Microsoft Fabric Updates Blog

Securely Access VPC-Protected Amazon S3 Buckets in Microsoft Fabric with Entra Integration (Preview)

When we first introduced Amazon S3 shortcut integration with Microsoft Entra ID, customers gained a powerful new way to connect S3 data to Microsoft Fabric — without storing or rotating AWS access keys. Using OpenID Connect (OIDC), Fabric authenticates directly with AWS Identity and Access Management (IAM), enabling secure, identity-based access to cloud storage.

However, many enterprises keep their S3 buckets locked down inside Virtual Private Clouds (VPCs) or behind corporate firewalls. In these environments, Entra OIDC can authenticate identities, but it cannot provide network access — so Fabric still cannot reach the S3 endpoint. That changes today.

With support for the on-premises data gateway, Microsoft Fabric can now securely access S3 buckets that reside behind a VPC or firewall, bridging identity-based Entra OIDC authentication with the private network reach your environment requires.

Why This Integration Matters

Enterprises in regulated sectors often face a trade-off between security and agility. They need to keep data inside private clouds or corporate networks, but they also want to unlock the insights that Fabric’s unified analytics platform delivers.

This new capability removes that trade-off. By combining Microsoft Entra ID based OIDC authentication with the on-premises data gateway, Fabric can securely reach S3 buckets that live inside VPCs or behind corporate firewalls — without ever exposing data to the public internet. You maintain strict network boundaries while still enabling governed, analytics-driven experiences in Fabric.

Key Benefits

  • Private, Secure Access – Access S3 data privately without opening public endpoints or relaxing firewall rules.
  • Zero-Trust Identity Control – Maintain strong identity governance using Microsoft Entra ID and OIDC, eliminating reliance on long-lived AWS access keys.
  • Simplified Management – No secrets, no key rotation, and no IAM user lifecycle to manage.
  • Unified Governance and Auditing – Maintain full cross-cloud visibility as Fabric governs usage and AWS CloudTrail logs all S3 access and Microsoft Entra role assumptions.

Setting This Up

This capability builds on two existing flows:

  • Identity & OIDC setup using Microsoft Entra service principals for Amazon S3 shortcuts.
  • Private network connectivity to VPC-protected S3 buckets using the on-premises data gateway.

Below is the high-level sequence, with links to the detailed step-by-step guides.

Step 1: Configure Entra–AWS trust for S3 shortcuts

First, set up Microsoft Entra ID and AWS IAM so that Fabric can use a Microsoft Entra service principal with OIDC to assume an AWS role and access your S3 bucket.

  • Register a service principal in Microsoft Entra ID.
  • Configure an OIDC trust relationship between Entra and AWS IAM.
  • Create an IAM role and policy that grants the required S3 permissions.

To configure the identity trust between Entra and AWS, follow the steps outlined in the Access Amazon S3 Shortcuts Securely and Seamlessly with Microsoft Entra Service Principals (Preview) blog post.

Step 2: Enable private access to your VPC-protected S3 bucket

Next, make sure Fabric can reach your S3 bucket over a private network path via the on-premises data gateway.

  • Configure your VPC endpoint / network path to S3.
  • Install and configure the on-premises data gateway in your network.
  • Verify that the gateway can reach the S3 endpoint privately.

For a full walkthrough, refer to the Creating a shortcut to a VPC-protected Amazon S3 bucket blog post.

Step 3: Create the Fabric S3 shortcut using both identity and network paths

Finally, bring it all together in Fabric:

  • Create (or reuse) a Fabric connection that uses your Entra service principal–based integration.
  • When creating the Amazon S3 shortcut, select the connection and the on-premises data gateway.
  • Browse to the VPC-protected bucket or folder and complete the shortcut creation.

At this point, identity flows through Microsoft Entra and AWS IAM, network traffic flows through your private gateway, and Fabric can query S3 data securely without exposing it to the public internet.

Security Best Practices

  • Use a unique service principal per AWS IAM role for strong isolation and auditability.
  • Rotate service principal secrets regularly and store them securely.
  • Monitor AWS CloudTrail logs for STS activity and role assumptions.

Current Limitations

  • This Microsoft Entra integration currently supports only the service-principal based approach. OAuth and workspace identity support are not yet available.

Try it Today

If your organization is already using Microsoft Entra and S3, we encourage you to try it out and see how it can simplify your data access and governance. Setup is straightforward, and you’ll be able to take advantage of secure, efficient access to your data from day one. 

Get started now!

Bài đăng blog có liên quan

Securely Access VPC-Protected Amazon S3 Buckets in Microsoft Fabric with Entra Integration (Preview)

tháng 2 5, 2026 của Joanna Podgoetsky

If there’s one place where the entire Microsoft Fabric ecosystem shows up in full force, this is it. FabCon Atlanta is the largest gatherings of Fabric product managers, engineers, customers, decision‑makers, and hands‑on practitioners you’ll find all year! It’s the only place where you’ll get raw, unfiltered insight into how Fabric’s Data Warehouse is evolving, … Continue reading “This is your sign to attend FabCon Atlanta—Data Warehouse Edition”

tháng 1 30, 2026 của Marisa Mathews

Welcome to the January 2026 edition of the Fabric Influencers Spotlight, a recurring monthly post here to shine a bright light on the places on the internet where Microsoft MVPs & Fabric Super Users are doing some amazing work on all aspects of Microsoft Fabric. The Microsoft Fabric Community team has created the Fabric Influencers Spotlight to … Continue reading “Fabric Influencers Spotlight January 2026”