web
You’re offline. This is a read only version of the page.
close
Skip to main content

Announcements

News and Announcements icon
Community site session details

Community site session details

Session Id :
Power Platform Community / Forums / Copilot Studio / Unable to connect Pala...
Copilot Studio
Suggested Answer

Unable to connect Palantir Ontology MCP using Copilot Studio using OAuth 2.0

(0) ShareShare
ReportReport
Posted on by
We’re facing issues when connecting to Palantir Ontology MCP as tool using OAuth 2.0 Authentication from Copilot Studio. When we tried to create a connection the page spins and eventually gets times out. However, it is successful through VS Code and Post Man using OAuth 2.0. As part of the network traces, we could see that the connection is getting timed out at https://usa002-004.consent.azure-apihub.net/redirect/craa5-5fpalantir-2dontology-xxxxx?code=xxxxx&state=xxxxxx and will show “Connection Timed Out” message.
 
Here are few additional details:
 
  • Palantir Ontology MCP is restricted to VNet and only allows connections originating from VNet. Palantir Team has stated the requests from the public internet will be blocked.
  • A private link is configured and approved in the Power Platform VNet, enabling all connections from Azure Subscription to connect to Palantir via the private link. This was verified by deploying a VM in the Power Platform VNet and running a Curl test from the VM to Palantir Host, which was successful.
  • We would like to find out if anyone has successfully connected to MCP from Copilot Studio using OAuth 2.0 Authentication (Not Entra Bound Authentication). Additionally, any insights or advice regarding the connection issue we are currently facing would be greatly appreciated.
I have the same question (0)
  • Suggested answer
    Radwan Almsora Profile Picture
    17 on at

    Hello,

    ​This is a classic and complex network routing issue that occurs when combining OAuth 2.0 Authorization Code Flows with strict VNet-inbound restrictions (Private Links) in multi-tenant SaaS environments like Copilot Studio / Power Platform.

    ​The reason your connection works perfectly via VS Code, Postman, and your test VM, but fails inside Copilot Studio, comes down to where the actual OAuth handshake request originates from.

     

    ​The Root Cause Analysis

    ​When you initiate the OAuth 2.0 connection from Copilot Studio, the process breaks down at the Azure API Hub redirect URL (consent.azure-apihub.net).


    1. The Handshake Origin: During the OAuth authorization phase, the underlying Azure Power Platform connector infra (Azure API Hub) makes an outbound call to Palantir’s token/authorization endpoint to exchange the code for an access token.

    2. The Routing Blindspot: Even though you have configured and approved a Power Platform Virtual Network (VNet) Data Gateway / Private Link, the initial OAuth token-exchange traffic from the managed API Hub infrastructure often routes via the Public Microsoft/Azure Backbone Internet IPs, rather than traversing through your specific customer-configured VNet Private Endpoint.

    3. The Block: Because Palantir is configured to strictly block any request originating outside your VNet, it rejects/drops the token-exchange request from the Azure API Hub, causing the consent page to spin endlessly and eventually time out.

    ​Recommended Solutions & Workarounds

    ​1. Whitelist Azure API Hub / Power Platform Trusted IPs

    ​If Palantir allows IP-based exceptions alongside VNet restrictions, you need to add the public IP addresses of the Power Platform / Azure API Hub connectors for your specific region (e.g., US Azure regions) to the Palantir inbound firewall rules.


    • ​You can download the weekly updated Azure IP Ranges and Service Tags – Public Cloud" document from Microsoft to get the precise IP ranges for PowerPlatformInfra or AppService.


    •  

    ​2. Leverage Power Platform Managed VNet Support for Custom Connectors

    ​Ensure that your Palantir MCP integration is explicitly bound to a Managed VNet environment within Power Platform.

     

    • ​Go to the Power Platform Admin Center, verify your network injection settings, and ensure that the Enterprise Policies for Subnet Injection are properly applied to the environment hosting your Copilot Studio Agent. If the connector bypasses this policy during the authorization phase, it will fail.

    ​3. Transition to a Hybrid / Direct Logic Apps Wrapper (Robust Workaround)

    ​If modifying Palantir's edge firewall to trust Azure public infrastructure is not an option, you can isolate the OAuth handshake within your VNet:


    1. ​Deploy an Azure Logic App (Standard Plan) injected directly into your Azure VNet where the Private Link is active.

    2. ​Configure the Logic App to handle the Model Context Protocol (MCP) communication with Palantir locally.

    3. ​Secure the Logic App endpoint using Microsoft Entra ID (OAuth).

    4. ​Call the Logic App from Copilot Studio. Since Copilot Studio will be authenticating against Entra ID (which is fully public and native to Microsoft), the connection setup will succeed instantly, while the internal VNet routing to Palantir will be safely handled inside your private network.

    ​Summary Question for the Community

    ​Has anyone successfully forced the Azure API Hub regional consent service to route exclusively through an Azure ExpressRoute or VNet Data Gateway during the initial authorization phase, without opening the endpoint to Microsoft's public service tags?

    ​Hope this helps narrow down the network boundary breakdown!

    ​Best regards,

  • Nivedipa-MSFT Profile Picture
    Microsoft Employee on at
    Hello ,

    The OAuth redirect host consent.azure-apihub.net is Microsoft's public APIHub broker, not part of your Power Platform VNet. In practice, that means:

    • Browser → Palantir authorize 
    • Palantir → APIHub redirect 
    • APIHub → Palantir token endpoint  — the call comes from APIHub's public egress, which Palantir's VNet allow-list blocks, so it times out.

    Power Platform VNet integration covers the runtime data call, not the OAuth handshake. Entra-bound works because the token exchange goes to the public login.microsoftonline.com.

    Options:

    1. Allow-list Microsoft Power Platform / APIHub egress IPs on Palantir's token endpoint (broad, ranges change).
    2. Switch to Entra-bound auth if Palantir supports Entra federation — the token exchange stays public, and the runtime call still flows through your VNet.
    3. Front Palantir with a gateway in your VNet (APIM / Function / AFD with private origin) that provides a public OAuth endpoint and forwards to Palantir over the private link.

    Best path: option 2 (Entra federation) or option 3 (VNet gateway). Pure non-Entra OAuth 2.0 from Copilot Studio against a fully VNet-locked IdP isn't supported today without one of these workarounds.

    Docs: Virtual Network support overview - Power Platform | Microsoft Learn

    If you found the information above helpful, I would appreciate it if you could share your feedback.
    Your feedback is important to us. Please rate us:
    🤩 Excellent 🙂 Good 😐 Average 🙁 Needs Improvement 😠 Poor

Under review

Thank you for your reply! To ensure a great experience for everyone, your content is awaiting approval by our Community Managers. Please check back later.

Helpful resources

Quick Links

Introducing the 2026 Season 1 community Super Users

Congratulations to our 2026 Super Users!

Kudos to our 2025 Community Spotlight Honorees

Congratulations to our 2025 community superstars!

Congratulations to the April Top 10 Community Leaders!

These are the community rock stars!

Leaderboard > Copilot Studio

#1
Valantis Profile Picture

Valantis 645

#2
Vish WR Profile Picture

Vish WR 300

#3
Haque Profile Picture

Haque 219

Last 30 days Overall leaderboard