Register Purview Sync with Azure (Advanced Access)
Purview Sync uses the Microsoft Graph API. To use the API, you need to register the application with Azure. Authentication requires a reference to a dedicated Azure application that has the appropriate permission. This needs to be done on the client side by an Azure user with sufficient rights.
Note: At different times in this guide, you will be instructed to take note of certain values and tokens. We recommend opening a text editor or Word document during this process to copy and paste these values, so they are readily available to paste into RelativityOne.
Table of Contents (Advanced Access)
Use this table of contents to navigation Purview Sync during the Advanced Access phase.
- Purview Sync (Advanced Access)
- Install Purview Sync (Advanced Access)
- Register Purview Sync with Azure (Advanced Access)
- Configure Purview Sync (Advanced Access)
- Importing data (Advanced Access)
- Data transformation (Advanced Access)
Registering an Azure application and credentials
Complete the steps in this section to create an application registration that you need for email and for syncing to Entra ID. To create your application ID and secret, you must have Application Administrator privileges to log into your Azure Portal and register an app.
Store your application ID and Secret in a safe place as you will need it in Relativity.
To register your app:
Note: The person completing the application registration process needs to be an Azure Administrator with sufficient privileges.
- Open your Azure Portal.
- Click Microsoft Entra ID.
- In the left-navigation menu, select App registrations.
- Click New Registration.
This will open the Register an application page. - Enter an application name in the Name field. For example, RelativityOne Purview Sync.
- Select Accounts in this organizational directory only - Single tenant as the supported account type.
- Select Single-page application (SPA) in the drop-down menu in the Redirect URI field.
- Enter https://[RelativityOne URL up to the word relativity forward slash] + CustomPages/f444a06a-617c-430b-90b2-a112e834b826/index.html for the Redirect URI field. For example, https://company.relativity.one/relativity/CustomPages/f444a06a-617c-430b-90b2-a112e834b826/index.html.
- Click Register.
When you complete the application registration, take note of the Application (client) ID field and Directory (tenant) ID field. These will be later used in Relativity.
Authentication
For authentication, you must add a redirect URI.
To add a redirect URI:
- Select Authentication from the left-side menu.
- Locate the Single-page application box and select Add URI.
- In the Redirect URI field, enter https://[RelativityOne URL up to the word relativity forward slash] + CustomPages/f444a06a-617c-430b-90b2-a112e834b826/ms-auth-popup-redirect.html. For example, https://company.relativity.one/relativity/CustomPages/f444a06a-617c-430b-90b2-a112e834b826/ms-auth-popup-redirect.html.
- Locate the Web box and select Add URI
- In the Redirect URI field, enter https://[RelativityOne URL without including the word relativity forward slash] + Relativity.Rest/API/aed-integration/v1/service/ms-auth/auth-response.
Example: https://company.relativity.one/Relativity.Rest/API/aed-integration/v1/service/ms-auth/auth-response - Select Save.
Creating a client secret
A client secret from Microsoft Azure AD is needed to integrate Microsoft and Relativity.
To create a client secret:
- In the left-navigation menu, click Certificates & secrets.
- Navigate to the Client secrets tab.
- Click the New Client Secret button.Note: Do not navigate away from the page once the client secret is created.
- Populate the Description and Expires fields. You can leave the default, or recommended, values.
- Click the Add button.
If the client secret was successfully created, you will see the Client Secret displayed on the table and the Value field should be displayed in plain text. - Copy the Value field and store it safely.
If you leave the page and comeback to get the value the Value field will be masked and you will not be able to copy it.
You can repeat steps 4-5 to generate a new client secret.
Setting API permissions
Open the application to view the application's homepage. From the application's page, add permissions to the web API.
To add permissions:
- Click API permissions.
- Click Add a Permission.
- Click Microsoft Graph.
- Select Delegated Permissions.
- Select the eDiscovery.ReadWrite.All option from the Delegated Permissions section.
- Click Add Permissions.
- Click Grant admin consent for [Tenant Name].Notes: You need the Global Administration role to complete this action.
At this point the Application should be full configured. It can take a few minutes to update.
Create the service principal
There is a special permission not available in an application registration by default. This is the eDiscovery.Download.Read permission that allows the transfer of data. It becomes available once you create a Service Principal for your Azure tenant. For more information, see Microsoft's Service Principal documentation.
We recommend using Microsoft Graph Explorer to do this.
