You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: powerapps-docs/maker/canvas-apps/connections-list.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,7 @@ contributors:
15
15
- lancedMicrosoft
16
16
- mduelae
17
17
- alaug
18
+
- ProfessorKendrick
18
19
---
19
20
# Overview of connectors for canvas apps
20
21
@@ -24,7 +25,7 @@ A connector may provide **tables** of data or **actions**. Some connectors provi
24
25
25
26
## Tables
26
27
27
-
If your connector provides tables, you add your data source and then select the table in the data source that you want to manage. Power Apps both retrieves table data into your app and updates data in your data source automatically for you. For example, you can add a data source that contains a table named **Lessons** and then set the **Items** property of a control, such as a gallery or a form, to this value in the formula bar:
28
+
If your connector provides tables, you add your data source, and then select the table in the data source that you want to manage. Power Apps both retrieve table data into your app and updates data in your data source automatically for you. For example, you can add a data source that contains a table named **Lessons** and then set the **Items** property of a control, such as a gallery or a form, to this value in the formula bar:
28
29
29
30

30
31
@@ -55,7 +56,7 @@ If you need to handle custom data updates for action connectors, build a formula
55
56
56
57
For more information about how to customize your formula for custom updates, see these articles:
> To work with dynamic schema, you can use an **experimental** feature called **Dynamic schema**. Dynamic schema refers to the possibility that the same action may return a different table with different columns. Conditions that may cause the columns in the tables to differ include the action input parameters, the user or role that's executing the action, and the group in which the user is working, among others. For example, SQL Server stored procedures may return different columns if run with different inputs, or an Azure DevOps instance may use custom fields that aren't available by default. For working with dynamic schema, the [connector documentation](/connectors) shows **The outputs of this operation are dynamic.** as the return value.
@@ -106,7 +107,7 @@ This type of connection is also secure. For example Twitter uses this type of a
106
107
107
108
### SQL User name and password authentication
108
109
109
-
This type of connection isn't secure because it doesn't rely on end-user authentication. **It should only be used in cases where you can safely assume that everyone who has access to this connection can see and use all of the data to which the connection provides access.** You can't reliably lock down portions of the data accessible within the connection. For instance, if the connection allows access to a single table, you can't rely on a userID to filter and only show data for that specific user within that table. For a reliable security, use more secure connection such as [Azure AD Integrated](connections-list.md#azure-active-directory-aad).
110
+
This type of connection isn't secure because it doesn't rely on end-user authentication. **It should only be used in cases where you can safely assume that everyone who has access to this connection can see and use all of the data to which the connection provides access.** You can't reliably lock down portions of the data accessible within the connection. For instance, if the connection allows access to a single table, you can't rely on a userID to filter and only show data for that specific user within that table. For reliable security, use a more secure connection such as [Azure AD Integrated](connections-list.md#azure-active-directory-aad).
110
111
111
112
In SQL Server, this type of connection is called **SQL Server Authentication**. Many other database data sources provide a similar capability. When you publish your application, your users don't need to supply a unique user name and password. They're using the user name and password you supply when you author the application. The connection authentication to the data source is **Implicitly Shared** with your users. Once the application is published, the connection is also published and available to your users. Your end users can also create applications using any connection using SQL Server authentication that is shared with them. Your users can't see the user name or password, but the connection will be available to them. **There are valid scenarios for this type of connection. For instance if you have a read-only database that is available to everyone in the company. Reference data scenarios (for example, a corporate calendar) can be useful for this kind of connection.** More information: [Use Microsoft SQL Server securely with Power Apps](connections/sql-server-security.md)
112
113
@@ -120,12 +121,12 @@ Power Apps now has full preview support for **[Secure implicit connections](work
120
121
> **Secure implicit connections** is now **On** by default for new apps.
121
122
122
123
#### Notification to update your apps
123
-
If you have applications that may be upgraded to use this feature then you will see a message on the Apps page. It will indicate the number of apps that need your attention.
124
+
If you have applications that may be upgraded to use this feature then you'll see a message on the Apps page. It indicates the number of apps that need your attention.
124
125
125
126
> [!div class="mx-imgBorder"]
126
127
> 
127
128
128
-
Select the link and it will open a side panel that will list all of the apps that need attention.
129
+
Select the link and it opens a side panel that will list all of the apps that need attention.
@@ -162,8 +163,8 @@ When your app is republished and shared, then end-users won't have access to the
162
163
#### Limitations
163
164
164
165
1. All types of implicitly shared connections work such as action and tabular.
165
-
2. Server and database names are hidden in network traces but visible in the consent dialog. Column names are not hidden.
166
-
3. For tabular connectors, we only limit CRUD actions such as Get, Post, Put, or Delete. If you have permissions to **Put** then you have access to **Post**.
166
+
2. Server and database names are hidden in network traces but visible in the consent dialog. Column names aren't hidden.
167
+
3. For tabular connectors, we only limit CRUD actions such as Get, Post, Put, or Delete. If you have permissions to **Put**, then you have access to **Post**.
