Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!Get Fabric certified for FREE! Don't miss your chance! Learn more
Currently, when configuring a Copy Job using the SAP Datasphere Outbound for ADLS2 source, the UI does not provide an option for Shared Access Signature (SAS) authentication to the underlying ADLS Gen2 storage account. This forces users to provide an Account Key (Full Access), which contradicts enterprise security standards of least privilege.
There is a clear functional discrepancy within Microsoft Fabric:
Lakehouse Shortcuts: Correctly allow SAS authentication when creating a shortcut to the same ADLS2 storage.
Standard ADLS2 Connections: A standalone ADLS2 connection in a Copy Job or Pipeline allows SAS authentication.
SAP Datasphere Outbound connection in Fabric: When selecting this specific connection type in a Copy Job, the UI restricts the authentication methods, omitting SAS.
Security & Compliance: SAP Datasphere itself supports and recommends SAS tokens for writing to ADLS2 storage. By not supporting SAS on the Fabric side for the same connection, Fabric becomes the "weakest link" in the chain, requiring "all or nothing" Account Keys.
Enterprise Readiness: Large-scale SAP integrations require granular, time-bound access. Using Account Keys for staging containers is often rejected by InfoSec teams.
Workflow Efficiency: Users already have the infrastructure (SAS tokens) generated by SAP Datasphere. Requiring a different credential type specifically for the Fabric Copy Job adds unnecessary friction.
Expose the "Shared Access Signature (SAS)" authentication kind within the connection settings for SAP Datasphere Outbound sources in the Copy Job UI, achieving parity with the standard ADLS Gen2 connector.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.