Azure Table Storage isn’t listed among the connectors and services that support Azure subnet delegation for Power Platform Virtual Network support, so it isn’t supported directly in a VNet-integrated Power Platform environment.
When Virtual Network support is enabled for an environment, all supported services (Dataverse plug-ins and the listed connectors) run inside the delegated subnet and must comply with the network policies there. Calls to public endpoints that aren’t reachable via private connectivity will fail unless explicitly allowed by the network configuration.
Given the current supported list (SQL Server, Azure SQL Data Warehouse, Azure Queues, Azure Blob/File Storage, Azure Key Vault, HTTP with Microsoft Entra ID, Snowflake, Databricks, AI search, and custom connectors), the viable pattern for Azure Table Storage is to introduce an intermediate service that is supported in the VNet and have that service access Table Storage on behalf of Power Platform. Typical options based on the documented patterns are:
- Dataverse plug-in in the VNet
- Implement a Dataverse plug-in that runs in the VNet-enabled environment.
- The plug-in connects to a service inside the same VNet (for example, a Web API or Azure Function) using private endpoints, as described for API workloads.
- That Web API/Azure Function then accesses Azure Table Storage (over private endpoint or allowed outbound rules) and returns the data to the plug-in.
- Custom connector fronting a VNet-hosted API
- Host a Web API in the VNet (or behind private endpoints) that exposes the required operations over HTTP.
- Use a custom connector (which is supported with VNet integration) to call this API from Power Apps/Power Automate.
- The API performs all interaction with Azure Table Storage.
- HTTP with Microsoft Entra ID (preauthorized)
- If the intermediary API is protected by Microsoft Entra ID and reachable privately, use the HTTP with Microsoft Entra ID (preauthorized) connector (supported with VNet) to call it.
- The API then reads/writes Azure Table Storage.
In all cases, the documented considerations apply:
- Review apps, flows, and plug-in code so that, once VNet support is enabled, they no longer rely on direct calls to public endpoints that are blocked by the VNet.
- Ensure any services used as intermediaries are reachable via private endpoints or otherwise allowed by the delegated subnet’s network policies.
There is no direct, VNet-supported Azure Table Storage connector listed; the supported architecture is to use Dataverse plug-ins, custom connectors, or HTTP with Microsoft Entra ID to reach an API inside the VNet, and let that API handle Table Storage access.
References: