web
You’re offline. This is a read only version of the page.
close
Skip to main content

Announcements

News and Announcements icon
Community site session details

Community site session details

Session Id :
Power Platform Community / Forums / Power Apps / SharePoint Server SE O...
Power Apps
Suggested Answer

SharePoint Server SE On-Prem + Power Platform – Connection Breaks After AD Password Expiry

(0) ShareShare
ReportReport
Posted on by

Hi Community,

We are implementing Power Platform (Power Apps + Power Automate) with SharePoint Server Subscription Edition (On-Premises).

Current Architecture

Data Source: SharePoint Server Subscription Edition (On-Prem)

Connectivity: On-Premises Data Gateway (Standard mode)

  • Authentication:

    • Gateway configured using a dedicated AD service account

    • SharePoint data connections use Windows Authentication

    • Power Apps and Power Automate use the logged-in user’s credentials for identity-based record operations

Security Constraint

Our organization enforces an Active Directory 45-day password expiry policy for all accounts, including service accounts.

 

Issue

After password expiry and reset (service account or user account):

 
  • SharePoint connections in Power Apps and Power Automate break

  • Flows fail with authentication errors

  • Manual re-authentication / credential re-entry is required

  • This causes operational disruption

Questions


  1. What is the recommended authentication pattern for SharePoint Server SE + Power Platform in environments with strict AD password rotation?

  2. Is using a non-expiring managed service account (gMSA) supported for the On-Premises Data Gateway?

  3. Should we:

    • Use a single dedicated non-expiring service account for all SharePoint connections?

    • Switch to Kerberos delegation?

    • Use EffectiveUserName configuration?

 ​​​​​​​What is the recommended enterprise-grade architecture to prevent connection failures after password changes?

We are looking for a secure and compliant design that avoids recurring manual intervention every 45 days.

Any guidance, architecture references, or field experience would be highly appreciated.

Thanks!

I have the same question (0)
  • Suggested answer
    Sunil Kumar Pashikanti Profile Picture
    2,088 Moderator on at
     
    Use a Non‑Expiring gMSA (Group Managed Service Account) for the Gateway
    A gMSA password rotates automatically by AD and never requires you to update credentials, perfect for the On‑Prem Data Gateway.
     
    Benefits:
    No password expiry impact.
    Fully supported for on‑prem Windows authentication scenarios (SharePoint SE supports modern auth + Kerberos improvements).
    Reduces operational maintenance.

    Note: Gateway documentation historically supports gMSA for gateway Windows services, and enterprises commonly use this model for on‑prem identity workloads.
     
    High Level Steps to follow:
    Create a gMSA in Active Directory
    Assign SPN for SharePoint WebApp if Kerberos is used
    Run the On‑Premiss Data Gateway service using the gMSA
    Configure all SharePoint SE connections in Power Apps / Power Autmate using the Gateway + Windows Auth (gMSA)
    Keep user identity for record‑level logic inside apps, but gate all SharePoint data access through the gateway’s gMSA
    This aligns with SE’s modern authentication improvements  and enterprise SharePoint service account best practices (SharePoint SE supports multiple specialized service accounts).
     
    References:
     
     
    ✅ If this answer helped resolve your issue, please mark it as Accepted so it can help others with the same problem.
    👍 Feel free to Like the post if you found it useful.
     
     

Under review

Thank you for your reply! To ensure a great experience for everyone, your content is awaiting approval by our Community Managers. Please check back later.

Helpful resources

Quick Links

Introducing the 2026 Season 1 community Super Users

Congratulations to our 2026 Super Users!

Kudos to our 2025 Community Spotlight Honorees

Congratulations to our 2025 community superstars!

Congratulations to the April Top 10 Community Leaders!

These are the community rock stars!

Leaderboard > Power Apps

#1
Vish WR Profile Picture

Vish WR 1,033

#2
Valantis Profile Picture

Valantis 632

#3
11manish Profile Picture

11manish 607

Last 30 days Overall leaderboard