{"id":6651,"date":"2019-10-21T09:39:16","date_gmt":"2019-10-21T16:39:16","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-apps\/azure-active-directory-authentication-in-the-sql-server-connector\/"},"modified":"2025-06-11T08:01:39","modified_gmt":"2025-06-11T15:01:39","slug":"azure-active-directory-authentication-in-the-sql-server-connector-2","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-apps\/azure-active-directory-authentication-in-the-sql-server-connector-2\/","title":{"rendered":"Azure Active Directory authentication in the SQL Server connector"},"content":{"rendered":"<p>We recently added support for Active Directory authentication in the SQL Server connector. This has been one of the most requested feedback from our customers. In fact, few customers already noticed this rollout and have started using it. In this post, I want to give an overview of how you can use this feature, and some of the underlying design changes we had to bring about in the platform.<\/p>\n<p>Using <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sql-database\/sql-database-aad-authentication\">Azure AD authentication for Azure SQL Database<\/a> provides a lot of benefits when it comes to managing the security of your data. In the context of PowerApps and Flow, this feature will enable each user to connect to the underlying databases with their own credentials. The SQL Server connection using Azure AD authentication will not be shared when an app is shared.\u00a0 This is similar to how authentication works for Office 365 Outlook, SharePoint and other Azure AD based services.<\/p>\n<h2>Using the feature in Microsoft Flow<\/h2>\n<p>In Microsoft Flow, this feature is available when you create a new SQL Server connection. When you create a new connection, you will be asked to choose an Authentication Type. Apart from SQL Server Authentication and Windows Authentication, you can now select \u201cAzure AD Integrated (Preview)\u201d authentication. Once you select that, you can sign in with you Azure AD account to create a connection. If you select any of the other authentication types, you will need to provide appropriate details.<br \/>\n<img loading=\"lazy\" decoding=\"async\" alt=\"Creating a SQL Server connection in Flow\" class=\"alignnone wp-image-6657 size-large\" height=\"188\" src=\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png\" width=\"525\"\/><\/p>\n<p>After you select a connection, you need to specify the server and database as part of the action or trigger you are using. This allows you to use a single connection \u2013 associated with your Azure AD credentials \u2013 across multiple SQL Servers and databases. Note that we provide a dynamic drop-down for the Database parameter once you provide a valid SQL server. Once you provide the server and database, you can proceed to provide the rest of the parameters required for your operation.<\/p>\n<p>TIP: If your credentials do not have access to list the database, you can select \u201cEnter custom value\u201d and type in the database name.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"SQL connector in Flow - Database dropdown\" class=\"alignnone wp-image-6658 size-large\" height=\"294\" src=\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-2-1024x574.png\" width=\"525\"\/><\/p>\n<h2>Using the feature in Microsoft PowerApps<\/h2>\n<p>In PowerApps, this feature is not enabled by default, but is made available as a preview feature. To enable this feature, open (or create) your app in the studio. Then, navigate to File &gt; App settings &gt; Advanced settings &gt; Preview features. There, make sure you turn on the \u201cEnable enhanced Microsoft SQL Server connector\u201d feature. You need to do this for every app.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"PowerApps settings\" class=\"alignnone wp-image-6654 size-large\" height=\"278\" src=\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-aad-powerapps-settings-1024x543.png\" width=\"525\"\/><\/p>\n<p>Once you enable this feature, add a new SQL Server data source in your app. You may need to create a new connection (if you haven\u2019t already). As part of the connection creation, you will now be prompted to select the authentication type. Select \u201cAzure AD Integrated (Preview)\u201d option from the drop-down. Click on \u201cCreate\u201d to create a connection \u2013 you may need to sign in to Azure AD when you do that. Once the connection is created, you can specify the SQL server and database names and connect to it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Connecting to SQL Server with Azure AD auth from PowerApps\" class=\"alignnone size-large wp-image-6653\" height=\"275\" src=\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-aad-powerapps-connection-1024x536.png\" width=\"525\"\/><\/p>\n<p>Once connected, you will be able to select the tables and views you want to add in your app from a list. This experience and the rest remain the same as before.<\/p>\n<p>Once you build the app, you can share the app. When you use Azure AD authentication with SQL Server, the connection will not be shared with the shared users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Sharing an app\" class=\"alignnone wp-image-6655 size-large\" height=\"94\" src=\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-aad-powerapps-sharing-1-1024x183.png\" width=\"525\"\/><br \/>\nThe user to who you have shared the app with, will need to login with their own credentials.