Share via

SharePoint Online ACS Retirement - What's the correct way to migrate Azure Data Factory (ADF) SPO List Linked Services

ZuheirZ 41 Reputation points
2026-03-14T08:24:02.1666667+00:00

As per the title, I couldn't find any way I can use ADF Linked Services to ingest SharePoint Online List through copy data etc. I found a guide towards File / Library. But not Normal list without the usage of ACS.

I've done everything that is needed in getting the access through MS Graph for the service Principal, but ADF Linked Services for SPO List doesn't seems to be working.

Please help!

Azure Data Factory
Azure Data Factory

An Azure service for ingesting, preparing, and transforming data at scale.

{count} votes

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-03-14T08:24:20.85+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Azure Data Factory’s SharePoint Online List connector still relies on a service principal model that is based on Azure ACS for app-only access. Because Azure ACS is being retired, the recommended path is not to “fix” the existing ACS-based linked services, but to move away from ACS-based authentication entirely.

    Key points from the current guidance:

    1. Azure ACS retirement impact
      • Azure ACS for SharePoint Online auth will stop working for new tenants as of November 1, 2024 and for existing tenants on April 2, 2026.
      • The SharePoint Online List connector documentation explicitly recommends switching from service principal key authentication (ACS-based) to service principal certificate authentication, but both are still ACS-style app principals at the SharePoint level.
      • Long term, the supported and preferred model for app-only access to SharePoint Online is via a Microsoft Entra ID (Azure AD) application, not ACS.
    2. Current ADF SharePoint Online List connector model
      • The connector uses a service principal that is granted permissions directly in SharePoint via the appinv.aspx page.
      • The documented setup steps are:
        1. Register an application with Microsoft Entra ID and note Application ID, key/certificate, and Tenant ID.
        2. Grant SharePoint Online site permissions to that app using https://<your-site-url>/_layouts/15/appinv.aspx with an AppPermissionRequests XML such as:
                  <AppPermissionRequests AllowAppOnlyPolicy="true">
                      <AppPermissionRequest Scope="http://sharepoint/content/sitecollection/web" Right="Read"/>
                  </AppPermissionRequests>
          
        3. In ADF/Synapse, create a SharePoint Online List linked service and configure it with that app’s details.
      • This path is still ACS-style app-only under the covers, even when the app is registered in Entra ID.
    3. What this means for migration
      • There is no alternative ADF-linked-service authentication mode in the provided documentation that uses pure Entra ID app-only / Microsoft Graph for SharePoint Online List ingestion.
      • The official guidance for ACS in SharePoint Online is:
        • Prefer Entra ID app-only over ACS for new solutions.
        • Plan to migrate off ACS-based models before April 2, 2026.
      • For SharePoint in general (outside ADF), the recommended replacement is:
        • Register an Entra ID application and use Entra ID app-only with either Microsoft Graph or SharePoint REST, optionally using Resource Specific Consent (RSC) to scope permissions to specific site collections.
    4. Practical options based on current documentation
      • For existing ADF SharePoint Online List linked services:
        • They can continue to work while ACS is still supported, but must be considered temporary because ACS will stop working.
        • If using service principal key, switch to service principal certificate authentication as recommended in the connector docs to align with current best practice for that connector.
      • For a long-term, ACS-free architecture:
        • Move ingestion logic to a component that can use Entra ID app-only and Microsoft Graph/SharePoint REST (for example, an Azure Function, Logic App, or custom code) and then land data into a storage or database that ADF can read from.
        • Use ADF to orchestrate around that component rather than connecting directly to SharePoint Lists via the ACS-based connector.
    5. Tenant-level ACS shutdown
      • Tenant admins can proactively disable ACS app-only access using:
             Connect-SPOService -Url https://<tenant>-admin.sharepoint.com
             Set-SPOTenant -DisableCustomAppAuthentication $true
        
      • Once this is done (or after the global retirement date), ACS-based ADF SharePoint Online List linked services will no longer be able to authenticate.

    In summary, the current ADF SharePoint Online List connector does not expose a Microsoft Graph / Entra ID–only mode in the provided documentation. The supported migration path is to:

    • Treat the existing ACS-based linked services as temporary.
    • For now, use the documented service principal setup (preferably certificate-based) if ACS is still enabled in the tenant.
    • Design a replacement ingestion pattern that uses Entra ID app-only and Graph/SharePoint APIs outside of the ADF SharePoint List connector, then feed ADF from that landing zone.

    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.