Power apps connection to Azure SQL server with Microsoft Entra ID

Jani Hämäläinen 80 Reputation points
2024-08-13T11:22:26.0033333+00:00

I am creating virtual table to powerapps using Azure sql server data. I dont want to allow access to server from all ip addresses and instead only want to allow access using Microsoft Entra ID Integrated authentication. My tenant is the admin of my 'Sqlserver' and i can connect to it with SSMS using Active Directory. But when i have created SQL Server connection in Power apps with Microsoft Entra ID Integrated as authentication type i get error: "Server doesn't exist". When tested with allowing all ip addresses it connected to server and databases. I have used successfully similar solution to dedicated pool. What is going wrong with my connection or does Azure Sql server not support Power apps SQL server connection with Microsoft Entra ID Integrated authentication. I have also tried methods from

https://learn.microsoft.com/en-us/connectors/sql/ without success.

Azure SQL Database
{count} votes

1 answer

Sort by: Most helpful
  1. Oury Ba-MSFT 19,336 Reputation points Microsoft Employee
    2024-08-14T17:38:12.3633333+00:00

    @Jani Hämäläinen Thank you for reaching out.

    Azure SQL Server does support Power Apps SQL Server connections using Microsoft Entra ID Integrated authentication. The SQL Server connector IN Microsoft Power app allows you to use Microsoft Entra Integrated, SQL Server Authentication, and Windows Authentication.

    You mentioned when i have created SQL Server connection in Power apps with Microsoft Entra ID Integrated as authentication type i get error: "Server doesn't exist". When tested with allowing all ip addresses it connected to server and databases.

    Since the connection works when all IP addresses are allowed, ensure that the IP address of the Power Apps service is included in the allowed IP addresses for your Azure SQL Server.

    The default for the Public network access setting is Disable. Customers can choose to connect to a database by using either public endpoints (with IP-based server-level firewall rules or with virtual-network firewall rules), or private endpoints (by using Azure Private Link), as outlined in the network access overview.

    When Public network access is set to Disable, only connections from private endpoints are allowed. All connections from public endpoints will be denied.

    https://learn.microsoft.com/en-us/azure/azure-sql/database/connectivity-settings?view=azuresql&tabs=azure-portal#deny-public-network-access

    https://learn.microsoft.com/en-us/power-apps/maker/canvas-apps/connections/sql-server-security

    I would suggest to also post your queries in the Microsoft Power App community to get more insights from other experts. https://community.powerplatform.com/

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.