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Launching an app\" class=\"alignnone size-large wp-image-6656\" height=\"480\" src=\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-aad-powerapps-sharing-2-1024x936.png\" width=\"525\"\/><\/p>\n<h2>Upcoming changes<\/h2>\n<p>This feature is in Preview now. As we see usage of this feature, we will make it production ready. Right now, there are a few areas we are still working on:<\/p>\n<ul>\n<li>\u201cApp from data\u201d experience in PowerApps<\/li>\n<li>\u201cTransform data using Power Query\u201d experience in Microsoft Flow<\/li>\n<\/ul>\n<p>If you use this feature, please do share your feedback. You can use our product forums or shoot us an email directly.<\/p>\n<h2>A little background and changes to the platform<\/h2>\n<p>For those of you who want a little more detail, I can share some of the design changes we introduced to support this feature. We started working on this feature several months back \u2013 and it has taken us quite some time to roll out this feature.<\/p>\n<p>In PowerApps and Flow, you create a connection in order to use any connector from an app or a flow. A connection typically contains credentials and is defined by the connector. For the SQL Server connector, the connection parameters included the server name, the database, username and password (amongst others). It nicely abstracts all the details you would typically need to connect to a SQL database.\u00a0 We could implement \u2018test connection\u2019 functionality so that we can tell you immediately if you didn\u2019t provide the right connection parameters. When an app is shared with other users, the associated connection is also shared. That way, the end users do not have to know the connection details.<\/p>\n<p>When we started looking into supporting Azure AD for SQL connector, we needed to ensure a few things \u2013<\/p>\n<ul>\n<li>Existing scenarios that uses SQL Authentication should continue to work<\/li>\n<li>Every user of an app should be able to connect to the underlying database with their own credentials<\/li>\n<\/ul>\n<p>This presented a couple of challenges for us.\u00a0 We need to decide based on the \u201cauthentication\u201d type, how the connection creation behavior should behave. For example, for an Azure AD authentication, we need to kick off an OAUTH authentication flow where the user will sign-in to Azure AD.\u00a0 Also, based on the \u201cauthentication\u201d type of the connection, we now need to change the connection sharing behavior. So far, the behavior is dependent on the connector \u2013 each connector can tell whether a connection can be shared or now.\u00a0 Third, we want a design that scales. We have hundreds of connectors, and therefore, we need to come up with constructs that work across connectors. Particularly, we know that we want to support different authentication models in a single connector. For example, we want to add support for SQL connection strings, authentication using a service principal, etc. And finally, we need a mechanism to ensure that the server and database details come the app itself \u2013 since an app will be used by different user\u2019s connection. We cannot expect the end users to know the underlying server\/database details used by an app.<\/p>\n<p>To accommodate these challenges, we introduced a few things onto the platform\u2014<\/p>\n<ul>\n<li><strong>Concept of a connection parameter set<\/strong> \u2013 which is used to model authentication types, and<\/li>\n<li><strong>Protocol changes to handle server and database from an app<\/strong><\/li>\n<\/ul>\n<p>Each connector can now advertise multiple connection parameter sets \u2013 for instance, for different authentication types. This solves the main challenge of providing independent authentication type that may have different behavioral requirements \u2013 whether in connection creation, or in app sharing scenarios. This also allows us to add more authentication types in future without having to worry about impacting the connection creation experience for other authentication types. And because this is such a fundamental change, we need to update multiple components in our architectural stack \u2013 from our connector resource model, to the connection management resource providers, to the various end user experiences we have today in the portal and mobile.<\/p>\n<p>All tabular data sources in PowerApps, like the SQL Server connector, implements a modification of the ODATA protocol. When a tabular data source is added to an app, the app simply asks for a list of available tables (or entities). This used to work because the connection contained everything that we needed to connect to the underlying data source \u2013 the server, database and user credentials. Now that each user brings their own credential, the server and database information need to come from the app. This necessitate the need to introduce additional operational parameters for the server and database. And we had to do this in a way so that existing apps and connections continue to work.