• Data retrieval strategy from SharePoint:
    • Files, Lists, custom applications, OneLake File Explorer
    • security, best practices


Version

Date

Description

Contributor

V0.1

 

Initial document

COLOMBANI Théo

V0.2

 

Added to the wiki

COLOMBANI Théo

V0.3

 

Added Shortcut specific guidelines (section 4)
Added authentification part to be set up (section 5)
COLOMBANI Théo






1. Axis — Load into Lakehouse Files

1.1 OneLake Shortcut (SharePoint / OneDrive)

Description
Logical link exposing SharePoint folders in OneLake without data duplication.

Functioning

Key capabilities

Advantages

Limitations (decision drivers)


1.2 Custom ingestion — API (Notebook or Pipeline) → Files

Description
Extraction via Microsoft Graph or SharePoint REST API and storage in Lakehouse Files.

Execution models

Functioning

Key capabilities

Advantages

Limitations (decision drivers)


2. Axis — Load into Lakehouse Tables

2.1 Shortcut with transformation → Delta Tables

Description
Use of SharePoint shortcut with transformation to project files into Delta tables.

Functioning

Key capabilities

Advantages

Limitations (decision drivers)

2.2 Mirroring (SharePoint Lists)

Description
Replication of SharePoint Lists into OneLake as Delta tables.

Functioning

Key capabilities

Advantages

Limitations (decision drivers)

2.3 Custom ingestion — API (Notebook or Pipeline) → Tables

Description
API-based extraction with transformation and direct load into Delta tables.

Same comments from Section 1.2 Custom ingestion — API (Notebook or Pipeline) → Files


3. Considerations

API usage (Notebook vs Pipeline)

Notebook

Pipeline (Web / Copy Activity)

Security

Service principal recommended


4. MATRIX(s)

Synthesis

Data type

Load target

Options

Files

Files

Shortcut / API (Notebook or Pipeline)

Files

Tables

Shortcut + transformation / API (Notebook or Pipeline)

SharePoint Lists

Tables

Mirroring / API (Notebook or Pipeline)

Criteria

Criteria

Shortcut (Files)

Shortcut + Transform (Tables)

Mirroring (Lists)

API via Notebook

API via Pipeline 

(Web / Copy)



Data movement

No copy (virtual access) 

No copy (virtual + projection)

Physical copy (replication) 

Physical copy

Physical copy

Latency / freshness

Near real-time (source-driven)

Near real-time

Near real-time sync (incremental) 

Depends on orchestration

Depends on orchestration

Transformation capabilities

None

Limited

Limited

Full (Spark / code)

Limited (mapping / chaining)

Incremental / CDC logic

Not supported

Limited / implicit

Built-in incremental sync

Fully customizable

Manual implementation required

Handling complex structures

Limited (folder-based only)

Limited

Not applicable (structured only)

Strong capability

Moderate (complex via chaining)

Control over ingestion logic

None

Low

Low

Full

Medium

Operational complexity

Very low

Low

Low

High

Medium

Dependency on source 

availability

High

High

Low

Low (after ingestion)

Low (after ingestion)

Schema control / evolution

None

Limited

Limited

Full control

Medium control

Cost (compute / storage)

Low 

Low

Free

Higher (compute + dev)

Medium (pipeline runs)

Supported data types

Files only

Files (JSON, CSV, PARQUET, EXCEL) (structured)

SharePoint Lists only

All (files + lists)

All (files + lists via API)


4. Technical solutions (recommended - SharePoint Shortcuts)

Limitations

The following limitations apply to SharePoint shortcuts:


5. Security & Authentication Guide

SharePoint ↔ Microsoft Fabric (Shortcuts)


1. Authentication Overview

SharePoint / OneDrive shortcuts in Fabric support three authentication methods:

This guide focuses on the two recommended enterprise patterns:


2. Summary — Workspace Identity vs Service Principal


Create a OneDrive or SharePoint shortcut

Fabric SharePoint Shortcut - potentials issues


CriteriaWorkspace IdentityService Principal
DefinitionFabric-managed identity (auto-created service principal)Entra ID application identity
Credential managementFully managed (no secrets)Requires secret or certificate
Setup complexityLowMedium
Governance controlLimited to Fabric scopeFull control via Entra ID
SharePoint authorizationRequires explicit site accessRequires explicit site access
Security riskLow (no credential exposure)Medium (secret lifecycle)
Cross-platform usageLimitedStrong (usable across services)
LifecycleTied to workspaceIndependent lifecycle
Recommended usageSimplicity / low opsEnterprise governance / control

3. Workspace Identity

3.1 Description

A Workspace Identity is a Fabric-managed service principal automatically created and maintained by the platform.

It allows Fabric to authenticate to external systems (including SharePoint) without managing credentials.


3.2 Configuration Steps (Shortcut context)

  1. Create a Workspace Identity in Fabric
  2. Retrieve the identity in Entra ID
  3. Grant access to SharePoint site
  4. Create the Shortcut

3.3 Best Practices


3.4 Limitations (important for design)


4. Service Principal

4.1 Description

A Service Principal is a non-interactive identity registered in Microsoft Entra ID, used for application-to-application authentication.

It provides full control over permissions and lifecycle, making it suitable for enterprise scenarios.


4.2 Configuration Steps (Shortcut context)

Securely connect Microsoft Fabric to SharePoint

  1. Create an App Registration in Entra ID
  2. Assign API permissions
  3. Grant access to SharePoint site
  4. Configure authentication in Fabric

4.3 Best Practices


4.4 Limitations (important for design)


5. Key Design Considerations

5.1 Authentication vs Authorization

Both must be configured correctly.


5.2 Choosing between Workspace Identity and Service Principal

Key decision drivers: