Authenticates an Azure account for needed scopes.

Parameters:

Parameters:
See dedicated page for more information.
AzureUnlock authenticates the atrnatv runtime against Microsoft 365 services using an Azure AD service principal (App Registration). It exchanges your client ID/secret for OAuth tokens and unlocks access to:
Note: AzureUnlock is not required for Azure Blob Storage actions (they use the Storage account Access key). Use AzureUnlock for Microsoft Graph/Power BI–based actions only.
An App Registration in Azure AD with a client secret (copy the Value, not the Secret ID).
Admin consent granted for the needed Application permissions:
Files.ReadWrite.All, Mail.ReadWrite, Mail.Send, Contacts.ReadWrite, (optional) User.Read.AllSites.FullControl.All (or Sites.ReadWrite.All if you choose reduced SharePoint scope)Tenant.Read.All, Dataset.ReadWrite.AllPower BI Admin Portal: “Allow service principals to use Power BI APIs” enabled and the app added to the target workspace with Admin role (if Power BI is ON).
Outbound HTTPS to login.microsoftonline.com, graph.microsoft.com, api.powerbi.com.
This action does not take tabular input. It operates only on its parameters and returns status in Records/Data.
Values used in your successful run
Access to SharePoint lists = full control (allow creating & deleting lists)Allow access to PowerBI = ON, Access to OneDrive = ON, Access to send & receive e-mails = ON, Allow access to contact's address book = ON, Allow access to user's directory = OFFAzure application (client) ID = <your-app-client-id>, Azure tenant ID = <your-tenant-id>, Azure client secre = <REDACTED>Parameter rules
Allow access to PowerBI = ON → You must also: enable SP usage in Power BI tenant settings and add the app to the workspace with Admin role.Access to SharePoint lists = full control → the app needs Sites.FullControl.All (SharePoint). For the reduced mode, use Sites.ReadWrite.All.Allow access to user's directory = ON → add Graph User.Read.All and grant admin consent.Create the App (one-time)
Azure AD → App registrations → New registration → name atrnatv-etl-service → Single-tenant → create client secret and copy the Value.
Assign Application permissions & consent
Add Graph, SharePoint, and (optionally) Power BI permissions listed in Prerequisites → Grant admin consent.
(If Power BI ON)
Power BI Admin portal → enable service principal → add the app to the target workspace with Admin role.
Configure the box
Open AzureUnlock → Parameters and set:
Access to SharePoint lists = full control (allow creating & deleting lists)Allow access to PowerBI = ON, Access to OneDrive = ON, Access to send & receive e-mails = ON, Allow access to contact's address book = ON, Allow access to user's directory = OFFAzure application (client) ID = <your-app-client-id>Azure tenant ID = <your-tenant-id>Azure client secret = <REDACTED>Run → Run to this pin.
Validate output
login.microsoftonline.com.ExpiryUTC.Smoke-test a downstream action (pick at least one):
| Symptom / Error | Likely Cause | Fix |
|---|---|---|
AADSTS700016 / invalid_client |
Wrong clientID or deleted app |
Re-copy Application (client) ID from App Registration. |
| Token fails after pasting secret | Pasted Secret ID (GUID) instead of Value | Create a new secret and paste the Value. |
insufficient privileges / Graph 403 |
Missing permission for selected service | Add the exact Application permission (e.g., Mail.Send), Grant admin consent, re-run. |
| SharePoint operations fail on reduced mode | idSharepoint too restrictive |
Switch to full control or grant Sites.FullControl.All. |
| Power BI “Service principal not allowed” | Tenant setting off / workspace role missing | Enable SP usage in Admin portal and add app to workspace (Admin). |
invalid_grant / consent required |
Admin consent not granted | Grant tenant-wide admin consent for the app. |
| Network timeouts | Firewall/proxy or transient 5xx | Allow outbound HTTPS; keep nRetry = 3; consider proxy config if required. |
| Clock skew / signature mismatch | System clock too far off | Sync host time with NTP. |
