Product Selector

Fusion 5.9
    Fusion 5.9

    SharePoint Optimized V2Connector Configuration Reference

    The SharePoint Optimized V2 connector indexes content and metadata from SharePoint Online and on-premises environments, making it searchable in Fusion. It supports fine-grained scoping and filtering, so teams can include only the content that matters. Security trimming ensures that users see only content they are authorized to access, which protects sensitive data and enforces compliance. This enables a secure, unified search experience across SharePoint and other enterprise systems.

    This article provides an in-depth look at the SharePoint Optimized V2 connector, including business context, setup, use cases, and troubleshooting. It also includes the configuration specification, which fully describes the connector object for use with API operations.

    Prerequisites

    • Access to a Fusion instance with the appropriate permissions to configure a data source.

    • Supported SharePoint deployment (2010, 2013, 2016, 2019, or Online).

    • A service account with site collection administrator rights for on-premises SharePoint.

    • An app registration with the Sites.FullControl.All permission for SharePoint Online.

    • Azure Active Directory app registration with required permissions (for SharePoint Online).

    For details about required permissions, see the Permissions section.

    Verify your connector version

    This connector depends on specific Fusion versions. See the following table for the required versions:

    Fusion version Connector version Notes

    Fusion 5.9.1 and later

    v2.0.0 and later

    Supports LDAP ACLs integrations and security trimming.

    Fusion 5.9.0

    v1.6.0 and later. Lucidworks recommends using the latest supported connector version.

    Fusion 5.9.0 supports the v2.0.0 connector, but does not support LDAP ACLs integrations or security trimming.

    Fusion 5.6.1 and later

    v1.1.0 through v1.6.0

    -

    Business context

    SharePoint is widely adopted for internal content collaboration, knowledge sharing, and structured document management. The SharePoint Optimized V2 connector supports use cases across knowledge management and business environments by making SharePoint content discoverable in Fusion.

    Knowledge management

    Organizations use SharePoint as a central platform for storing and organizing internal knowledge, such as policies, training materials, and procedural documentation. With structured libraries, metadata tagging, and version control, teams can maintain accurate, searchable content. The connector brings this content into Fusion to support enterprise search, self-service portals, and role-based access to knowledge resources.

    B2B

    In business-to-business contexts, SharePoint supports cross-functional collaboration, secure partner portals, and project documentation workflows. Companies use it to share content with clients, vendors, and internal stakeholders while maintaining strict access controls. The connector indexes this content for a unified search experience across departments or applications, enabling faster access to contracts, technical documents, or onboarding materials.

    B2C

    SharePoint is not typically used for direct customer-facing experiences. However, B2C organizations often use it internally to support customer service, compliance, or product support operations. With the connector, teams can expose curated SharePoint content such as FAQs, internal product specifications, or support documentation through public or authenticated search interfaces managed in Fusion.

    How it works

    The SharePoint Optimized V2 connector crawls and indexes structured content from SharePoint using its object model. SharePoint organizes data into a hierarchical structure that begins with a web application and includes site collections, sites, lists, folders, and list items. For an overview of this structure, see the SharePoint object model.

    SharePoint data types

    Each level of this hierarchy stores both metadata and content. For example:

    • A site collection can contain multiple subsites, each with its own permissions and content.

    • A list can store structured data like announcements or documents, with fields such as title, status, and date.

    • A list item or document may contain file content and metadata, such as the file type, size, author, and version.

    The connector uses this model to identify and extract documents and metadata during a crawl. It starts at a configured entry point such as a web application URL or specific site collection and traverses the hierarchy to gather content.

    Access to SharePoint content is controlled by user-based permissions at each level of the hierarchy. SharePoint uses Access Control Lists (ACLs) to define which users or groups can view or manage specific content. These permissions may be inherited or explicitly set at the site, list, or item level.

    The connector retrieves ACLs during the crawl and stores them with the indexed documents. When security trimming is enabled in Fusion, these permissions are enforced at query time to ensure users can only see documents they are authorized to access.

    Content is stored in SharePoint databases, not directly exposed to external systems. The connector accesses this content through SharePoint APIs or Microsoft Graph, depending on configuration and authentication method. Retrieved data is sent to Fusion, where it is indexed and made searchable alongside other enterprise content sources.

    Set up

    To index SharePoint content with Fusion, you must configure both the SharePoint environment and the connector. SharePoint must be accessible and properly permissioned, and the connector must be configured to authenticate, crawl, and index the desired content.

    Required SharePoint permissions

    The SharePoint Optimized V2 connector requires specific permissions to index content across SharePoint sites effectively. These permissions must be granted before the connector can perform operations such as reading site data, accessing files, or collecting audit logs.

    The following table lists the required permissions, along with detailed descriptions and use cases for each. Full indexing functionality, including support for all site collections and audit data, depends on granting the appropriate elevated permissions.

    Permission Description Use case

    Sites.Read.All

    Grants read-only access to all SharePoint site collections and their content.

    Used by applications that need to enumerate sites, retrieve metadata, list items, or download files across all sites.

    Sites.Manage.All

    Provides full control over all site collections, excluding permission management.

    Enables applications to create, edit, and delete content such as list items and documents across all sites.

    Files.Read.All

    Allows read-only access to all files stored in SharePoint and OneDrive document libraries.

    Used to access and download documents, attachments, and other file content across the organization.

    AuditLog.Read.All

    Enables access to SharePoint audit logs for monitoring user and system activities.

    Used to analyze actions such as file edits, deletions, and permission changes for compliance and security auditing.

    Sites.Selected

    Allows access only to specific site collections explicitly granted by an administrator.

    Used to restrict application access to approved SharePoint sites, providing fine-grained control over data exposure.

    User.Read

    Permits access to basic profile information of the signed-in user, including name and email.

    Used to personalize the user experience or perform operations on behalf of the authenticated user.

    Directory.Read.All

    Grants read access to the full directory of users, groups, and other directory objects.

    Used to look up user and group information for features like permissions mapping, people pickers, or organizational insights.

    Why are Full Control permissions required?

    Full Control allows the connector to discover all site collections and content in SharePoint. Without it, the connector can only access content where it already has permission and may miss sites or documents.

    Granting Full Control does not allow the SharePoint Optimized V2 connector to take destructive actions such as deleting or modifying content. The permission is used strictly for discovery and indexing.

    For environments with data transfer security concerns, the SharePoint Optimized V2 connector can be deployed as a remote connector. This enables Fusion to index content stored behind firewalls without opening firewall ports or exposing internal systems.

    Prepare SharePoint

    Before you configure the SharePoint Optimized V2 connector in Fusion, you must prepare your SharePoint environment. This section explains how to select an authentication method, assign the required permissions, and ensure access to the SharePoint content you intend to index.

    Configure the connector in Fusion

    In Fusion, configure the SharePoint Optimized V2 connector to define the crawl scope, select an authentication method, and apply indexing settings. This setup enables Fusion to connect to SharePoint and index content securely and efficiently.

    This section applies to the latest version of the SharePoint Optimized V2 connector. If you are using an earlier version, some settings may have different names, appear in different sections, or may not be available.

    Core configurations

    Use the following parameters to configure what the connector crawls, how it authenticates, and how it handles content updates. Parameters are grouped by category for clarity.

    For full configuration options, see Configuration specifications.

    Scope

    These settings define what SharePoint content the connector includes in the crawl. You can configure it to crawl all site collections or only specific sites, lists, folders, or items.

    To begin, specify the Web Application URL. This is the base URL of your SharePoint web application. All paths to site collections or items must be relative to this URL.

    SharePoint Optimized V2 Web application URL

    By default, the connector discovers and crawls site collections under the specified web application. This requires administrative permissions.

    In earlier versions of the SharePoint Optimized V2 connector, you had to enable Fetch all site collections to crawl all site collections. This setting was removed in v2.0.0 and later. If you are using an older version and see this option in your configuration, enable it to ensure all site collections are crawled.

    To crawl only a subset of content:

    1. In the Site Collection List, provide a single site collection path.

      SharePoint Optimized V2 site collection list

    2. In Restrict to specific SharePoint items, enter one or more SharePoint URLs. You can copy these URLs directly from your browser.

    The connector converts the specified URLs into inclusive regular expressions. Only matching content is included in the crawl.

