When a Power Automate flow or Power BI dataset is created via an interactive session, the connections are associated with the user who creates them. It's been identified that the client device ID from where the connection is being created is also captured, but this is not visible within the connection record to either the connection owners or administrators. Subsequently, when an automated action is triggered from a flow or Power BI dataset refresh, a non-interactive sign-in is generated under the context of the "owner" of the connection and this is expected behaviour. However, it is also deemed to be running from the client device of the person who created the connection and is subject to a device compliance check if your organisation has implemented such a conditional access policy. Clearly, the automated process isn't actually being run from the client device (its running from "the cloud"). That device could be turned off and the automation would still run successfully as long as the device is marked as compliant within Azure. Aside from being a security concern, this "device spoofing" causes Power Automate flows and Power BI report refreshes to fail when organisations decommission and refresh client devices as the old devices become non-compliant. This will eventually cause EVERY flow and Power BI report within an organisation to fail (unless the organisation never upgrades their client devices)
There are 2 bugs/design faults here:-
This has already been suggested below but my idea includes some additional level of detail:-
Please do not connections to be invalid when unreg... - Power Platform Community (microsoft.com)
Flow Connection not able to self authenticaticate - Power Platform Community (microsoft.com)
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.