Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!Vote for your favorite vizzies from the Power BI Dataviz World Championship submissions. Vote now!
I am retrieving an access token by calling an API and then use this access token to obtain employee data. I'm using a blank query with the following code.
body="grant_type=client_credentials&client_id="&<client_id>&"client_secret="&<client_secret>,
Source = Json.Document(Web.Contents(baseUrl,
[
RelativePath = "oauth/issueToken",
Headers = [#"Content-Type"="application/x-www-form-urlencoded"],
Content=Text.ToBinary(body)
]
)),
token = Source[access_token],
data= Json.Document(Web.Contents(baseUrl,
[
RelativePath = "api/employees",
Headers = [#"Authorization"="Bearer "&token]
]
)),
I'm getting access token calling our own API (not using AAD). What is the best way to store these client credentials (client_id and client_secret) instead of hardcoding in the code?
Besides the great option @lbendlin mentioned, with an additional API endpoint you could also use the builtin credentials manager https://community.powerbi.com/t5/Power-Query/How-to-securely-store-and-use-token-and-secret-for-API-...
store them in a text file in a sharepoint document library that only you have access to. Then retrieve that file as part of the Power Query transforms etc.
Vote for your favorite vizzies from the Power BI World Championship submissions!
If you love stickers, then you will definitely want to check out our Community Sticker Challenge!
Check out the January 2026 Power BI update to learn about new features.
| User | Count |
|---|---|
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 |
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 2 | |
| 2 |