An Azure service for ingesting, preparing, and transforming data at scale.
Azure Data Factory’s SharePoint Online List connector still relies on a service principal model that is based on Azure ACS for app-only access. Because Azure ACS is being retired, the recommended path is not to “fix” the existing ACS-based linked services, but to move away from ACS-based authentication entirely.
Key points from the current guidance:
- Azure ACS retirement impact
- Azure ACS for SharePoint Online auth will stop working for new tenants as of November 1, 2024 and for existing tenants on April 2, 2026.
- The SharePoint Online List connector documentation explicitly recommends switching from service principal key authentication (ACS-based) to service principal certificate authentication, but both are still ACS-style app principals at the SharePoint level.
- Long term, the supported and preferred model for app-only access to SharePoint Online is via a Microsoft Entra ID (Azure AD) application, not ACS.
- Current ADF SharePoint Online List connector model
- The connector uses a service principal that is granted permissions directly in SharePoint via the appinv.aspx page.
- The documented setup steps are:
- Register an application with Microsoft Entra ID and note Application ID, key/certificate, and Tenant ID.
- Grant SharePoint Online site permissions to that app using
https://<your-site-url>/_layouts/15/appinv.aspxwith an AppPermissionRequests XML such as:<AppPermissionRequests AllowAppOnlyPolicy="true"> <AppPermissionRequest Scope="http://sharepoint/content/sitecollection/web" Right="Read"/> </AppPermissionRequests> - In ADF/Synapse, create a SharePoint Online List linked service and configure it with that app’s details.
- This path is still ACS-style app-only under the covers, even when the app is registered in Entra ID.
- What this means for migration
- There is no alternative ADF-linked-service authentication mode in the provided documentation that uses pure Entra ID app-only / Microsoft Graph for SharePoint Online List ingestion.
- The official guidance for ACS in SharePoint Online is:
- Prefer Entra ID app-only over ACS for new solutions.
- Plan to migrate off ACS-based models before April 2, 2026.
- For SharePoint in general (outside ADF), the recommended replacement is:
- Register an Entra ID application and use Entra ID app-only with either Microsoft Graph or SharePoint REST, optionally using Resource Specific Consent (RSC) to scope permissions to specific site collections.
- Practical options based on current documentation
- For existing ADF SharePoint Online List linked services:
- They can continue to work while ACS is still supported, but must be considered temporary because ACS will stop working.
- If using service principal key, switch to service principal certificate authentication as recommended in the connector docs to align with current best practice for that connector.
- For a long-term, ACS-free architecture:
- Move ingestion logic to a component that can use Entra ID app-only and Microsoft Graph/SharePoint REST (for example, an Azure Function, Logic App, or custom code) and then land data into a storage or database that ADF can read from.
- Use ADF to orchestrate around that component rather than connecting directly to SharePoint Lists via the ACS-based connector.
- For existing ADF SharePoint Online List linked services:
- Tenant-level ACS shutdown
- Tenant admins can proactively disable ACS app-only access using:
Connect-SPOService -Url https://<tenant>-admin.sharepoint.com Set-SPOTenant -DisableCustomAppAuthentication $true - Once this is done (or after the global retirement date), ACS-based ADF SharePoint Online List linked services will no longer be able to authenticate.
- Tenant admins can proactively disable ACS app-only access using:
In summary, the current ADF SharePoint Online List connector does not expose a Microsoft Graph / Entra ID–only mode in the provided documentation. The supported migration path is to:
- Treat the existing ACS-based linked services as temporary.
- For now, use the documented service principal setup (preferably certificate-based) if ACS is still enabled in the tenant.
- Design a replacement ingestion pattern that uses Entra ID app-only and Graph/SharePoint APIs outside of the ADF SharePoint List connector, then feed ADF from that landing zone.
References: