How Flow Studio MCP protects your data and your tenants.
Last updated: 13 April 2026
Flow Studio MCP uses a multi-step authentication flow. No step gives Flow Studio direct access to your Microsoft credentials.
Flow Studio stores two types of tokens:
| Token | Storage | Lifetime |
|---|---|---|
| MCP API key | Derived on demand; not persisted at rest | Does not expire; revocable from dashboard |
| Microsoft refresh token | Encrypted at rest in Azure Storage | Until consent is revoked |
Every MCP tool call is a pass-through to the Power Automate API. We do not store flow definitions, run data, or action payloads. Requests are logged for usage metering only (see Log Contents below).
Pro+ automatically scans environment and connection inventories. Flow-level data (including trigger and action definitions, run statistics, and governance metadata) is only cached after you explicitly opt in to monitoring on a per-flow basis. We do not cache runtime payloads or connector credentials. On cancellation, API access is revoked immediately. We do not currently apply automatic time-based deletion. Cached data is deleted on request or when the account is closed.
We log tool name, timestamp, user identifier, and status for usage metering and operational monitoring.
Not logged: flow definitions, action payloads, connection secrets, or run output data.
Logs are retained while your account is active and deleted on request.
You can revoke Flow Studio's access at any time using either method:
If you discover a vulnerability or suspect a security incident, please contact us immediately:
Email: [email protected]
Subject line: [SECURITY] followed by a description of the issue
We aim to acknowledge security reports within 24 hours and provide a resolution timeline within 72 hours.