Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!View all the Fabric Data Days sessions on demand. View schedule
Please do what you can to make EVERY connection type in Fabric support Service Principal authentication, AND make it so that the Secret (Service Principal Key) can be stored in an Azure Key Vault.
Many Fabric solutions involve connections to other data sources inside an organization's data landscape. Right now, there is a mix of authentication types available to the various connections. Service Principals are great, but they secret has an expiration date. When that expiriation is met and a new Secret generated, EVERY connection that uses that Service Principal need to be updated. For a moderately sized solution, that could be several or dozens of connections. Needing to edit the Secret on each one is not sustainable.
But by allowing the Secret to be stored in an Azure Key Vault, and making that Key Vault reference available in Fabric, now there is only ONE place to refresh that Secret and all (Service Principal) Connections can utilize it.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.