167
168
4. Action based connectors limit based on the specific API being used in the application.
168
169
5. Warnings are still enabled in sharing. The warning around implicitly shared connections still warns while in private preview. However, your connection with this feature is secure – despite the warning.
169
170
6. Publishing to an entire tenant, as opposed to specific groups or individuals isn't supported.
@@ -174,21 +175,21 @@ This type of connection isn't secure because it doesn't rely on end-user authent
174
175
175
176
## Data sources in solutions
176
177
177
-
Solutions are used for [application lifecycle management](/power-platform/alm/overview-alm) and provide additional capabilities for managing the lifecycle of **data sources**. If a canvas app is in a solution, [connection references](../data-platform/create-connection-reference.md) and [environment variables](../data-platform/environmentvariables.md) may be created to store information about the data sources. This ensures data sources can be changed or re-established when solutions are migrated to different environments.
178
+
Solutions are used for [application lifecycle management](/power-platform/alm/overview-alm) and provide other capabilities for managing the lifecycle of **data sources**. If a canvas app is in a solution, [connection references](../data-platform/create-connection-reference.md) and [environment variables](../data-platform/environmentvariables.md) may be created to store information about the data sources. This ensures data sources can be changed or re-established when solutions are migrated to different environments.
178
179
179
180
## Rename data sources in apps
180
181
181
182
To learn about renaming data sources in an app, and the difference between tabular and action-based data sources, go to [Rename Power Apps action-based data sources](rename-data-source.md).
182
183
183
184
## Connection consent dialog
184
185
185
-
When users open an app that uses connectors for the first time, they'll see a "connection consent" dialog for the following purposes.
186
+
When users open an app that uses connectors for the first time, they see a "connection consent" dialog for the following purposes.
186
187
187
188
1. To inform users about the data sources accessed by the app.
188
189
189
190
1. To outline the actions a connector may, or may not perform in an app. For example, for apps using the **Office 365 Users** connector, this could be the following.
190
191
191
-
- This app will be able to:
192
+
- This app is able to:
192
193
- Read your full user profile
193
194
- Read the full profile of all users
194
195
- It won't be able to:
@@ -198,7 +199,7 @@ When users open an app that uses connectors for the first time, they'll see a "c
198
199
199
200
1. To facilitate manual end-user authentication, when needed.
200
201
201
-
For some connections, Power Platform can automatically authenticate a user to access a data source. However, if the automatic sign-in fails, this dialog prompts users to fix a connection by manually signing in. Power Platform can only attempt automatic sign-in for a connection when a data source pre-authorizes Microsoft’s Azure API connections service principal, granting it permission to perform single sign-on for a user when a connection is created. For more information on single sign-on, see [What is single sign-on (SSO)?](/azure/active-directory/manage-apps/what-is-single-sign-on)
202
+
For some connections, Power Platform can automatically authenticate a user to access a data source. However, if the automatic sign-in fails, this dialog prompts users to fix a connection by manually signing in. Power Platform can only attempt automatic sign-in for a connection when a data source preauthorizes Microsoft’s Azure API connections service principal, granting it permission to perform single sign-on for a user when a connection is created. For more information on single sign-on, see [What is single sign-on (SSO)?](/azure/active-directory/manage-apps/what-is-single-sign-on)
202
203
203
204
The following image is an example of the connection consent dialog for an app connecting to a SharePoint site.
204
205
@@ -218,10 +219,10 @@ For select connectors, admins can suppress this dialog, and consent on behalf of
218
219
Microsoft Power Platform is only able to suppress the consent dialog for connections to data sources where:
219
220
220
221
1. There isn’t an obligation by the data source to show an explicit consent UI.
221
-
1. The data source pre-authorizes Microsoft’s Azure API connections service principal to enable single-sign-on.
222
+
1. The data source preauthorizes Microsoft’s Azure API connections service principal to enable single-sign-on.
222
223
1. An admin configures an app to suppress the consent for the preceding connections.
223
224
224
-
The pre-authorization of Microsoft’s Azure API connections service principal exists for Microsoft's first-party data sources, and may be configured by custom applications registered in an Azure AD tenant that are used by custom connectors. An admin manages consent suppression on a per-app basis (as opposed to connector basis), so suppression is managed at the most granular app experience level—this level of granularity prevents consent suppression for an organization’s "approved apps" from inadvertently suppressing consent for apps that aren't approved or reviewed.
225
+
The preauthorization of Microsoft’s Azure API connections service principal exists for Microsoft's first-party data sources, and may be configured by custom applications registered in an Azure AD tenant that are used by custom connectors. An admin manages consent suppression on a per-app basis (as opposed to connector basis), so suppression is managed at the most granular app experience level—this level of granularity prevents consent suppression for an organization’s "approved apps" from inadvertently suppressing consent for apps that aren't approved or reviewed.
0 commit comments