Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!Learn from the best! Meet the four finalists headed to the FINALS of the Power BI Dataviz World Championships! Register now
Hi,
If I use a SQL username/password in Power BI Desktop to connect to SQL Server (either DirectQuery or Import), is there a possiblity that the SQL username/password can be extracted from the /pbix file and breach security? I'm source controlling .pbix files in GitHub so would like to mitigate any security risks.
Thanks
@Anonymous, If you rename the .pbix file to.zip, you have access to the underlying data files. You will find the DataMashup file and DataModel file. The DataMashup file contains the SQL Server name, domain, database, schema and table details. And the DataModel file contains the user profile name. Anyone who opens the .pbix file can get the server name, database name and even credential name related information.
Even though SQL authentication appears to be encrypted in the file and not visible by other users. However, I still don't think it is a good idea to share a .pbix file with anyone don't trust or post it publicly.
@Anonymous
So far I don't find any document that can free your concern. From what I observe, the involved credentials need to be re-initialized in Power BI service when publishing a pbix from desktop. So I prefer to think that there's no way to extract the credentials(Or they don't have to be re-initialized again).
Thanks for your feedback, I'd consult this concern internally and would post any update if I get. 🙂
Share feedback directly with Fabric product managers, participate in targeted research studies and influence the Fabric roadmap.
Check out the February 2026 Power BI update to learn about new features.
| User | Count |
|---|---|
| 52 | |
| 50 | |
| 34 | |
| 15 | |
| 14 |
| User | Count |
|---|---|
| 93 | |
| 77 | |
| 41 | |
| 26 | |
| 26 |