How FlowStudio MCP protects your data and your tenants.
Last updated: 27 February 2026
FlowStudio MCP uses a multi-step authentication flow. No step gives FlowStudio direct access to your Microsoft credentials.
Flows.Read.All, Flows.Manage.All, Activity.Read.All, and User (PowerApps). No mailbox, calendar, or file scopes are requested.x-api-key (not Bearer) with every MCP request.FlowStudio stores two types of tokens:
| Token | Storage | Lifetime |
|---|---|---|
| MCP API key (JWT) | Derived on demand from TOKEN_SECRET; not persisted |
30 days (re-issuable) |
| Microsoft refresh token | Encrypted at rest; planned migration to Azure Key Vault | Until consent is revoked |
Every MCP tool call is a pass-through to the Power Automate API. We do not store flow definitions, run data, or action payloads. Requests are logged for usage metering only (see Log Contents below).
Team tier caches flow metadata, run statistics, governance tags, and connection inventories in our database. This cached data is used to power the list_store_* / get_store_* tools. It does not include flow action source code or runtime payloads. Cached data is deleted within 30 days of subscription cancellation.
Server logs record the following for operational and usage-metering purposes:
list_live_flows)Not logged: flow definitions, action payloads, connection secrets, run output data, bearer tokens.
Logs are retained for 90 days in Azure Application Insights and automatically purged thereafter.
You can revoke FlowStudio's access at any time using either method:
If you discover a vulnerability or suspect a security incident, please contact us immediately:
Email: [email protected]
Subject line: [SECURITY] — description of issue
We aim to acknowledge security reports within 24 hours and provide a resolution timeline within 72 hours.