web
You’re offline. This is a read only version of the page.
close
Skip to main content

Announcements

News and Announcements icon
Community site session details

Community site session details

Session Id :
Power Platform Community / Forums / Power Automate / Unable to "Get Secret"...
Power Automate
Suggested Answer

Unable to "Get Secret" from Azure KeyVault (vault which is behind Private Endpoint)

(0) ShareShare
ReportReport
Posted on by 2
Hello!!
 
I’m using Power Automate Cloud Flows with VNet integration enabled (using a dedicated subnet). An Azure Key Vault is deployed in a different subnet within the same VNet and is accessed via a Private Endpoint.
 
 

Issue:

When creating a Power Automate Cloud Flow and using the Azure Key Vault connector to retrieve a secret, the flow fails with the following error:

“The dynamic invocation request failed with error: { "status": 403, "message": "Operation failed because client does not have permission to perform the operation on the key vault. Please check your permissions in the key vault access policies https://docs.microsoft.com/en-us/azure/key-vault/general/assign-access-policy-portal.\r\nclientRequestld: 14efda820a5f", "error": { "message": "Operation failed because client does not have permission toperform the operation on the key vault. Please check your permissions in the key vault access policies https://docs.microsoft.com/en-us/azure/key-vault/general/assign-access-policy-portal." l, "source":keyvault-ncus.azconn-ncus-001 .p.azurewebsites.net"
 

The error message appears to reference Key Vault Access Policies, which is misleading because, could be referring to old documentation from Microsoft?

  • The Key Vault is configured to use Azure RBAC
  • Required RBAC roles (e.g., Key Vault Secrets User) are already assigned to the Service Principal.
 

What am I missing here? Any help would be appreciated!!!





 
Categories:
I have the same question (0)
  • Suggested answer
    MParikh Profile Picture
    465 Super User 2026 Season 1 on at
    Hi @ST-16031624-0,

    This is a known limitation with Power Automate VNet integration and Key Vault private endpoints. The core issue is not RBAC permissions; it is a network routing problem.
    Why the 403 Happens
    Power Automate VNet integration uses service endpoints injected into your designated subnet to route traffic to Azure resources. When your Key Vault is behind a private endpoint with public access disabled, the service endpoint cannot "speak through" the private endpoint. The traffic still comes from a Microsoft-managed network layer and gets blocked at the Key Vault firewall level, resulting in a 403 even when RBAC roles like Key Vault Secrets User are correctly assigned.
    The misleading error message about "access policies" references outdated Microsoft documentation; it does not actually mean your RBAC is wrong.​
    What Actually Works
    Private endpoints with public access fully disabled do not work with the Power Automate Key Vault connector, even with VNet integration properly configured. Your realistic options are:​
    • Allow Key Vault access from selected subnets only (service endpoint model). Keep public access enabled but restrict it to only your Power Platform VNet subnets. The Key Vault connector will succeed because the service endpoint is already in those subnets. This is the confirmed working pattern.​
    • Use an Azure Function or Logic App as a proxy. Your flow calls the Azure Function, which sits inside your VNet and retrieves the secret via the private endpoint. The Function returns the secret to the flow.​
    • Allow Microsoft trusted services. On the Key Vault networking page, enable "Allow trusted Microsoft services to bypass this firewall." This gives the Power Automate connector a path in, though it broadens access beyond just your VNet.​
    What to Check First
    Before changing your architecture, verify these items:
    • On the Key Vault Networking tab, confirm your Power Platform VNet subnets are listed under "Allow access from selected virtual networks."​
    • Confirm the enterprise policy is actually applied to your Power Platform environment and the environment shows it in the recent operations history.​
    • DNS resolution: the Power Platform subnet must resolve the Key Vault URI to the private endpoint IP, not the public one. A missing or misconfigured private DNS zone A record breaks this.
    The quickest fix with minimal rework is switching from "private endpoint + public access disabled" to "selected VNet subnets only" on the Key Vault firewall, which keeps it off the public internet while remaining compatible with the Power Automate connector.



    Thank you! 
    Proud to be a Super User!
    📩 Need more help?
    ✔️ Don’t forget to Accept as Solution if this guidance worked for you.
    💛 Your Like motivates me to keep helping

Under review

Thank you for your reply! To ensure a great experience for everyone, your content is awaiting approval by our Community Managers. Please check back later.

Helpful resources

Quick Links

Introducing the 2026 Season 1 community Super Users

Congratulations to our 2026 Super Users!

Kudos to our 2025 Community Spotlight Honorees

Congratulations to our 2025 community superstars!

Leaderboard > Power Automate

#1
Haque Profile Picture

Haque 286

#2
David_MA Profile Picture

David_MA 256 Super User 2026 Season 1

#3
Expiscornovus Profile Picture

Expiscornovus 225 Most Valuable Professional

Last 30 days Overall leaderboard