Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

1.4.5. Network Security: Managed Private Endpoints

đź’ˇ First Principle: Network security in Fabric extends beyond data-level controls to network-level isolation. Managed Private Endpoints and Trusted Workspace Access enable secure connectivity to Azure services without exposing traffic to the public internet.

Scenario: Your organization's Azure SQL Database contains sensitive financial data and is configured to deny public network access. Your Fabric workspace needs to connect to this database for ETL pipelines. Without network-level configuration, the connection will fail.

Understanding Managed Private Endpoints

  • Concept: Private network connections from Fabric to Azure services using Azure Private Link
  • Benefit: Traffic flows over Microsoft's backbone network, never traversing public internet
  • Requirement: The target Azure service must support Private Link

Managed Private Endpoint Configuration

ComponentPurposeConfiguration Location
Managed Private EndpointPrivate connection to Azure serviceWorkspace Settings → Network Security
ApprovalTarget resource owner must approveAzure Portal → Target resource → Private endpoint connections
FQDNFully qualified domain name for connectionProvided after approval

Creating a Managed Private Endpoint

  1. Navigate to Workspace Settings → Network Security
  2. Select Create Managed Private Endpoint
  3. Specify target Azure resource (e.g., Azure SQL Server, Storage Account)
  4. Submit request—target resource owner must approve
  5. Once approved, use the private FQDN in your connections
Visual: Managed Private Endpoint Flow
Loading diagram...

Trusted Workspace Access

  • Concept: Allow Fabric workspaces to access Azure Storage accounts configured with firewall rules
  • Benefit: Storage account remains protected by firewall while permitting specific Fabric workspace access
  • Implementation: Configure on the Azure Storage Account firewall settings
Trusted Workspace Access Configuration:
  1. Navigate to Azure Storage Account → Networking → Firewalls and virtual networks
  2. Enable Allow trusted Azure services to access this storage account
  3. Add Fabric workspace identity to Resource instances exceptions
  4. Fabric can now access storage despite firewall rules

When to Use Each Approach

ScenarioSolution
Connect to Azure SQL with no public accessManaged Private Endpoint
Access storage account with firewallTrusted Workspace Access
Access Cosmos DB privatelyManaged Private Endpoint
Multi-cloud data access (AWS S3, GCS)Shortcuts with service principals

⚠️ Common Pitfall: Creating a Managed Private Endpoint and expecting immediate connectivity. The endpoint requires approval by the target resource owner. Until approved, connections will fail. Coordinate with your Azure infrastructure team.

Exam Tip: Questions about connecting Fabric to resources with "public access disabled" or "firewall enabled" typically require Managed Private Endpoints or Trusted Workspace Access—not service principals alone.

Reflection Question: Your Azure SQL Database has public network access disabled. A data engineer creates a connection in Dataflow Gen2 but receives a connection timeout error. What is the most likely cause and solution?