# Excel

Microsoft Excel (opens new window) is a spreadsheet software program and a powerful data visualization and analysis tool.

Workato's Excel connector enables you to read data from Excel workbooks stored in OneDrive for Business, SharePoint sites, or shared Group drives.

SQL TRANSFORMATIONS FOR EXCEL FILE SOURCES

The Excel connector only supports working with files stored in SharePoint and OneDrive. For processing or transforming large-volume Excel files from other sources, such as Google Drive or SFTP, use SQL Transformations.

# API version

The Excel connector uses the Excel REST API v1 (opens new window).

# How to connect to Excel on Workato

Workato supports the following types of connections to Excel:

# Authorization code grant authentication (OAuth 2.0)

This authentication method requires the following value for tenant-specific account types:

  • Tenant ID/Domain

# Step 1: Register the Workato App in Azure portal

Complete the following steps to register the Workato app and assign it permissions for authorization code grant connections.

1
Register the Workato app in the Azure Portal
2

Select App registrations > + New registration, under Azure services.

Add an app registration

3

Enter a unique name for the application and select a Supported account type.

4

Select Web from the Select a platform drop-down menu.

5

Enter https://www.workato.com/oauth/callback as the Redirect URI and select Register.

Register appRegister an app

2
Assign permissions to your app
1

In the navigation sidebar, select Manage > API permissions.

2

Click + Add a permission and select Microsoft Graph APIs.

Add permissionsAdd permissions

3

Add the required permissions as outlined in the Permissions required to connect section. Depending on your connection type, you must assign Application or Delegated permissions.

4

Click Add permissions.

Admin consent is required for specific permissions. Refer to the Granting admin consent section to learn more.

3
Obtain the Directory (tenant ID) from the Azure portal
1

Go to the Overview > Essentials section.

App detailsApp details

2

Copy the Directory (tenant) ID for use in Workato.

# Step 2: Complete setup in Workato

1

Click Create > Connection.

2

Search for and select Excel as your connection in the New connection page.

3

Provide a name for your connection in the Connection name field.

4

Use the Location drop-down menu to select the project where you plan to store the connection.

5

Use the Connection account type drop-down menu to select the type of account you plan to use. The available choices are Common and Tenant-specific.

6

Select Authorization code grant as the Authentication type.

7

Optional. By default, the connector requests a set of scopes necessary for all triggers and actions to function properly. In the Advanced settings section, you can manually select the permissions instead. The minimum permissions required to establish a connection are Files.Read and offline_access. Workato always requests these permissions regardless of the permissions you select. Refer to the permissions section for more information.

8

Click Sign in with Microsoft.

# Client credentials-based authentication (OAuth 2.0)

COMPATIBLE AUTHENTICATION

Client credentials-based authentication is only compatible with tenant-specific connections.

This method requires the following fields:

  • Tenant ID/Domain
  • User ID
  • Client ID
  • Client Secret

# Step 1: Register the Workato App in the Azure Portal

Complete the following steps to register the Workato app and assign it permissions for client credentials-based connections.

1
Register the Workato App in the Azure Portal
2

Select App registrations > + New registration, under Azure services.

Add an app registration

3

Enter a unique name for the application and select a Supported account type.

4

Select Web from the Select a platform drop-down menu.

5

Enter https://www.workato.com/oauth/callback as the Redirect URI and select Register.

Register appRegister an app

2
Assign permissions to your app
1

In the navigation sidebar, select Manage > API permissions.

2

Click + Add a permission and select Microsoft Graph APIs.

Add permissionsAdd permissions

3

Add the required permissions as outlined in the Permissions required to connect section. Depending on your connection type, you must assign Application or Delegated permissions.

4

Click Add permissions.

Admin consent is required for specific permissions. Refer to the Granting admin consent section to learn more.

3
Generate an API key
1

Go to Manage > Certificates & Secrets > Client secrets and click + New client secret.

2

Provide a Description for the client secret and specify an expiry date.

3

Click Add. Copy and save this secret for use in Workato.

4
Obtain the Application (client) ID, Object ID, and Directory (tenant) ID from the Azure Portal
1

Go to the Overview > Essentials section.

App detailsApp details

2

Copy the Application (client) ID, Object ID, and Directory (tenant) ID for use in Workato.

5
Obtain the User ID from the Azure Portal
1

To obtain the User ID, go to Home > Users.

