Skip to content

Commit f1ec29b

Browse files
authored
Merge pull request #8347 from MicrosoftDocs/20230615-fix-for-preview-state-of-implicit-connections
update to move to full preview
2 parents 9a5c307 + 2581266 commit f1ec29b

File tree

1 file changed

+7
-16
lines changed

1 file changed

+7
-16
lines changed

powerapps-docs/maker/canvas-apps/connections-list.md

Lines changed: 7 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -110,29 +110,20 @@ This type of connection isn't secure because it doesn't rely on end-user authent
110110

111111
In SQL Server, this type of connection is called **SQL Server Authentication**. Many other database data sources provide a similar capability. When you publish your application, your users don't need to supply a unique user name and password. They're using the user name and password you supply when you author the application. The connection authentication to the data source is **Implicitly Shared** with your users. Once the application is published, the connection is also published and available to your users. Your end users can also create applications using any connection using SQL Server authentication that is shared with them. Your users can't see the user name or password, but the connection will be available to them. **There are valid scenarios for this type of connection. For instance if you have a read-only database that is available to everyone in the company. Reference data scenarios (for example, a corporate calendar) can be useful for this kind of connection.** More information: [Use Microsoft SQL Server securely with Power Apps](connections/sql-server-security.md)
112112

113-
### Secure Implicit Connections (experimental)
114-
Power Apps now has support for **[Secure implicit connections (experimental)](working-with-experimental-preview.md)**. The secure implicit shared connections are more secure than the existing implicit connections. Power Apps implicitly shared connections are ones that use a fixed credential such as a SQL Server connection string rather than the end user's specific credentials such as AAD. With this feature, connections are no longer directly shared with the users of Power Apps. Instead, a proxy connection object that only grants access to the underlying resource such as a specific SQL server table is shared. End user authors can't create new applications with either the connection or the proxy connection. This feature also limits the end user to such actions as **get**, **put/patch**, and **delete** that are defined in the corresponding app. The result is that end users who are also authors can't create new applications with either the connection or the proxy connection object.
113+
### Secure Implicit Connections (preview)
115114

116-
While in preview, an app author must opt-in to use this feature. Eventually, this feature will be on for all apps. With the experimental preview switch turned on for a given Power Apps app, all implicit connections in the app will automatically use this feature.
115+
[This section is prerelease documentation and is subject to change.]
117116

118-
#### Enable secure implicit connections for new app
117+
Power Apps now has full preview support for **[Secure implicit connections)](working-with-experimental-preview.md)**. The default setting for this feature is **On**. The secure implicit shared connections are more secure than the existing implicit connections. Power Apps implicitly shared connections are ones that use a fixed credential such as a SQL Server connection string rather than the end user's specific credentials such as AAD. With this feature, connections are no longer directly shared with the users of Power Apps. Instead, a proxy connection object that only grants access to the underlying resource such as a specific SQL server table is shared. End user authors can't create new applications with either the connection or the proxy connection. This feature also limits the end user to such actions as **get**, **put/patch**, and **delete** that are defined in the corresponding app. The result is that end users who are also authors can't create new applications with either the connection or the proxy connection object.
119118

120-
Sign in to [Power Apps](https://make.powerapps.com) and create a new app that uses an implicitly shared connection:
121-
122-
1. In Power Apps Studio, on the command bar, select **Settings** > **Upcoming features**.
123-
2. Select the **Experimental** tab.
124-
3. Set the toggle for **Secure implicit connections** to **On**
125-
> [!div class="mx-imgBorder"]
126-
> ![Secure implicit connections.](./media/connections-list/secure_implicit_connection_option.png)
127-
3. When you're done, publish the app.
128-
129-
To share with different users, see [Sharing](connections-list.md#sharing).
119+
> [!NOTE]
120+
> **Secure implicit connections** to **On** by default for new apps.
130121
131122
#### Enable secure implicit connections for an existing app
132123

133124
Open an existing [app open for editing](../../edit-app.md) with implicitly shared connections that has previously been published:
134125
1. On the command bar, select **Settings** > **Upcoming features**.
135-
2. From the **Experimental** tab, set the toggle for **Secure implicit connections** to **On**.
126+
2. From the **Preview** tab, set the toggle for **Secure implicit connections** to **On**.
136127
3. Save and publish the app.
137128

138129
#### Sharing
@@ -157,7 +148,7 @@ When your app is republished and shared, then end-users won't have access to the
157148

158149
#### Limitations
159150

160-
1. All types of implicitly shared connection work such as action and tabular.
151+
1. All types of implicitly shared connections work such as action and tabular.
161152
2. Server and database names are hidden in network traces but visible in the consent dialog. Column names are not hidden.
162153
3. For tabular connectors, we only limit CRUD actions such as Get, Post, Put, or Delete. If you have permissions to **Put** then you have access to **Post**.
163154
4. Action based connectors limit based on the specific API being used in the application.

0 commit comments

Comments
 (0)