Skip to content

Conversation

@Tslilon
Copy link

@Tslilon Tslilon commented Dec 29, 2025

Hybrid connector for accessing procedural knowledge and workflows.

Publisher: Diligent4


  • I attest that the connector doesn't exist on the Power Platform today.
  • I attest that the connector works and I verified by deploying and testing all the operations.
  • I attest that I have added detailed descriptions for all operations and parameters in the swagger file.
  • I attest that I have added response schemas to my actions.
  • I validated the swagger file, apiDefinition.swagger.json, by running paconn validate command.
  • I confirm that I am not submitting a connector icon (Independent Publisher requirement).

Independent Publisher Attestations:

  • I have named this PR "Flingoos (Independent Publisher)"
  • I have attached screenshots of 3 unique operations working in a Flow (see below).
  • I have attached a screenshot from the Test operations section (see below).
  • I have provided detailed steps on how to create the Azure AD app in the readme.md (since we use BYOA/OAuth).

Proof of Functionality

1. Flow with 3 Unique Operations:
flow-designer-view

2. Successful Flow Run:
flow-run-success

3. Test Operation (Custom Connector UI):
test-tab-success

@Tslilon Tslilon requested a review from a team as a code owner December 29, 2025 18:58
@Tslilon
Copy link
Author

Tslilon commented Dec 29, 2025

@microsoft-github-policy-service agree company="Diligent4"

Hybrid connector for accessing procedural knowledge and workflows.

REST API endpoints for Power Automate:
- GET /api/workflows - List workflows
- GET /api/workflows/{id} - Get workflow details
- GET /api/workflows/search - Semantic search
- GET /api/projects - List projects
- GET /api/projects/{id} - Get project details

MCP endpoint for Copilot Studio:
- POST /mcp - Model Context Protocol (Streamable HTTP)

Authentication: Azure AD OAuth (BYOA model - users create their own app registration)

Publisher: Diligent4
@Tslilon Tslilon force-pushed the flingoos-initial-submit branch from f66a75a to e1d3f91 Compare December 29, 2025 19:05
@vmanoharas
Copy link
Contributor

Hi @Tslilon,

Thank you for submitting connector. Our IP connector certification process has been changed. Please refer the below link and upload the connector package.

https://learn.microsoft.com/en-us/connectors/custom-connectors/certification-submission-ip#step-5-onevet-verification

Additionally, we have contacted through email to the id provided in the swagger file for Onevet verification. Please fill the necessary details.

- Replace separate /api/workflows and /api/projects with unified /api/contexts
- Add new ModifyContext operation (PATCH /api/contexts/{id})
- Update response schemas for context-first design
- Update documentation for new operations
@Tslilon
Copy link
Author

Tslilon commented Jan 10, 2026

Hi @vmanoharas , Thanks a lot!

I have located the verification email in my Google Workspace Admin logs, but it was bounced/rejected by the server due to a DMARC authentication failure on your sender's side ([email protected]).

The specific error is: "550-5.7.26 Unauthenticated email from microsoft.com is not accepted due to domain's DMARC policy."

Because of this error, the email never reached my inbox. Could you please check the sender configuration or resend the verification link from a standard address that passes DMARC checks?

Alternatively, I can also receive emails to [email protected] or [email protected]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants