Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!View all the Fabric Data Days sessions on demand. View schedule
Background:
Changes were made to a Microsoft Fabric ETL pipeline that includes multiple source systems, some of which are SharePoint (Excel) files connected via dataflows.
Notification activity was configured for error reporting, and a column was intentionally removed to test error handling
What I Changed:
Re-authenticated the notification connection.
Removed a column to trigger a test error.
Ran the full pipeline.
What Went Wrong:
The pipeline failed with errors related to:
Conditional Access Policy
Multi-Factor Authentication (MFA)
SharePoint dataflow connections were failing authentication.
What Fixed It:
Re-authenticating each failing dataflow using the service account resolved the issue.
The pipeline executed successfully afterward.
Questions
Immediate Resolution after Re-authentication
Why did re-authenticating the dataflow connections instantly fix the issue?
Does Fabric cache tokens or connection sessions that might expire silently?
MFA / Conditional Access Issues
Why were the connections initially blocked by MFA or Conditional Access?
How did re-authentication bypass these security checks?
Additional Connections Behavior
Who creates the extra SharePoint connections with the SP- prefix?
Are they always system-generated during re-authentication?
Why do they appear lower in the connection list even if created later?
Best Practices for Service Accounts
How can I ensure consistent and persistent connection behavior for service accounts across multiple dataflows?
Solved! Go to Solution.
Immediate Resolution
Maybe reauth fixed it because fabric refreshed the expired OAuth token.
Yes, fabric caches access tokens. When conditional access or MFA policies change, those cached tokens become invalid silently until you re-authenticate.
MFA/Conditional Access Issues
The initial block happened because the service account’s cached token did not satisfy updated cnditional access or MFA requirements.
Re-authentication forced a new compliant token flow, which met the policy requirements and succeeded.
Additional Connections (SP prefix)
The SP- connections are system-generated shadow connections created by Fabric when SharePoint connectors re-establish authentication.
They often appear lower in the list because Fabric sorts connections by creation timestamp but groups system-generated ones separately.
Best Practices for Service Accounts
Use a dedicated, noninteractive service account excluded from MFA (via Conditional Access exceptions).
Re-authenticate all Fabric dataflows after any password or policy change.
Use organization-wide connections instead of per user connections where possible.
Document and monitor connection expiry intervals; revalidate proactively every 90 days or per token policy.
Keep Conditional Access policies aligned with automation accounts to avoid unexpected MFA prompts.
Hope this will help point you to the right direction.
Immediate Resolution
Maybe reauth fixed it because fabric refreshed the expired OAuth token.
Yes, fabric caches access tokens. When conditional access or MFA policies change, those cached tokens become invalid silently until you re-authenticate.
MFA/Conditional Access Issues
The initial block happened because the service account’s cached token did not satisfy updated cnditional access or MFA requirements.
Re-authentication forced a new compliant token flow, which met the policy requirements and succeeded.
Additional Connections (SP prefix)
The SP- connections are system-generated shadow connections created by Fabric when SharePoint connectors re-establish authentication.
They often appear lower in the list because Fabric sorts connections by creation timestamp but groups system-generated ones separately.
Best Practices for Service Accounts
Use a dedicated, noninteractive service account excluded from MFA (via Conditional Access exceptions).
Re-authenticate all Fabric dataflows after any password or policy change.
Use organization-wide connections instead of per user connections where possible.
Document and monitor connection expiry intervals; revalidate proactively every 90 days or per token policy.
Keep Conditional Access policies aligned with automation accounts to avoid unexpected MFA prompts.
Hope this will help point you to the right direction.
Hi Vinodh,
Thanks so much for the clarification it really helps me understand how Fabric handles SP- connections and re-authentication.
I have a follow-up question:
If I re-authenticate the same dataflow multiple times (e.g., 3 times in a row), will Fabric create 3 separate SP- connections (SP1, SP2, SP3)?
Or does it reuse the existing SP- connection and just refresh the token?
Appreciate your insights!
Check out the November 2025 Fabric update to learn about new features.
Advance your Data & AI career with 50 days of live learning, contests, hands-on challenges, study groups & certifications and more!