Announcements
{ "duration": 0, "size": 0, "status": 403, "headers": { "Content-Length": 326, "Content-Type": "application/json", "x-ms-dlp-ef": "-|-/-|-|-", "x-ms-dlp-gu": "-|-", "x-ms-dlp-re": "-|-", "x-ms-environment-id": "default-X", "x-ms-mip-sl": "-|-|-|-", "x-ms-tenant-id": "X", "x-ms-client-request-id": "02a24553-ae12-4e9d-a70d-58b3f6715dd7" }, "body": { "error": { "code": 403, "message": "Method GET is not allowed for table [dbo].[StuListSmallOld]", "source": "msmanaged-na.azure-apim.net", "path": "choose[2]\\when[1]\\choose\\when[2]", "policyId": "", "clientRequestId": "a6c8d52e-4622-48ea-9fbc-dd0457dd2beb", "dreeSet": true } }, "responseType": "text" }
I recommend first ensuring that the account used by your app has proper permissions on the new table. You can grant the necessary access in SQL using the following command:
GRANT SELECT, INSERT, UPDATE, DELETE ON dbo.StuListSmallOld TO [YourUser];
If the account already has the correct permissions but the app is still showing a 403 Forbidden error, it is likely related to a DLP (Data Loss Prevention) policy issue.
If the error occurs across all tables: Check your environment’s DLP policies, as they may be restricting access.
If it occurs only for this table: This may be an isolated issue. In that case, try removing and re-adding the connection, or test using a different account to see if the issue persists. check the access using same account directly in sql server
As a best practice, I recommend using stored procedures rather than direct tables or views in your app. This approach can improve security, reduce direct data access, and simplify your app by minimizing the number of data sources.
Please let us know if the issue still exists. If it has been resolved, kindly close the thread by accepting the solution
If this solution helped you resolve your issue, kindly mark it as accepted — it makes it easier for others to find and also closes the discussion. If you found it useful, a Like ❤️ would be greatly appreciated!
🤝 Let’s connect on LinkedIn || 📘 Explore more on my articles
That’s great—you were able to resolve the issue.
The statement:
is specific to a table, but you can also apply permissions at the schema or database level. The ideal approach is to create a custom security role and use Azure security groups to assign permissions—this is compliant.
If no user-level restriction is required, you can directly assign system roles like db_datawriter to the user.
db_datawriter
Using a SQL account is also good, but it is not compliant.
Under review
Thank you for your reply! To ensure a great experience for everyone, your content is awaiting approval by our Community Managers. Please check back later.
Congratulations to our 2026 Super Users!
Congratulations to our 2025 community superstars!
These are the community rock stars!
Stay up to date on forum activity by subscribing.
Vish WR 834
Valantis 533
Haque 410