    Authentication

    These settings define how the connector authenticates with SharePoint.

    For on-premises SharePoint, use NTLM authentication.

    SharePoint Optimized V2 NTLM authentication

    For SharePoint Online, use app-only authentication with a private key or with OAuth, or assign a Site Collection Administrator who has sufficient crawl permissions.

    Crawl behavior

    These settings control how the connector detects content changes and whether it performs incremental or full crawls.

    After the first successful full crawl, the connector uses incremental crawls by default. It relies on the SharePoint Changes API to detect and index added, updated, and deleted content. The connector tracks changes using a change token and removes deleted site collections.

    To support incremental crawling, required fields prefixed with lw must remain in the indexed documents.

    To force a full crawl, enable the Force Full Crawl setting. This disables incremental crawling and reindexes all content from scratch. It also clears any previous crawl state. This option is useful when resetting the crawl due to major changes.

    Incremental crawling requires Force Full Crawl to remain disabled.

    Use cases

    The SharePoint Optimized V2 connector supports a range of use cases for securely indexing and searching SharePoint content. This section highlights common deployment scenarios and configurations that help organizations meet security, compliance, and infrastructure requirements.

    Protect documents with security trimming

    Security trimming ensures that users only see the content they are authorized to access when querying your SharePoint Optimized V2 datasource. It uses user roles and permissions to control document visibility. This feature requires the SharePoint Optimized V2 datasource to be used alongside an LDAP ACLs V2 datasource and a Graph Security Trimming query stage within the same app and collection.

    Benefits of using security trimming include:

    • Ensuring users only see documents they are authorized to access, maintaining data confidentiality.

    • Reducing irrelevant search results by filtering content based on user permissions.

    • Enhancing compliance with organizational security policies through integrated role-based access control.

    To use security trimming, refer to Configure Security Trimming for SharePoint Optimized V2.

    Index data behind firewalls

    You can configure the SharePoint Optimized V2 Connector v2.0.0 and later to run remotely.

    This setup lets Fusion index content stored behind firewalls without exposing internal systems or opening firewall ports. It helps protect sensitive data, supports compliance, and enables unified search across cloud and on-premises sources.

    Fusion uses gRPC over HTTP/2 to connect on-premises remote connectors to Fusion clusters.

    For more information, see Remote V2 connectors.

    To configure the SharePoint Optimized V2 Connector as a remote connector, see Configure Remote V2 Connectors.

    API operations

    This section provides a simple example of how to use the Connectors API to list available connector plugins, demonstrating how to interact with the API to discover which datasources are supported.

    For more detailed examples, including full request and response payloads and the configuration specification used with the SharePoint Optimized V2 connector, see the Connector APIs documentation.

    Get all available connectors

    Request

    curl -u USERNAME:PASSWORD https://FUSION_HOST:FUSION_PORT/api/connectors/plugins

    Response

    [{
      "type": "lucidworks.rest",
      "state": "DEPLOYED"
    }, {
      "type": "lucidworks.web-v2",
      "state": "DEPLOYED"
    }, {
      "type": "lucidworks.kaltura",
      "state": "DEPLOYED"
    }, {
      "type": "lucidworks.gcs",
      "state": "DEPLOYED"
    }, {
      "type": "lucidworks.sharepoint-optimized",
      "state": "DEPLOYED"
    }, {
      "type": "lucidworks.file-upload",
      "state": "DEPLOYED"
    }, {
      "type": "lucidworks.ldap-acls",
      "state": "DEPLOYED"
    }, {
      "type": "lucid.servicenow",
      "state": "DEPLOYED"
    }, {
      "type": "lucid.fileupload",
      "state": "DEPLOYED"
    }, {
      "type": "lucid.web",
      "state": "DEPLOYED"
    }]

    Troubleshooting

    This section describes known limitations and configuration requirements for the SharePoint Optimized V2 Connector. Each issue includes the observed behavior, the expected behavior, and the impact to users.

    Connector runs on multiple pods

    The SharePoint Optimized V2 Connector does not support running on more than one pod. If multiple instances run at the same time, they may try to index the same content, which can cause duplication, crawl errors, or inconsistent results. The connector is designed to run as a single instance. To ensure reliable indexing, deploy the connector on only one pod.