Before using Microsoft Graph Explorer, you need an account that has Application.ReadWrite.All permission. If you are not sure what this means, ask someone in your organization with the Global Administrator role in your Azure tenant. For more information on the required permissions, see Microsoft's Service Principals documentation.
Creating the service principal steps:
- Navigate to https://developer.microsoft.com/en-us/graph/graph-explorer.
- Click on the avatar icon on the top right. This should open a login window, where you can login with your credentials.
- Click on the blue GET button. Select POST as the query method.
- Enter https://graph.microsoft.com/v1.0/servicePrincipals in the URI field.
- Under Request body, enter: { "appId": "b26e684c-5068-4120-a679-64a5d2c909d9" }.Note: Do not forget the curly brackets.
- Press the Run query button.
- Confirm you received a Created – 201 response.Note: If it’s already setup you will see a 409 error.
Configure permissions
Now you need to add the eDiscovery.Download.Read permission we made available by adding the service principal in the Create a Service Principal section. Navigate back to Microsoft Azure Portal, to the application registration you set up earlier.
- Click the API permissions in the left-hand side menu.
- Click + Add a permission.
- Select the APIs my organization uses tab.
- In the search bar, enter MicrosoftPurviewEDiscovery.
- Select the application MicrosoftPurviewEDiscovery search result.
- Select the Delegated Permissions box.
- Select eDiscovery.Download.Read.
- Click Add permissions.
- Click Grant admin consent for [TENANT NAME].Notes: You need the Global Administration role to complete this action.
- In the pop-up modal that appears, click Yes.
You completed configuring the application registration with Azure. Now onto Relativity.
Grant users eDiscovery permissions in Microsoft Purview
Permissions to use the Purview Sync application can be broken down into two categories:
- Azure Active Directory roles—necessary to grant eDiscovery permissions.
- Purview eDiscovery Premium roles—necessary to execute actions in Purview eDiscovery Premium, and the Purview Sync application within RelativityOne.
Before you start, the user performing the actions in this section must have:
- Azure Active Directory role—Compliance Administrator, to be able to read, configure, and manage compliance permissions with Microsoft Purview, formerly known as Security & Compliance Center.
- Azure Active Directory role—Compliance Data Administrator, to be able to create and manage compliance content within Microsoft Purview.
Once the Compliance Administrator and Compliance Data Administrator roles have been assigned to the person configuring this user, that user will then be able to configure permissions within the Microsoft Purview compliance portal here.
Note: If you see a screen that the Microsoft compliance portal is retired, it might mean that you are using the old Microsoft compliance portal that was disabled in November 2024. Navigate to the new Microsoft Purview instead.
Setting up Compliance Admin roles
To set up Compliance Admin roles to use Azure AD:
- Navigate to https://purview.microsoft.com and login.
- Click Settings > Roles and scopes > Role groups.
- Click the Compliance Administrator role > Edit > Choose users.
- Ensure all users, including service accounts, that will be using Purview Sync in RelativityOne are assigned this role.
- If there are users that need to be added, click the Add assignments button to add them.
- Close the Assignments page once all the appropriate users have been added.
- Click the Compliance Data Administrator role > Edit > Choose users.
- Ensure all users, including service accounts, that will be using Purview Sync in RelativityOne are assigned this role.
- If there are users that need to be added, click the Add assignments button to add them.
- Close the Assignments page once all the appropriate users have been added.
Purview eDiscovery Premium Permission Management for users
-
Navigate to https://purview.microsoft.com and login.
- Click Settings > Roles and scopes > Role groups under the Microsoft Purview solutions section.
- Click eDiscovery Manager.
- Select Edit.
- If you want to allow a user the capability to create cases in Purview eDiscovery Premium, but not see other cases, then assign that user to the eDiscovery Manager role by following these sub-tasks, otherwise skip to step 6:
- Click the Choose users button.
- Select the users to add to the eDiscovery Manager role in the right-side menu.
- Click the Select button.
- Click the Next button at the bottom of the page until you navigate through Manage eDiscovery Administrator and Review and finish options.
- Click the Save button.
- If you want to allow a user the capability to create cases and see cases that other users have created, then assign that user to the eDiscovery Administrator role by following these sub-tasks, otherwise skip to the next section.
- Click the Next button to navigate to the Manage eDiscovery Administrator options.
- Click the Choose users button.
- Select the users to add to the eDiscovery Administrator role in the right-side menu.
- Click the Select button.
- Click the Save button.
You have now granted a service or user eDiscovery permissions in Microsoft Purview.