Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 5 additions & 1 deletion docs/data-factory/azure-key-vault-reference-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,11 @@ ms.custom: configuration
When you configure an Azure Key Vault reference in Fabric, you're creating a secure pointer to your secret rather than storing the secret itself. Here's how the process works:

**Initial Setup:**
Fabric records only the vault URI, secret name from your Key Vault and user auth / OAuth2.0 credential for connecting to the Azure Key Vault (AKV). You must grant your the user identity **Get** and **List** permissions in the specified AKV. Importantly, the actual secret values are never stored within Fabric.
Fabric only stores the **Key Vault URI** and **secret name**, along with the user’s authentication context (OAuth 2.0 credentials) for connecting to Azure Key Vault (AKV).
When using **access policy–based authorization**, you must grant the user’s identity the **Get** and **List** permissions on **secrets** in the specified Key Vault.
Copy link

Copilot AI Sep 25, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[nitpick] There's an inconsistency in punctuation usage. Line 24 uses an en dash (–) in 'access policy–based authorization' while standard technical writing typically uses hyphens for compound modifiers. Consider changing to 'access policy-based authorization' for consistency.

Suggested change
When using **access policybased authorization**, you must grant the user’s identity the **Get** and **List** permissions on **secrets** in the specified Key Vault.
When using **access policy-based authorization**, you must grant the user’s identity the **Get** and **List** permissions on **secrets** in the specified Key Vault.

Copilot uses AI. Check for mistakes.
Alternatively, if you are using **Azure RBAC**, you can assign the **Key Vault Secrets User** role, which provides equivalent permissions.
Importantly, Fabric never stores or caches the actual secret values — they are always retrieved directly from AKV at runtime.


**Runtime Secret Retrieval:**
When Fabric needs to establish a data connection, it dynamically retrieves the secret from your Key Vault using the stored reference. The secret is used immediately to authenticate the connection and is held in memory only for the duration needed to establish that connection.
Expand Down