    This means you should only run one copy of the connector. Keeping it to one copy helps everything work correctly.

    Connector version compatibility

    If you use the SharePoint Optimized V2 Connector with an ACL connector, make sure the versions are compatible. Incompatible versions can prevent document-level access controls from being applied correctly. This can result in users seeing content they shouldn’t or missing content they should be able to access. To avoid access issues, use only supported combinations of the SharePoint and ACL connectors.

    Check version compatibility in Prerequisites.

    For details about crawls and incremental crawls see How to crawl using the SharePoint Optimized V2 Connector.

    Avoid throttling and rate limiting in SharePoint Online

    SharePoint Online enforces rate limits to protect its APIs. When that happens, it tells the connector to slow down by sending error messages. When the connector sends too many requests in parallel, SharePoint may respond with 429 Too Many Requests or 503 Server Too Busy errors. These indicate that the service is temporarily rejecting traffic due to overload.

    To avoid these errors, reduce the number of concurrent requests. In the connector configuration, go to Core Properties > Fetch Settings and lower the Fetch Threads value. Also consider reducing the number of connector jobs running at the same time.

    SharePoint Optimized V2 Fetch settings

    The connector includes an automatic retry mechanism with exponential backoff to help recover from throttling. You can adjust this behavior in the Retry Options section by modifying settings such as Maximum Retries, Delay Factor, Retry Delay, and Maximum Delay Time.

    SharePoint Optimized V2 retry options

    Retries help with occasional limits, but persistent 429 or 503 errors mean you’re sending too much traffic. Reduce request volume first. Only use retries to improve resilience, not to bypass throttling.

    More resources

    For more information on how to plan, install, and configure the SharePoint Optimized V2 connector:

    Lucidworks offers free training to help you get started with Fusion. Check out the Connectors 101 microlearning, which focuses on Learn how connectors work to get data into Fusion:

    Connectors 101

    Visit the LucidAcademy to see the full training catalog.

    Configuration specifications

    To change the number of items to retrieve per page, set the value of apiQueryRowLimit. The default value is 5000.

    To change the number of change events to retrieve per page, set the value of changeApiQueryRowLimit. The default value is 2000.

    When entering configuration values in the UI, use unescaped characters, such as \t for the tab character. When entering configuration values in the API, use escaped characters, such as \\t for the tab character.

    An Optimized Connector for SharePoint 2010, 2013, 2016, 2019 and SharePoint Online

    description - string

    Optional description

    <= 125 characters

    pipeline - stringrequired

    Name of the IndexPipeline used for processing output.

    >= 1 characters

    Match pattern: ^[a-zA-Z0-9_-]+$

    diagnosticLogging - boolean

    Enable diagnostic logging; disabled by default

    Default: false

    parserId - stringrequired

    The Parser to use in the associated IndexPipeline.

    coreProperties - Core Properties

    Common behavior and performance settings.

    fetchSettings - Fetch Settings

    System level settings for controlling fetch behavior and performance.

    pluginInstances - number

    Maximum number of plugin instances for distributed fetching. Only specified number of plugin instanceswill do fetching. This is useful for distributing load between different instances.

    >= 1

    <= 1

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 1

    Multiple of: 1

    asyncParsing - boolean

    When enabled, content will be indexed asynchronously.

    Default: false

    numFetchThreads - number

    Maximum number of fetch threads; defaults to 20.This setting controls the number of threads that call the Connectors fetch method.Higher values can, but not always, help with overall fetch performance.

    >= 1

    <= 500

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 20

    Multiple of: 1

    indexingThreads - number

    Maximum number of indexing threads; defaults to 4.This setting controls the number of threads in the indexing service used for processing content documents emitted by this datasource.Higher values can sometimes help with overall fetch performance.

    >= 1

    <= 10

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 4

    Multiple of: 1

    fetchResponseScheduledTimeout - number

    The maximum amount of time for a response to be scheduled. The task will be canceled if this setting is exceeded.

    >= 1000

    <= 500000

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 300000

    Multiple of: 1

    indexingInactivityTimeout - number

    The maximum amount of time to wait for indexing results (in seconds). If exceeded, the job will fail with an indexing inactivity timeout.

    >= 60

    <= 691200

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 86400

    Multiple of: 1

    pluginInactivityTimeout - number

    The maximum amount of time to wait for plugin activity (in seconds). If exceeded, the job will fail with a plugin inactivity timeout.

    >= 60

    <= 691200

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 600

    Multiple of: 1

    indexMetadata - boolean

    When enabled the metadata of skipped items will be indexed to the content collection.

    Default: false

    indexContentFields - boolean

    When enabled, content fields will be indexed to the crawl-db collection.

    Default: false

    id - stringrequired

    A unique identifier for this Configuration.

    >= 1 characters

    Match pattern: ^[a-zA-Z0-9_-]+$

    properties - SharePoint properties

    Plugin specific properties.

    webApplication - Web application config

    The SharePoint Web application to crawl.

    webApplicationUrl - string

    >= 1 characters

    forceFullCrawl - boolean

    Do this if you want to force a full crawl each time you run this datasource.

    Default: false

    siteCollections - array[string]

    A list of site collections to crawl. Because only site collection administrators or site collection auditors can list the site collections in a SharePoint web application, you can use this when you are crawling as a user that is not an admin/auditor. This allows you to explicitly list site collections you want to crawl. Specify paths relative to the web application url, such as /sites/site1

    Default:

    includedFileExtensions - array[string]

    Set of file extensions to be fetched. If specified, all non-matching files will be skipped.

    Default:

    excludedFileExtensions - array[string]

    A set of all file extensions to be skipped from the fetch.

    Default:

    inclusiveRegexes - array[string]

    Regular expressions for URI patterns to include. This will limit this datasource to only URIs that match the regular expression.

    Default:

    exclusiveRegexes - array[string]

    Regular expressions for URI patterns to exclude. This will limit this datasource to only URIs that do not match the regular expression.

    Default:

    includeContentsExtensions - array[string]

    Only files with these file extensions will have their contents downloaded when indexing this item. Files without these file extensions will not have their contents downloaded The comparison is not case sensitive, and you do not have to specify the '.' but it still work if you do. For example "zip" and ".zip" are both acceptable. The whitespace will also be trimmed.

    Default:

    excludeContentsExtensions - array[string]

    File extensions of files that will not have their contents downloaded when indexing this item. The list item metadata will still be indexed but the file contents will not. The comparison is not case sensitive, and you do not have to specify the '.' but it still work if you do. For example "zip" and ".zip" are both acceptable. The whitespace will also be trimmed.

    Default:

    restrictToSpecificItems - array[string]

    Instead of specifying regular expressions to restrict the SharePoint items that are crawled, this allows you to specify specific SharePoint item URLs of the resources that are to be crawled. The crawl will then be restricted to only include these specified SharePoint items URLs. You can specify list, sub-site, folder, and list item URLs.

    Default:

    apiQueryRowLimit - number

    >= 1

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 5000

    Multiple of: 1

    changeApiQueryRowLimit - number

    >= 1

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 2000

    Multiple of: 1

    siteCollectionDeletionThreshold - number

    Site collections will be removed from the index after they are no longer available for this many hours. Set to 0 for immediate deletion. Default is 2 weeks.

    >= -2147483648

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 336

    Multiple of: 1

    moderationStatusFilter - array[number]

    If specified, only index items with the following moderation statuses specified. Valid values are: 0 = The list item is approved, 1 = The list item has been denied approval, 2 = The list item is pending approval, 3 = The list item is in the draft or checked out state, 4 = The list item is scheduled for automatic approval at a future date.

    fetchTaxonomies - boolean

    Fetch Taxonomy data from sharepoint.

    Default: false

    siteCollectionTaxonomyCacheSize - number

    To make the connector faster, when the taxonomy terms for a site collection are needed, they are cached to avoid looking up from disk again. This is the size of that cache.

