Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!The Power BI Data Visualization World Championships is back! Get ahead of the game and start preparing now! Learn more
Hi,
I’m trying to authenticate to Azure AD–protected resources (e.g., Microsoft Graph) from a Microsoft Fabric notebook using Workspace Identity, without secrets or certificates.
My requirement is to use only DefaultAzureCredential (or supported identity-based credentials).
What I have done
Error: ManagedIdentityCredential: ManagedIdentityCredential authentication unavailable, no response from the IMDS endpoint.
My question:
Is it currently supported to use DefaultAzureCredential with Workspace Identity inside a Fabric notebook?
If not supported:
If supported:
What exact configuration is required to make Workspace Identity available to azure-identity inside notebooks?
Thanks,
Bharath Kumar S
Solved! Go to Solution.
Hi @BharathKumarS
Currently, using DefaultAzureCredential with Workspace Identity inside a Microsoft Fabric notebook is not supported. Workspace Identity is enabled at the workspace level, but it is not injected into the notebook runtime environment, which is why ManagedIdentityCredential fails with the IMDS endpoint error. This is a known limitation, and Microsoft has indicated plans to support identity injection for notebook runtimes in the future, though no official timeline has been announced. Until native support is available, the recommended approach is to use alternative authentication methods such as InteractiveBrowserCredential for user-based login or ClientSecretCredential with a service principal, storing secrets securely in Azure Key Vault or Fabric Key Vault. These methods provide a secure way to access Azure AD–protected resources like Microsoft Graph from Fabric notebooks.
Thanks and regards,
Shreya
Hi @BharathKumarS
Currently, using DefaultAzureCredential with Workspace Identity inside a Microsoft Fabric notebook is not supported. Workspace Identity is enabled at the workspace level, but it is not injected into the notebook runtime environment, which is why ManagedIdentityCredential fails with the IMDS endpoint error. This is a known limitation, and Microsoft has indicated plans to support identity injection for notebook runtimes in the future, though no official timeline has been announced. Until native support is available, the recommended approach is to use alternative authentication methods such as InteractiveBrowserCredential for user-based login or ClientSecretCredential with a service principal, storing secrets securely in Azure Key Vault or Fabric Key Vault. These methods provide a secure way to access Azure AD–protected resources like Microsoft Graph from Fabric notebooks.
Thanks and regards,
Shreya
Workspace Identity is used as an authentication method for connections used by OneLake shortcuts, pipelines (incl. Copy), semantic models, and Dataflows Gen2.
Hope this helps! If it helps kindly indicate with a kudos or accepting as a solution.