Use access control features
Access controls are a fundamental aspect of securing modern IT environments, particularly within cloud-based platforms such as Azure Virtual Networks and Power Platform. These controls are designed to ensure that only authorized users can access specific resources by protecting sensitive data and maintaining the integrity of organizational systems.
Tenant isolation
Tenant isolation lets Power Platform administrators govern the movement of tenant data from Microsoft Entra-authorized data sources to and from their tenant. Learn more in Cross-tenant inbound and outbound restrictions.
Data policies
Setting up data policies at the environment or tenant-level acts as guardrails to help reduce the risk of users from unintentionally exposing organizational data. Learn more in Data policies.
Note
The recommendation for data policies is triggered when there is no tenant-level policy defined. At this time, any environment-scoped data policies are not considered when performing the security assessment for the tenant.
Environment security groups
Setting up security groups helps control which licensed users can access environments. Learn more in Control user access to environments: security groups and licenses.
Manage sharing
This feature applies to Managed Environments only. Sharing gives administrators the ability to control who and what their makers can share—like canvas apps, cloud flows, and copilots—with other individual users and security groups, which ensures that sensitive information is available only to authorized users, reducing the risk of data breaches and misuse. Learn more in Limit sharing.
App access control (preview)
This feature applies to Managed Environments only. Prevent data exfiltration by controlling which apps are allowed and blocked in each environment. Learn more in Control which apps are allowed in your environment.
Guest access (preview)
[This section is prerelease documentation and is subject to change.]
Important
- This is a preview feature.
- Preview features aren’t meant for production use and might have restricted functionality. These features are subject to supplemental terms of use, and are available before an official release so that customers can get early access and provide feedback.
Minimizing the risk of over-sharing is crucial in ensuring data security and compliance within the Power Platform ecosystem. All new Dataverse-backed environments prohibit guest access, ensuring security by default. You can allow guest access for an environment if your business use case requires it. You can also retroactively turn off guest access for existing environments, which blocks connections to resources guests may have already had access to.
Configure guest access
- Sign in to the Power Platform admin center as a system administrator.
- In the navigation pane, select Security.
- In the Secruity section, select Access controls.
- In the Access controls section, select Guest access.
- The Guest access pane appears. Select the environment for which you want to turn off guest access.
- Select Configure guest access.
- Turn on the Turn off guest access option.
- Select Save.
- The Guest access pane is displayed again. Repeat steps 5-8. Close the pane when you're done.
Improve your security score and act on recommendations
Restricting guest access is a pivotal way to improve your tenant’s security posture. You can also take action by directly selecting the Restrict guest user access recommendation from the main security page, or the action center in the Power Platform admin center. After configuring guest access restrictions, your tenant’s security score improves based on the number of environments configured.
Latency considerations
The time it takes to effectively block guest access varies based on the volume of environments and resources within those environments. For the most extreme cases, the latency for full enforcement is 24 hours.
Known limitations
Guest access is a preview feature with more enhancements to come. The following are some known limitations with work in progress to remediate.
- While blocking guest access will prevent any guest from saving and using resources, it may not prevent a guest from accessing a Power Platform maker portal.
- Items made in Copilot Studio may use Graph connectors as knowledge sources from outside of Power Platform, and the information in them may be accessible to guests for now even if guest access is blocked.
Administrator privileges (preview)
[This section is prerelease documentation and is subject to change.]
Important
- This is a preview feature.
- Preview features aren’t meant for production use and might have restricted functionality. These features are subject to supplemental terms of use, and are available before an official release so that customers can get early access and provide feedback.
This feature applies to Managed Environments only. You can improve the security score of your tenant by limiting the number of users who have high privileged, administrative roles in Microsoft Entra ID and Power Platform. This feature allows you to review users who have these privileged roles, review the user list, and remove users who should no longer have privileged access. Learn more in Administer Microsoft Power Platform.
Users with administrative privileges
The Administrative privileges pane provides a proactive recommendation if your tenant has many users with administrative privileges. You can open the recommendation which shows you a list of environments with many users—currently more than 20 users—with the system administrator security role. Select the link below the System administrators column for any listed environment to display the Security roles page. From there, you can select the System administrator security role and select Membership to view a list of users with the role assignment. From the Membership page, you can select users to remove from the role, one user at a time.
Note
Only users assigned to the Global administrator role can remove other users from the Global administrator role.
Known issues
Be aware of the following known issues with the feature:
- The security role Membership page displays only the security roles in the default business unit. Turn off the Display only parent security roles option to list all security roles across all business units.
- After you remove a user from the system administrator role, it takes around 24 hours for the updated admin count to display on the page.