Inactive Apps(s) window.
Click Close.
All the inactive applications are listed on the Process apps window, with IDs and names.
Click the apps that are to be granted and click Grant Consent.
On the logon window, enter credentials for the M365 Global Administrator and then click Sign in.
Click Close.
The Apps consents grant summary field displays the summary, such as which applications grating is completed successfully and which is not.
The event logs are displayed on the window.
Click Close.
The granted applications are listed as Active applications on the Credentials page.
- Select the required active apps on the Credentials page and click Next to configure policies.