Power BI is turning 10, and we’re marking the occasion with a special community challenge. Use your creativity to tell a story, uncover trends, or highlight something unexpected.
Get startedJoin us at FabCon Vienna from September 15-18, 2025, for the ultimate Fabric, Power BI, SQL, and AI community-led learning event. Save €200 with code FABCOMM. Get registered
Hi,
I am trying to set up a trusted workspace in ADLS in two different tenants. In Tenant A, I have an ADLS Storage Account and in Tenant B, I have my Fabric capacity and environment running. Is it possible to add a workspace from Tenant B in the Resource instance rule of Tenant A? I am using this article as a reference: https://blog.fabric.microsoft.com/en-us/blog/introducing-trusted-workspace-access-for-onelake-shortc....
And is it always necessary to add a workspace identity too? Or can I use a SAS token with trusted workspace with an identity?
Solved! Go to Solution.
I solved this by using the managed private endpoint in combination with a service principal in the same tenant as the storage account, since the workspaces does not work cross tenant without connecting the two tenants in some way.
With the private endpoint, I was able to connect to the storage account that had network restrictions.
With a custom Python script I copied the files from the network restricted storage account to Fabric.
I solved this by using the managed private endpoint in combination with a service principal in the same tenant as the storage account, since the workspaces does not work cross tenant without connecting the two tenants in some way.
With the private endpoint, I was able to connect to the storage account that had network restrictions.
With a custom Python script I copied the files from the network restricted storage account to Fabric.
Hi @FabianSchut ,
Yes, you can add tenant B's workspace to tenant A's resource instance rule.
Best Regards,
Adamk Kong
If this post helps, then please consider Accept it as the solution to help the other members find it more quickly.
Hi @Anonymous,
Unfortunately, I did not get this setup working. I've added the workspace from tenant A in the network settings from tenant B. When I try to setup the connection in tenant A with a SAS-token, I get an invalid credentials error. I've tried all different access rights with the SAS-token.
What I think goes wrong in this case, is that a connection is not set on workspace level, but Fabric tenant level. When I add a workspace as trusted, the connection does not use that trusted workspace. It may only work if I use Workspace Identity as an authorization method. However, I cannot add the Workspace Identity from tenant A in tenant B as a Blob Data Reader for example.
What is the best way to add the Workspace Identity from tenant A in tenant B?
Hi @FabianSchut ,
You can try to manage user identity and control user access to resources with the help of IAM.
Refer to below document:
Azure identity & access security best practices | Microsoft Learn
Best Regards,
Adamk Kong
If this post helps, then please consider Accept it as the solution to help the other members find it more quickly.
This is your chance to engage directly with the engineering team behind Fabric and Power BI. Share your experiences and shape the future.
Check out the June 2025 Fabric update to learn about new features.
User | Count |
---|---|
2 | |
2 | |
2 | |
2 | |
2 |