    >= 1

    <= 10000

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 10

    Multiple of: 1

    includedListBaseTypes - array[string]

    If specified, the only SharePoint lists that will be fetched are the ones that match one of these base types. Accepts values (not case sensitive): [None, GenericList, DocumentLibrary, Unused, DiscussionBoard, Survey, Issue]

    includedObjectTypes - array[string]

    If specified, only fetch specific SharePoint objects. SharePoint object types that can be specified (not case sensitive): [Site, List, List_Item, Folder, Attachment]

    proxyProperties - Proxy options

    A set of options for configuring the proxy.

    username - string

    Proxy username

    >= 1 characters

    password - string

    Proxy password

    >= 1 characters

    url - string

    The proxy URL

    >= 1 characters

    ntlmProperties - NTLM Authentication settings

    user - string

    User

    >= 1 characters

    password - string

    Password

    >= 1 characters

    domain - string

    Domain

    >= 1 characters

    workstation - string

    Workstation

    >= 1 characters

    sharepointOnlineAuthProperties - SharePoint Online Authentication

    Settings relevant only when crawling SharePoint online .

    account - string

    Your Microsoft SharePoint Online Account name which takes the form of username@domain.com

    >= 1 characters

    password - string

    Password for your Microsoft SharePoint Online Account.

    >= 1 characters

    sessionExpirationMs - number

    How long in milliseconds before new SharePoint online authentication cookies should be fetched.

    >= 1

    <= 172800000

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 7200000

    Multiple of: 1

    userAgent - string

    The user agent header decorates the http traffic. This is important for preventing hard rate limiting by SharePoint Online.

    Default: ISV|Lucidworks|Fusion/5.x

    capUserAgent - string

    When "O365 Conditional Access Policy (CAP) setting" is enabled, we need to use a compliant User-Agent that matches one of the supported devices when doing O365 STS authentication. For example if iOS is a supported platform, set this to 'Mozilla/5.0 (iPhone; CPU iPhone OS 10_3_3 like Mac OS X) AppleWebKit/603.1.30 (KHTML, like Gecko) CriOS/60.0.3112.89 Mobile/14G60 Safari/602.1'

    <= 4000 characters

    >= 1 characters

    appAuthClientId - string

    Applicable to SharePoint Online App-Auth Public/Private Service Account. The Azure client ID of your application.

    <= 100 characters

    >= 1 characters

    appAuthPkcs12KeystoreBase64String - string

    Applicable to SharePoint Online App-Auth only. This is the base64 string of your PKCS12 keystore loaded with the PFX certificate file supplied by Azure AD. To get this value, first take the Azure AD yourcert.pfx you recieved from Azure and convert to PKCS12 keystore format (example "keytool -importkeystore -srckeystore yourcert.pfx -srcstoretype pkcs12 -destkeystore yourcert.p12 -deststoretype pkcs12"). Next convert yourcert.p12 to base64 string.

    <= 10000 characters

    >= 1 characters

    appAuthPkcs12KeystorePassword - string

    Applicable to SharePoint Online App-Auth Public/Private Service Account. Password of the PKCS12 keystore.

    <= 100 characters

    >= 1 characters

    appAuthClientSecret - string

    Applicable to SharePoint Online OAuth App-Auth only. The Azure client ID of your application.

    <= 100 characters

    >= 1 characters

    appAuthRefreshToken - string

    Applicable to SharePoint Online OAuth App-Auth only. This is a refresh token which is reusable for up to 12 hours. You must obtain a new tokenusing the OAuth login process if the token becomes expired.

    <= 1000 characters

    >= 1 characters

    appAuthTenant - string

    Applicable to SharePoint Online App-Auth only. The Office365 tenant name to use when authenticating with Azure AD.

    <= 2083 characters

    >= 1 characters

    appAuthAzureLoginEndpoint - string

    Applicable to SharePoint Online App-Auth Public/Private Service Account. The Azure login endpoint to use when authenticating.

    <= 2083 characters

    >= 1 characters

    Default: https://login.windows.net

    jsAuthConfigJson - string

    JS Auth config json file contains a list of WebCredential to do a web driver login process.

    jsAuthLoginUrl - string

    JS Auth Login Url to use when doing the login process.

    jsAuthSeleniumUrl - string

    URL of the Selenium grid service to use while obtaining performing WebDriver auth to sharepoint online.

    maximumItemLimitConfig - Item Count Limit

    maxItems - number

    Limits the number of items emitted to the configured IndexPipeline. The default is no limit (-1).

