Fabric Warehouse
Last updated
Last updated
SQL Tran can use Managed Identity and Service Principal to connect to Fabric Warehouse.
Make sure you use regular Fabric workspace and not personal workspace! You can tell by the icon:
If all you have is "My workspace", you will need to create a new workspace.
Here is how to set up Service Principal connection:
Create new enterprise application in Azure portal
You may need to be given additional permissions, such as Application Administrator
Pick the "Register an application to integrate with Microsoft Entra ID (App you're developing)" type
Note its name, application id and object id
Go to App registrations, find your application in All applications, enter
Go to "Certificates & secrets", create a certificate, save it
Go to Fabric workspace, in the upper-right corner click Gears icon for settings
Go to Admin portal
In the Tenant settings, find Developer settings
Enable the option "Service principals can use Fabric APIs"
Go to Fabric workspace, in the upper-right corner click Manage access
+ Add people or groups
Type your app name and wait for the dropdown to display it - check that id matches
Change the access type from Viewer to Contributor
Click Add
Go to your Fabric Warehouse, click ellipsis, Manage permissions. It must list your app as "Workspace Contributor"
Again, click ellipsis, Copy SQL Connection String
Go to SQL Tran, create a new project for Fabric Warehouse
Click the hamburger menu in the lower-left corner, click Project settings
Navigate to Database connections
Select Target staging
Paste the Fabric Warehouse connection string into the Server field
For authentication, select Microsoft Entra Service principal, then paste application id into Client ID field, and certificate as Secret
Copy the exact Fabric Warehouse name into Database field
Click "Test connection"
Microsoft Entra Managed Identity is the recommended authentication method for databases hosted in the same Azure tenant as the SQL Tran deployment.
Microsoft Entra Service Principal can be used as an authentication method for databases hosted in the same Azure tenant as the SQL Tran deployment and/or different Azure tenants. The downside of using the Microsoft Entra Service Principal approach is the secret which needs to be manually recreated and pasted into SQL Tran upon expiration of its validity which can be set to up to 2 years.