{"id":127200,"date":"2025-01-28T09:29:44","date_gmt":"2025-01-28T17:29:44","guid":{"rendered":""},"modified":"2025-06-11T07:39:27","modified_gmt":"2025-06-11T14:39:27","slug":"new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/power-automate\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/","title":{"rendered":"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Power Automate continues to evolve, bringing new security features to help organizations protect their data and automate intelligent processes more securely by design. Here are some of the latest enhancements:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"protect-identities-and-secrets-with-credential-management\">Protect Identities and Secrets with credential management<\/h3>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Desktop flow connection credentials with Azure key vault and CyberArk secrets<\/strong>: Power Automate now supports storing connection credentials securely in <a href=\"https:\/\/learn.microsoft.com\/en-us\/power-automate\/desktop-flows\/create-azurekeyvault-credential\">Azure Key Vault (AKV)<\/a> or <a href=\"https:\/\/learn.microsoft.com\/en-us\/power-automate\/desktop-flows\/create-cyberark-credential\">CyberArk<\/a>. This ensures that passwords are encrypted and managed securely, reducing the risk of unauthorized access. This feature includes support for automatic connection updates at runtime (like when a password rotation occurs).<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Certificate-Based Authentication with MFA (Public preview)<\/strong>: To further enhance security, Power Automate now supports <a href=\"https:\/\/learn.microsoft.com\/power-automate\/desktop-flows\/configure-certificate-based-auth\">certificate-based authentication<\/a> in desktop flow connections. This passwordless solution adds an extra layer of security, meeting multi-factor authentication (MFA) requirements for attended as well as unattended scenarios. This feature is available from Power Automate for Desktop Build 2410.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Credentials for Desktop flow actions (Public preview)<\/strong>: For desktop flows, Power Automate allows the use of <a href=\"https:\/\/learn.microsoft.com\/en-us\/power-automate\/desktop-flows\/actions-reference\/powerautomatesecretvariables\">credentials directly within flow actions<\/a>. This ensures sensitive information is handled securely, not stored in scripts or logs, and accessible only to authorized users. This feature is available from Power Automate for Desktop Build 2411.<\/li>\n<\/ol>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/image-2.webp\" alt=\"A screenshot of a computer\" class=\"wp-image-127203 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/image-2.webp\"><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"protect-networks\">Protect Networks<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>VNet support for Hosted machine groups (Public preview): <\/strong>the <a href=\"https:\/\/learn.microsoft.com\/power-automate\/desktop-flows\/hosted-rpa-overview\">Power Automate hosted RPA solution<\/a> provides a streamlined approach for setting up and scaling robotic process automation (RPA) to run RPA workloads running on virtual machines managed by Microsoft and hosted on Azure infrastructure. You can now <a href=\"https:\/\/learn.microsoft.com\/power-automate\/desktop-flows\/hosted-machine-groups#use-a-custom-virtual-network-for-your-hosted-machine-groups-preview\">connect your own Azure virtual network (VNet) to your hosted machine groups (Public preview)<\/a> enabling:\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><span style=\"background-color: var(--c-gray-100);font-size: 1rem\">Network isolated, private environments with customized network security measures, such as Network Security Groups and firewalls, to control and monitor traffic.<\/span><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Integration with on-premises networks through VPN or ExpressRoute where access to on-premises resources is necessary for RPA workloads.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Please note that <a href=\"https:\/\/learn.microsoft.com\/power-automate\/desktop-flows\/hosted-machines#use-a-custom-virtual-network-for-your-hosted-machines\">connecting your own Azure VNet with individual hosted machines<\/a> is already a generally available (GA) capability.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a><strong>Network Level Authentication support on Microsoft Entra joined or hybrid devices (Public Preview)<\/strong><\/a>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><span style=\"font-size: 1rem\">Network Level Authentication (NLA) is a security measure that mandates user authentication prior to the establishment of a remote desktop connection. This feature assists organizations in mitigating the risk of unauthorized access by ensuring that only authenticated users can initiate a remote session, thereby protecting against vulnerabilities associated with the authentication process.<\/span><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><span style=\"background-color: var(--c-gray-100);font-size: 1rem\">This feature is now supported when running unattended workload using a MS Entra ID account on a Microsoft Entra joined or hybrid device.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">These new security features make Power Automate an even more robust tool for automating intelligent processes while maintaining a high level of security. By protecting identities and secrets, safeguarding networks, and monitoring for threats, organizations can confidently leverage Power Automate to drive efficiency with hypermation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"wp-block-paragraph\"><a id=\"_msocom_1\"><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Power Automate continues to evolve, bringing new security features to help organizations protect their data and automate intelligent processes more securely by design.<\/p>\n","protected":false},"author":397,"featured_media":128906,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"audience":[3378],"content-type":[3424],"job-role":[],"product":[3474],"property":[],"topic":[3422,3435,3443],"coauthors":[3131,3113],"class_list":["post-127200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","audience-it-professional","content-type-news","product-power-automate","topic-hyperautomation","topic-operations","topic-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure - Microsoft Power Platform Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure - Microsoft Power Platform Blog\" \/>\n<meta property=\"og:description\" content=\"Power Automate continues to evolve, bringing new security features to help organizations protect their data and automate intelligent processes more securely by design.