Join us at FabCon Atlanta from March 16 - 20, 2026, for the ultimate Fabric, Power BI, AI and SQL community-led event. Save $200 with code FABCOMM.
Register now!The Power BI Data Visualization World Championships is back! Get ahead of the game and start preparing now! Learn more
Hi Everyone,
There is an Azure Key Vault support introduced for connections in Fabric with Authentication Method as OAuth. I have couple of questions
1. Is there anything in roadmap with Service Principal or Workspace Identity as Authentication Method?
2. How can I refer azure key vault connection in notebooks is there any sample?
Regards,
Srisakthi
Solved! Go to Solution.
Hi @Srisakthi ,
You can create and manage Key Vault connections in the Data -> Connections tab.
Direct usage of those Key Vault connections in Lakehouse or Notebook environment is not natively exposed yet.
I suggest submitting your detailed feedback and ideas through Microsoft's official feedback channels, such as Microsoft Fabric Ideas. Feedback submitted through these channels is frequently reviewed by the product teams and can contribute to meaningful improvements.
Fabric Ideas - Microsoft Fabric Community
If this post helps, then please consider Accepting as solution to help the other members find it more quickly, don't forget to give a "Kudos" – I’d truly appreciate it!
Thank you
Hi @v-dineshya ,
I have submitted the idea. Please check
MS Fabric Connections in Notebook - Microsoft Fabric Community
Thanks,
Srisakthi
Hi @burakkaragoz ,
Referencing key vault in notebook directly I have explored few months back itself. What I was looking for is using Key vault conenction that we create in MS Fabric to be referred in notebook
Regards,
Srisakthi
Hi @Srisakthi ,
Thanks for clarifying – now I get what you're aiming for.
Currently, Fabric Notebooks don’t natively expose the Key Vault Connections created in the UI (like they do for pipelines or dataflows). But here are a couple of workarounds you can try:
If your notebook is running in a managed identity context (like Fabric runtime), you can use the Azure SDK to access secrets directly:
from azure.identity import DefaultAzureCredential
from azure.keyvault.secrets import SecretClient
key_vault_url = "https://<your-keyvault-name>.vault.azure.net/"
credential = DefaultAzureCredential()
client = SecretClient(vault_url=key_vault_url, credential=credential)
secret = client.get_secret("your-secret-name")
print(secret.value)Make sure the Fabric workspace or runtime has access to the Key Vault via RBAC or access policies.
If direct access isn’t working, you can store secrets (or connection strings) in a secured Lakehouse table and read them at runtime. Not ideal, but works for controlled environments.
Let me know if you want help setting up the identity permissions or testing the SDK approach. Happy to walk through it with you.
Hi burakkaragoz,
I was trying the following solutions
1. Markutils: But this get the secret under the user who is running the notebook. So as notebook user I need read,get access to the keyvault. (I would like to avoid this method as multiple devs are working)
2. I was trying the SDK where I am using. I did added the worksapce name in the access policy of my keyvault. But Still I am not able to access it. Can you let me know what I can do in this scenario?
Hi @hgupta13 , yes what you are trying will not work .
DefaultAzureCredential() is also not supported in Fabric notebook to fetch secret.
what i did was called the notebook directly from ADF using web activity with which the notebook took the adf managed identity's autnetication .
You can Check if you also have similar scenario
Hi @Srisakthi ,
Just checking in – did the steps I shared help resolve the issue?
✅ If it’s working now, feel free to mark the response as the Accepted Solution. This helps others who face the same issue find the fix faster.
✨ And of course, a little Kudos would be much appreciated!
If you're still running into trouble, let me know what you've tried so far and I’ll help you dig deeper. We’ll get it sorted!
Hi @Srisakthi ,
Thank you for reaching out to the Microsoft Community Forum.
1. Roadmap for Service Principal or Workspace Identity as Authentication Methods
Azure Key Vault connections in Microsoft Fabric support OAuth authentication. While there is no explicit documentation detailing the roadmap for Service Principal or Workspace Identity authentication methods for Azure Key Vault connections, Microsoft is actively enhancing authentication capabilities within Fabric.
Workspace Identity a managed service principal associated with a Fabric workspace is available and can be used for authentication with certain data sources, such as Azure Data Lake Storage Gen2. This feature allows Fabric items like OneLake shortcuts, data pipelines, and semantic models to authenticate securely without managing credentials manually.
While Workspace Identity support for Azure Key Vault connections is not explicitly mentioned, the ongoing enhancements suggest that broader authentication method support may be introduced in the future.
2. Referencing Azure Key Vault Connections in Notebooks
To access Azure Key Vault secrets within Fabric notebooks, you can use the mssparkutils library.
sample code snippet:
# Replace with your Key Vault URL and secret name
secret_value = mssparkutils.credentials.getSecret('https://<your-keyvault-name>.vault.azure.net/', 'your-secret-name')
print(secret_value)
Please refer community threads and Microsoft articles and blogs.
Authenticate with Microsoft Fabric workspace identity - Microsoft Fabric | Microsoft Learn
Solved: Access Key-vault in notebooks - Microsoft Fabric Community
Authenticate to Azure Key Vault | Microsoft Learn
Workspace identity - Microsoft Fabric | Microsoft Learn
If my response has resolved your query, please mark it as the "Accepted Solution" to assist others. Additionally, a "Kudos" would be appreciated if you found my response helpful.
Thank you
Hi @Srisakthi ,
If my response has resolved your query, please mark it as the "Accepted Solution" to assist others. Additionally, a "Kudos" would be appreciated if you found my response helpful.
Thank you
Hi @Srisakthi ,
If my response has resolved your query, please mark it as the "Accepted Solution" to assist others. Additionally, a "Kudos" would be appreciated if you found my response helpful.
Thank you
Hi @Srisakthi ,
If my response has resolved your query, please mark it as the "Accepted Solution" to assist others. Additionally, a "Kudos" would be appreciated if you found my response helpful.
Thank you
Hi @Srisakthi ,
You can create and manage Key Vault connections in the Data -> Connections tab.
Direct usage of those Key Vault connections in Lakehouse or Notebook environment is not natively exposed yet.
I suggest submitting your detailed feedback and ideas through Microsoft's official feedback channels, such as Microsoft Fabric Ideas. Feedback submitted through these channels is frequently reviewed by the product teams and can contribute to meaningful improvements.
Fabric Ideas - Microsoft Fabric Community
If this post helps, then please consider Accepting as solution to help the other members find it more quickly, don't forget to give a "Kudos" – I’d truly appreciate it!
Thank you
HI @Srisakthi ,
Could you please confirm if you've submitted this as an idea in the Ideas Forum? If so, sharing the link here would be helpful for other community members who may have similar feedback.
If we don’t hear back, we’ll go ahead and close this thread. For any further discussions or questions, please start a new thread in the Microsoft Fabric Community Forum we’ll be happy to assist.
Thank you for being part of the Microsoft Fabric Community.
Hi @v-dineshya ,
I have submitted the idea. Please check
MS Fabric Connections in Notebook - Microsoft Fabric Community
Thanks,
Srisakthi
Hi @Srisakthi,
1. I don't see why at least Service Principal connection won't be added in the Future. As for "Workspace Identity", it could be weird to be able to do it as the connections are usable in your entire Fabric tenant.
2. The documentation state for Key Vault reference are only usable for connection. Before this feature, you could already connect to Azure Key Vault in Notebook. Here is a end to end tutorial to do it
Regards,
Yohann
Hi @Srisakthi ,
Azure Key Vault integration in Fabric is a powerful feature, and it's good to see more users exploring secure credential management. Let me address both of your points:
As of now, Azure Key Vault connections in Fabric support OAuth 2.0 with user identity, but Service Principal and Workspace Managed Identity are not yet generally available for this use case.
However, based on recent roadmap updates and community discussions, support for Service Principal authentication is planned for future releases. This will be especially useful for automated workloads and CI/CD pipelines where user-based OAuth is not ideal.
In the meantime, if you need to automate access securely:
Currently, there is no direct built-in method to reference a Fabric Key Vault connection inside a notebook. However, you can access secrets from Azure Key Vault using Python with the azure-identity and azure-keyvault-secrets libraries.
Here’s a sample code snippet:
from azure.identity import DefaultAzureCredential
from azure.keyvault.secrets import SecretClient
# Replace with your Key Vault URL
key_vault_url = "https://<your-keyvault-name>.vault.azure.net/"
# Authenticate using DefaultAzureCredential (supports Managed Identity, CLI login, etc.)
credential = DefaultAzureCredential()
client = SecretClient(vault_url=key_vault_url, credential=credential)
# Retrieve a secret
secret_name = "my-secret"
retrieved_secret = client.get_secret(secret_name)
print("Secret Value:", retrieved_secret.value)🔐 Note: This requires that your Fabric workspace or user identity has access to the Key Vault via Azure RBAC or access policies.
Let me know if you’d like a full notebook example or help setting up the Key Vault permissions!
Hi @burakkaragoz ,
If Service Principal approach is in roadmap, then we are good.
Azure Managed Identity:
Using Azure Managed Identity and ADF is not straight forward one.
Python:
This is not utilising Fabric Notebook.
Here is the notebook approach if you want to utilise for
Notebook:
Hi @Srisakthi ,
Yep, you can totally use Azure Key Vault secrets inside a Fabric Notebook. Here’s a quick way to do it using mssparkutils:
# Replace with your actual Key Vault URL and secret name
secret_value = mssparkutils.credentials.getSecret(
'https://<your-keyvault-name>.vault.azure.net/',
'your-secret-name'
)
print(secret_value)This works as long as your workspace has access to the Key Vault and the connection is already set up in Fabric. No need to manually handle tokens or credentials—Fabric handles that behind the scenes.
Hi @burakkaragoz , no above solution not works if workspace has access to key vault , rather user session authentication is used here