web
You’re offline. This is a read only version of the page.
close
Skip to main content

Announcements

News and Announcements icon
Community site session details

Community site session details

Session Id :
Power Platform Community / Forums / Power Apps / 403 Forbidden Error on...
Power Apps
Answered

403 Forbidden Error on newly added Azure SQL table to Canvas App

(0) ShareShare
ReportReport
Posted on by 728
I added a link to a new Azure SQL table in one of my apps. I am getting a 403 Forbidden error on the published app when attempting to access that new table. I found Getting 403 forbidden error on canvas app and Solved: 403 Forbidden Error When Saving Data to SQL DB from PCF in Play Mode (Power Apps) but the then retired setting is now gone totally. How do I fix this problem?
 
{
  "duration": 0,
  "size": 0,
  "status": 403,
  "headers": {
    "Content-Length": 326,
    "Content-Type": "application/json",
    "x-ms-dlp-ef": "-|-/-|-|-",
    "x-ms-dlp-gu": "-|-",
    "x-ms-dlp-re": "-|-",
    "x-ms-environment-id": "default-X",
    "x-ms-mip-sl": "-|-|-|-",
    "x-ms-tenant-id": "X",
    "x-ms-client-request-id": "02a24553-ae12-4e9d-a70d-58b3f6715dd7"
  },
  "body": {
    "error": {
      "code": 403,
      "message": "Method GET is not allowed for table [dbo].[StuListSmallOld]",
      "source": "msmanaged-na.azure-apim.net",
      "path": "choose[2]\\when[1]\\choose\\when[2]",
      "policyId": "",
      "clientRequestId": "a6c8d52e-4622-48ea-9fbc-dd0457dd2beb",
      "dreeSet": true
    }
  },
  "responseType": "text"
}
I blanked my tenant ID above.
Categories:
I have the same question (0)
  • developerAJ Profile Picture
    4,763 on at

    I recommend first ensuring that the account used by your app has proper permissions on the new table. You can grant the necessary access in SQL using the following command:

     
    GRANT SELECT, INSERT, UPDATE, DELETE ON dbo.StuListSmallOld TO [YourUser];
     

    If the account already has the correct permissions but the app is still showing a 403 Forbidden error, it is likely related to a DLP (Data Loss Prevention) policy issue.

    If the error occurs across all tables: Check your environment’s DLP policies, as they may be restricting access.

    If it occurs only for this table: This may be an isolated issue. In that case, try removing and re-adding the connection, or test using a different account to see if the issue persists. check the access using same account directly in sql server

    As a best practice, I recommend using stored procedures rather than direct tables or views in your app. This approach can improve security, reduce direct data access, and simplify your app by minimizing the number of data sources.

  • Suggested answer
    developerAJ Profile Picture
    4,763 on at

    Please let us know if the issue still exists. If it has been resolved, kindly close the thread by accepting the solution

     

    If this solution helped you resolve your issue, kindly mark it as accepted — it makes it easier for others to find and also closes the discussion. If you found it useful, a Like ❤️ would be greatly appreciated!

    🤝 Let’s connect on LinkedIn || 📘 Explore more on my articles

  • Suggested answer
    BrianHFASPS Profile Picture
    728 on at
    The answer for me is going and disabling the enhanced security option in regard to implicit permissions. Granting permission to tables and views via SQL on a per-user basis is much too cumbersome and unnecessary in my environment. Allowing the app to use the connector account for all transactions works for our environment. I only hit this issue now as I hadn't added any new tables / views and it seems the old permissions worked for existing links.
  • Verified answer
    developerAJ Profile Picture
    4,763 on at

    That’s great—you were able to resolve the issue.

    The statement:

     
    GRANT SELECT, INSERT, UPDATE, DELETE ON dbo.StuListSmallOld TO [YourUser];
     

    is specific to a table, but you can also apply permissions at the schema or database level. The ideal approach is to create a custom security role and use Azure security groups to assign permissions—this is compliant.

    If no user-level restriction is required, you can directly assign system roles like db_datawriter to the user.

    Using a SQL account is also good, but it is not compliant.

     

    If this solution helped you resolve your issue, kindly mark it as accepted — it makes it easier for others to find and also closes the discussion. If you found it useful, a Like ❤️ would be greatly appreciated!

    🤝 Let’s connect on LinkedIn || 📘 Explore more on my articles

Under review

Thank you for your reply! To ensure a great experience for everyone, your content is awaiting approval by our Community Managers. Please check back later.

Helpful resources

Quick Links

Introducing the 2026 Season 1 community Super Users

Congratulations to our 2026 Super Users!

Kudos to our 2025 Community Spotlight Honorees

Congratulations to our 2025 community superstars!

Congratulations to the April Top 10 Community Leaders!

These are the community rock stars!

Leaderboard > Power Apps

#1
Vish WR Profile Picture

Vish WR 834

#2
Valantis Profile Picture

Valantis 533

#3
Haque Profile Picture

Haque 410

Last 30 days Overall leaderboard