Find everything you need to get certified on Fabric—skills challenges, live sessions, exam prep, role guidance, and more.
Get startedGrow your Fabric skills and prepare for the DP-600 certification exam by completing the latest Microsoft Fabric challenge.
I just published a paginated report to the service and created and plumbed a personal gateway to that report. there is only one data source in that gateway which is my local instance of sql server.
what stands now between a hacker running my report and seeing data? i suppose he could easily get my tenant id and pswd. I dont know exactly what sits in the gateway metadata on the service side but from what i saw its no more than a machine name (not even an ip), catalog name and some very generic credential rules.
and then what if my report had been a pbix and the gateway wasnt even a factor? would it be just the tenant id and pswd sitting between my data and the hacker's eyes?
Solved! Go to Solution.
Hey @db042190 ,
The short answer is that there is all sorts of security all over the place in the Service and the Gateway.
The longer answer is to review article about the various levels of security: On-premises data gateway architecture | Microsoft Learn And, here is the security whitepaper with more details: Power BI security white paper - Power BI | Microsoft Learn
Proud to be a Datanaut!
Private message me for consulting or training needs.
Hey @db042190 ,
The short answer is that there is all sorts of security all over the place in the Service and the Gateway.
The longer answer is to review article about the various levels of security: On-premises data gateway architecture | Microsoft Learn And, here is the security whitepaper with more details: Power BI security white paper - Power BI | Microsoft Learn
Proud to be a Datanaut!
Private message me for consulting or training needs.
Join the community in Stockholm for expert Microsoft Fabric learning including a very exciting keynote from Arun Ulag, Corporate Vice President, Azure Data.
Ask questions in Eventhouse and KQL, Eventstream, and Reflex.