<\/p>\n<h3>Other changes in the SQL Server connector<\/h3>\n<p>Along with the above platform changes, we also updated the SQL server connector as well. We introduced a major version of our underlying API, while still ensuring that the old API endpoints continue to work. The new updated API for the SQL Server connector also provides one additional major change \u2013 <strong>better support for SQL datetime, datetime2 and smalldatetime types<\/strong>. Unfortunately for us, while ODATA 2.0 have support for these types with Edm.DateTime, it has been deprecated in ODATA 4.0. Basically, a datetime requires a timezone specifier as well \u2013 that way, every system knows the exact moment. This makes a lot of sense for anyone building an API surface. For our connector though, we do not control the data sources. There are too many SQL databases that uses these SQL datetime types. We used to map these SQL types to ODATA Edm.DateTimeOffset and using a JSON string as defined in RFC 3339 and in ISO 8601. This led to user confusion and errors because of timezone differences between the client, the data source and the normalization done by the platform in between. To solve this, we introduced a custom data type identifier in our platform which allows us to normalize the data as strings in appropriate format. We consider this a \u2018breaking\u2019 change \u2013 something that necessitate us to introduce a major API version. In future, we will be adding delegation support for these types as well.<\/p>\n<p>We hope these updates address a long standing ask from our customers. Please feel free to reach out in our product forums for any feedback.<\/p>\n<p>\u00a0<\/p>\n<p>Thanks!<br \/>\nSameer<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We recently added support for Active Directory authentication in the SQL Server connector. This has been one of the most requested feedback from our customers.  In this post, I want to give an overview of how you can use this feature, and some of the underlying design changes we had to bring about in the platform.<\/p>\n","protected":false},"author":149,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"audience":[3378],"content-type":[],"job-role":[],"product":[3473],"property":[],"topic":[3421],"coauthors":[2114],"class_list":["post-6651","post","type-post","status-publish","format-standard","hentry","audience-it-professional","product-power-apps","topic-application-modernization"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azure Active Directory authentication in the SQL Server connector - Microsoft Power Platform Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure Active Directory authentication in the SQL Server connector - Microsoft Power Platform Blog\" \/>\n<meta property=\"og:description\" content=\"We recently added support for Active Directory authentication in the SQL Server connector. This has been one of the most requested feedback from our customers. In this post, I want to give an overview of how you can use this feature, and some of the underlying design changes we had to bring about in the platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-apps\/azure-active-directory-authentication-in-the-sql-server-connector-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Power Platform Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-21T16:39:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T15:01:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1215\" \/>\n\t<meta property=\"og:image:height\" content=\"436\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sameer Chabungbam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sameer Chabungbam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/sameer-chabungbam\/\",\"@type\":\"Person\",\"@name\":\"Sameer Chabungbam\"}],\"headline\":\"Azure Active Directory authentication in the SQL Server connector\",\"datePublished\":\"2019-10-21T16:39:16+00:00\",\"dateModified\":\"2025-06-11T15:01:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/\"},\"wordCount\":1592,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png\",\"keywords\":[\"Connectors\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/\",\"name\":\"Azure Active Directory authentication in the SQL Server connector - Microsoft Power Platform Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png\",\"datePublished\":\"2019-10-21T16:39:16+00:00\",\"dateModified\":\"2025-06-11T15:01:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage\",\"url\":\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png\",\"contentUrl\":\"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Active Directory authentication in the SQL Server connector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/\",\"name\":\"Microsoft Power Platform Blog\",\"description\":\"Innovate with Business Apps\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization\",\"name\":\"Microsoft Power Platform Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png\",\"width\":194,\"height\":145,\"caption\":\"Microsoft Power Platform Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/person\/7e65be8afd5ab2e917ffb00bf86fa851\",\"name\":\"Sameer Chabungbam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/82b849554b986091c24672ac9e11a25786b4906721bd255d71c66ca68fdd5dfd?s=96&d=mm&r=g8b3ea029f47fbfb348e520d00a165495\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82b849554b986091c24672ac9e11a25786b4906721bd255d71c66ca68fdd5dfd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82b849554b986091c24672ac9e11a25786b4906721bd255d71c66ca68fdd5dfd?s=96&d=mm&r=g\",\"caption\":\"Sameer Chabungbam\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/sameerch\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure Active Directory authentication in the SQL Server connector - Microsoft Power Platform Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/","og_locale":"en_US","og_type":"article","og_title":"Azure Active Directory authentication in the SQL Server connector - Microsoft Power Platform Blog","og_description":"We recently added support for Active Directory authentication in the SQL Server connector. This has been one of the most requested feedback from our customers. In this post, I want to give an overview of how you can use this feature, and some of the underlying design changes we had to bring about in the platform.","og_url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-apps\/azure-active-directory-authentication-in-the-sql-server-connector-2\/","og_site_name":"Microsoft Power Platform Blog","article_published_time":"2019-10-21T16:39:16+00:00","article_modified_time":"2025-06-11T15:01:39+00:00","og_image":[{"width":1215,"height":436,"url":"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png","type":"image\/png"}],"author":"Sameer Chabungbam","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sameer Chabungbam","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/sameer-chabungbam\/","@type":"Person","@name":"Sameer Chabungbam"}],"headline":"Azure Active Directory authentication in the SQL Server connector","datePublished":"2019-10-21T16:39:16+00:00","dateModified":"2025-06-11T15:01:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/"},"wordCount":1592,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage"},"thumbnailUrl":"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png","keywords":["Connectors"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/","name":"Azure Active Directory authentication in the SQL Server connector - Microsoft Power Platform Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage"},"thumbnailUrl":"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png","datePublished":"2019-10-21T16:39:16+00:00","dateModified":"2025-06-11T15:01:39+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#primaryimage","url":"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png","contentUrl":"https:\/\/powerappsblogmedia.azureedge.net\/powerappsblog\/2019\/10\/sql-add-flow-1-1024x367.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/2019\/10\/21\/azure-active-directory-authentication-in-the-sql-server-connector-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Active Directory authentication in the SQL Server connector"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/","name":"Microsoft Power Platform Blog","description":"Innovate with Business Apps","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#organization","name":"Microsoft Power Platform Blog","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","width":194,"height":145,"caption":"Microsoft Power Platform Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/#\/schema\/person\/7e65be8afd5ab2e917ffb00bf86fa851","name":"Sameer Chabungbam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82b849554b986091c24672ac9e11a25786b4906721bd255d71c66ca68fdd5dfd?s=96&d=mm&r=g8b3ea029f47fbfb348e520d00a165495","url":"https:\/\/secure.gravatar.com\/avatar\/82b849554b986091c24672ac9e11a25786b4906721bd255d71c66ca68fdd5dfd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82b849554b986091c24672ac9e11a25786b4906721bd255d71c66ca68fdd5dfd?s=96&d=mm&r=g","caption":"Sameer Chabungbam"},"url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/sameerch\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Power Platform Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/6651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/users\/149"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/comments?post=6651"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/6651\/revisions"}],"predecessor-version":[{"id":130755,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/6651\/revisions\/130755"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/media?parent=6651"}],"wp:term":[{"taxonomy":"audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/audience?post=6651"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/content-type?post=6651"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/job-role?post=6651"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/product?post=6651"},{"taxonomy":"property","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/property?post=6651"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/topic?post=6651"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/coauthors?post=6651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}