Hi Community,
We are implementing Power Platform (Power Apps + Power Automate) with SharePoint Server Subscription Edition (On-Premises).
Current Architecture
Data Source: SharePoint Server Subscription Edition (On-Prem)
Connectivity: On-Premises Data Gateway (Standard mode)
-
Authentication:
-
Gateway configured using a dedicated AD service account
-
SharePoint data connections use Windows Authentication
-
Power Apps and Power Automate use the logged-in user’s credentials for identity-based record operations
-
Security Constraint
Our organization enforces an Active Directory 45-day password expiry policy for all accounts, including service accounts.
Issue
After password expiry and reset (service account or user account):
-
SharePoint connections in Power Apps and Power Automate break
-
Flows fail with authentication errors
-
Manual re-authentication / credential re-entry is required
-
This causes operational disruption
Questions
-
What is the recommended authentication pattern for SharePoint Server SE + Power Platform in environments with strict AD password rotation?
-
Is using a non-expiring managed service account (gMSA) supported for the On-Premises Data Gateway?
-
Should we:
-
Use a single dedicated non-expiring service account for all SharePoint connections?
-
Switch to Kerberos delegation?
-
Use EffectiveUserName configuration?
-
What is the recommended enterprise-grade architecture to prevent connection failures after password changes?
We are looking for a secure and compliant design that avoids recurring manual intervention every 45 days.
Any guidance, architecture references, or field experience would be highly appreciated.
Thanks!

Report
All responses (
Answers (