UsersSelect users

2

Search for and select the user associated with your account.

3

Copy the Object ID. This value is used for the User ID in Workato.

Return to Workato to finish setting up your connection.

# Step 2: Complete setup in Workato

1

Click Create > Connection.

2

Search for and select Excel as your connection in the New connection page.

3

Provide a name for your connection in the Connection name field.

4

Use the Location drop-down menu to select the project where you plan to store the connection.

5

Select Tenant specific as the Connection account type. This option is specifically designed for users who belong to a particular organization (tenant).

Tenant specific connection typeTenant specific account connection type

6

Provide your Tenant ID/Domain. This is the Directory (tenant) ID for your app. Refer to the Register an app in Azure section to learn how to obtain this value.

7

Select Client credentials as the Authentication type.

8

Supply the User ID, Client ID, and Client secret for your app. Refer to the Register an app in Azure section to learn how to obtain these values.

9

Click Sign in with Microsoft.

# Permissions required to connect

# Default scopes for authorization code grant connections

By default, the Excel connector requests the following scopes for authorization code grant connections. These scopes are necessary to use all of this connector's triggers and actions. Additionally, you must assign these permissions to the Workato app as Delegated permissions in the Azure portal.

Permission Description Relevant action or trigger
Files.Read Allows the app to read the signed-in user's files. Get cells, Get rows, List tables, List worksheets and Search workbooks
Files.ReadWrite Allows the app to read and write to the signed-in user's files. All actions in Files.Read and Add a table, Add a worksheet, Add rows in batch, Delete row and Update row.
Group.Read.All Allows the app to read files for all groups the signed-in user can access. Get cells, Get rows, List tables, List worksheets and Search workbooks
Sites.Read.All Allows the app to read documents in all SharePoint site collections on behalf of the signed-in user. Get cells, Get rows, List tables, List worksheets and Search workbooks
Sites.ReadWrite.All Allows the app to read and write to documents in all SharePoint site collections on behalf of the signed-in user. On the consent page, this scope appears as the Maintain access to data you have given it access to permission. All actions in Sites.Read.All and Add a table, Add a worksheet, Add rows in batch, Delete row, and Update row. This permission is recommended for all actions to preserve the connection's validity.
User.Read Allows the app to sign-in and read the profile of signed-in users. This permission is recommended for all actions.
offline_access Allows the app to access Microsoft Graph data after the user has signed out or the session has expired. This permission is required to establish a connection.

# Minimum scopes for authorization code grant connections

The following minimum scopes are required to establish a connection to Excel using authorization code grant authentication:

  • Files.Read
  • offline_access

# Default scopes for client credential connections

By default, the Excel connector requests the following scopes for client credentials connections. These scopes are necessary to use all of this connector's triggers and actions. Additionally, you must assign these permissions to the Workato app as Application permissions in the Azure portal.

Permission Description Relevant action or trigger
Files.Read.All Allows the app to read the signed-in user's files. Get cells, Get rows, List tables, List worksheets, and Search workbooks
Files.ReadWrite.All Allows the app to read and write to the signed-in user's files. All actions in Files.Read and Add a table, Add a worksheet, Add rows in batch, Delete row, and Update row.
Sites.Read.All Allows the app to read documents in all SharePoint site collections on behalf of the signed-in user. Get cells, Get rows, List tables, List worksheets, and Search workbooks
Sites.ReadWrite.All Allows the app to read and write to documents in all SharePoint site collections on behalf of the signed-in user. On the consent page, this scope appears as the Maintain access to data you have given it access to permission. All actions in Sites.Read.All and Add a table, Add a worksheet, Add rows in batch, Delete row, and Update row. This permission is recommended for all actions to preserve the connection's validity.
User.Read.All Allows the app to sign-in and read the profile of signed-in users. This permission is recommended for all actions.

# Minimum scopes for client credential connections

The following minimum scopes are required to establish a connection to Excel using client credentials-based authentication:

  • Files.Read.All
  • User.Read.All

To connect to the Excel connector using a Microsoft Entra ID account, ensure that all the consent requests are granted by admins.

Complete the following steps to grant admin consent using an admin account:

1

Sign in to your Azure portal and navigate to Enterprise Applications > Activity > Admin consent requests.

2

Approve the necessary consent requests.


Last updated: 11/27/2024, 3:59:35 PM