    >= -2147483648

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: -1

    Multiple of: 1

    sizeLimitProperties - Item Size Limits

    For documents which do not meet the maximum/minimum size limits, only metadata will be indexed without body.The documents will indicate reason why content is not indexed, with the field '_lw_contents_excluded_s: file size'

    maxSizeBytes - number

    Used for excluding items when the item size is larger than the configured value.

    >= -2147483648

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: -1

    Multiple of: 1

    minSizeBytes - number

    Used for excluding items when the item size is smaller than the configured value.

    >= -2147483648

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 1

    Multiple of: 1

    fetchRetryProperties - Retry Options

    A set of options for configuring retry behavior.

    delayFactor - number

    The retryer will retry failed operations in the case that they might succeed if attempted again. The retryer will sleep an exponential amount of time after the first failed attempt and retry in exponentially incrementing amounts after each failed attempt up to the maximumTime. nextWaitTime = exponentialIncrement * multiplier.

    >= 1

    <= 9999

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 2

    Multiple of: 1

    maxRetries - number

    The retryer will retry failed operations in the case that they might succeed if attempted again. This parameter states the number of attempts to retry until giving up. This parameter, if specified, will override the "Stop retrying after time (milliseconds)" parameter.

    <= 100

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 3

    Multiple of: 1

    delayMs - number

    Sets the delay between retries, exponentially backing off to the maxDelayTimeMs and multiplying successive delays by the delayFactor

    >= 1

    <= 9223372036854776000

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 1000

    Multiple of: 1

    maxDelayTimeMs - number

    The maximum time wait time between successive retries.

    >= 1

    <= 600000

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 300000

    Multiple of: 1

    maxTimeLimitMs - number

    This setting is used to limit the maximum amount of time spent on retries. Note: this will be ignored if "Maximum Retries" is specified.

    >= 1

    <= 28800000

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 600000

    Multiple of: 1

    errorExclusions - array[string]

    Optional regex list that will be matched against failed attempts exception class and message. If any regex matches, do not retry this request. This is needed to prevent the retryer from retrying non-recoverable errors that were not already ignored by the connector implementation.

    connections - Http client options

    A set of options for configuring the http client.

    maxConnections - number

    The maximum number of connections

    >= 1

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 5000

    Multiple of: 1

    maxPerRoute - number

    Defines a connection limit per one HTTP route. In simple cases you can understand this as a per target host limit. Under the hood things are a bit more interesting: HttpClient maintains a couple of HttpRoute objects, which represent a chain of hosts each, like proxy1 -> proxy2 -> targetHost. Connections are pooled on per-route basis. In simple cases, when you're using default route-building mechanism and provide no proxy suport, your routes are likely to include target host only, so per-route connection pool limit effectively becomes per-host limit.

    >= 1

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 1000

    Multiple of: 1

    ignoreSSLValidationExceptions - boolean

    Do not attempt to do an SSL Handshake and do not verify the hostname of SSL certificates. Use this when accessing an https url with a self-signed or enterprise certificate authority that you do not want to put in the Java keystore.

    Default: false

    readTimeoutMs - number

    >= -1

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 60000

    Multiple of: 1

    connectTimeoutMs - number

    >= -1

    <= 2147483647

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: 300000

    Multiple of: 1

    debug - Debug options

    Special properties used for debugging the connector.

    logThreadDumpEveryNSeconds - number

    For diagnostic purposes, write a thread dump to logs every N seconds. If set <= 0, no dump is taken.

    >= -1

    <= 9999999

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: -1

    Multiple of: 1

    simulate429ErrorsEveryNRequests - number

    If > 0, simulate a SharePoint 429 status (too-many-requests) error such that there will be one error per this many requests.

    >= -1

    <= 999999

    exclusiveMinimum: false

    exclusiveMaximum: false

    Default: -1

    Multiple of: 1

    onlyFetchMetadata - boolean

    For diagnostic purposes, do a dry run where the connector will only generate the metadata sharepoint export database and index the ACL records in the ACL collection, but will not fetch content.

    Default: false

    logAclInserts - boolean

    For diagnostic purposes, log all documents inserted into the ACL collection.

    Default: false

    security - Graph security filtering configuration

    enabled - boolean

    Enable query-time security-trimming

    Default: true