Veritas Alta™ SaaS Protection Administrator's Guide
- Introduction to Veritas Alta™ SaaS Protection
- API permissions
- Administrator portal (Web UI)
- Manage users and roles
- What is a connector?
- Configure credentials
- Pre-requisites for Microsoft 365 connectors
- Protect Microsoft 365 Multi-Geo tenant
- Protect Exchange Online data
- Protect SharePoint sites and data
- Protect Teams sites
- Protect OneDrive data
- Protect Teams chats
- Protect GoogleDrive data
- Protect Gmail data
- Protect Audit logs
- Protect Salesforce data and metada
- Protect Entra ID objects
- Protect Box data
- Protect Slack data
- Protect Email/Message data
- Configure Retention policies
- Perform backups
- View and share backed-up data
- Analytics
- Perform restores using Administration portal
- Restore SharePoint/OneDrive/Teams Sites and data
- Restore Teams chat messages and Teams channel conversations
- Restore Box data
- Restore Google Drive data
- About Salesforce Data, Metadata, and CRM Content restore and Sandbox seeding
- About Entra ID (Azure AD) objects and records restore
- Restore dashboard
- Install services and utilities
- About the Apps Consent Grant Utility
- Discovery
- Configure Tagging polices
- Configure Tiering policy
- Auditing
- Manage Stors (Storages)
Approve Microsoft 365 apps using the App Consent Grant utility
When Microsoft 365 apps registrations are assigned, they are initially in an inactive state. A Global Administrator in your organization must approve admin consent to activate these apps. This approval can be done either manually (See Manually approve Microsoft 365 apps registration.) or using the App Consent Grant Utility (See Approve Microsoft 365 apps using the App Consent Grant utility.).
Approving admin consent grants the necessary permissions and access rights to perform backup and restore operations. Follow these steps to manually approve (grant admin consent) for Microsoft 365 app registration.
You must have Global Administrator permissions in Microsoft Entra ID (Azure AD) to approve app registration.
The App Consent Grant Utility must be installed on a Windows computer with the required administrative rights.
Ensure pop-ups are allowed in the browser, as Microsoft's sign-in page may require additional authentication steps.
- On the Windows computer on which the utility is installed, click Start > Cohesity Alta SaaS Protection > Apps Consents Grant Utility.
Note:
If the currently logged-on user is not the computer administrator, run the utility as Administrator.
The Apps Consents Grant Utility window opens.
- Click Next.
- On the Process apps window, do the following:
From the Microsoft 365 domain dropdown list, select the required domain for which the application requires consent.
Click Fetch Inactive Apps.
The inactive applications in the selected domain are listed on the Fetching Inactive Apps(s) window.
Click Close.
All the inactive applications are listed on the Process apps window, with IDs and names.
Click the apps that are to be granted and click Grant Consent.
On the logon window, enter credentials for the Microsoft 365 Global Administrator and then click Sign in.
Click Close.
The Apps consents grant summary field displays the summary, such as which applications grating is completed successfully and which is not.
The event logs are displayed on the window.
Click Close.
The granted applications are listed as Active applications on the Credentials tab.
Open the Cohesity Alta SaaS Protection Administration Portal.
On the
page, select the required active apps.Click
to configure custom backup policies.