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/power-automate\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Power Platform Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T17:29:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T14:39:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/CLO24-Azure-Fintech-016-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Quentin Sele Barancy, Ken Seong Tan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Quentin Sele Barancy, Ken Seong Tan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/\"},\"author\":[{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/author\\\/quentin-sele-barancy\\\/\",\"@type\":\"Person\",\"@name\":\"Quentin Sele Barancy\"},{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/author\\\/ken-seong-tan\\\/\",\"@type\":\"Person\",\"@name\":\"Ken Seong Tan\"}],\"headline\":\"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure\",\"datePublished\":\"2025-01-28T17:29:44+00:00\",\"dateModified\":\"2025-06-11T14:39:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/\"},\"wordCount\":463,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/CLO24-Azure-Fintech-016.jpg\",\"keywords\":[\"Power Automate Desktop\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/\",\"name\":\"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure - Microsoft Power Platform Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/CLO24-Azure-Fintech-016.jpg\",\"datePublished\":\"2025-01-28T17:29:44+00:00\",\"dateModified\":\"2025-06-11T14:39:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/CLO24-Azure-Fintech-016.jpg\",\"contentUrl\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/CLO24-Azure-Fintech-016.jpg\",\"width\":9504,\"height\":6336,\"caption\":\"A woman in glasses sitting in front of a laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/2025\\\/01\\\/28\\\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/\",\"name\":\"Microsoft Power Platform Blog\",\"description\":\"Innovate with Business Apps\",\"publisher\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#organization\",\"name\":\"Microsoft Power Platform Blog\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Microsoft-Logo-e1685482038800.png\",\"contentUrl\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Microsoft-Logo-e1685482038800.png\",\"width\":194,\"height\":145,\"caption\":\"Microsoft Power Platform Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/#\\\/schema\\\/person\\\/63b9d40235ef74683bb33320cccf1f14\",\"name\":\"Quentin Sele Barancy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f195ef9c56c896ffa693911eaf3889560ea512ae80e1227f9c47ef5b618956c3?s=96&d=mm&r=g54c40437eefa7d016bd3ca4de2444ac0\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f195ef9c56c896ffa693911eaf3889560ea512ae80e1227f9c47ef5b618956c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f195ef9c56c896ffa693911eaf3889560ea512ae80e1227f9c47ef5b618956c3?s=96&d=mm&r=g\",\"caption\":\"Quentin Sele Barancy\"},\"url\":\"https:\\\/\\\/cm-edgetun.pages.dev\\\/en-us\\\/power-platform\\\/blog\\\/author\\\/quseleba\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure - Microsoft Power Platform Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure - Microsoft Power Platform Blog","og_description":"Power Automate continues to evolve, bringing new security features to help organizations protect their data and automate intelligent processes more securely by design.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/power-automate\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/","og_site_name":"Microsoft Power Platform Blog","article_published_time":"2025-01-28T17:29:44+00:00","article_modified_time":"2025-06-11T14:39:27+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/CLO24-Azure-Fintech-016-1024x683.jpg","type":"image\/jpeg"}],"author":"Quentin Sele Barancy, Ken Seong Tan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Quentin Sele Barancy, Ken Seong Tan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/author\/quentin-sele-barancy\/","@type":"Person","@name":"Quentin Sele Barancy"},{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/author\/ken-seong-tan\/","@type":"Person","@name":"Ken Seong Tan"}],"headline":"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure","datePublished":"2025-01-28T17:29:44+00:00","dateModified":"2025-06-11T14:39:27+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/"},"wordCount":463,"commentCount":0,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/CLO24-Azure-Fintech-016.jpg","keywords":["Power Automate Desktop"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/","name":"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure - Microsoft Power Platform Blog","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/CLO24-Azure-Fintech-016.jpg","datePublished":"2025-01-28T17:29:44+00:00","dateModified":"2025-06-11T14:39:27+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/CLO24-Azure-Fintech-016.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2025\/01\/CLO24-Azure-Fintech-016.jpg","width":9504,"height":6336,"caption":"A woman in glasses sitting in front of a laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2025\/01\/28\/new-security-features-for-desktop-flows-enhancing-protection-of-identities-secrets-and-desktop-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/"},{"@type":"ListItem","position":2,"name":"New Security Features for Desktop flows: Enhancing protection of identities, secrets and desktop infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/","name":"Microsoft Power Platform Blog","description":"Innovate with Business Apps","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization","name":"Microsoft Power Platform Blog","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","width":194,"height":145,"caption":"Microsoft Power Platform Blog"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/person\/63b9d40235ef74683bb33320cccf1f14","name":"Quentin Sele Barancy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f195ef9c56c896ffa693911eaf3889560ea512ae80e1227f9c47ef5b618956c3?s=96&d=mm&r=g54c40437eefa7d016bd3ca4de2444ac0","url":"https:\/\/secure.gravatar.com\/avatar\/f195ef9c56c896ffa693911eaf3889560ea512ae80e1227f9c47ef5b618956c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f195ef9c56c896ffa693911eaf3889560ea512ae80e1227f9c47ef5b618956c3?s=96&d=mm&r=g","caption":"Quentin Sele Barancy"},"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/author\/quseleba\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Power Platform Blog","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/127200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/comments?post=127200"}],"version-history":[{"count":5,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/127200\/revisions"}],"predecessor-version":[{"id":127208,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/127200\/revisions\/127208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/media\/128906"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/media?parent=127200"}],"wp:term":[{"taxonomy":"audience","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/audience?post=127200"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/content-type?post=127200"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/job-role?post=127200"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/product?post=127200"},{"taxonomy":"property","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/property?post=127200"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/topic?post=127200"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/coauthors?post=127200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}