Skip to content

Portal Walkthrough: Control 1.1 - Restrict Agent Publishing by Authorization

Last Updated: February 2026 Portal: Power Platform Admin Center, Microsoft Entra Admin Center Estimated Time: 15-30 minutes

Prerequisites


Step-by-Step Configuration

Use environment separation to enforce authorization as a technical control (not just policy):

  1. Create at least DEV/UAT/PROD environments (all in US regions).
  2. Assign roles so that:
  3. Makers can create/edit only in DEV (and optionally UAT).
  4. Publishers/Release Managers (small group) can publish to production channels in PROD.
  5. Compliance approvers cannot publish; they approve via workflow/tickets.
  6. Enforce "no direct publish to PROD" by ensuring unauthorized users do not have maker/admin rights in PROD.

This release-gate model is what makes "restrict publishing by authorization" auditable.

Step 1: Create Security Groups for Authorized Makers

  1. Sign in to the Microsoft Entra Admin Center (https://entra.microsoft.com)
  2. Navigate to Identity > Groups > All groups
  3. Select New group
  4. Configure the group:
  5. Group type: Security
  6. Group name: FSI-Agent-Makers-Team or FSI-Agent-Makers-Enterprise
  7. Group description: Authorized makers for team/enterprise agent development
  8. Membership type: Assigned (for strict control) or Dynamic (for automation)
  9. Add authorized users as members
  10. Select Create

Create additional security groups to support segregation of duties and release gates:

  • FSI-Agent-Publishers-Prod (small, named individuals only)
  • FSI-Agent-Approvers-Compliance (approvers only; no maker rights required)
  • FSI-Agent-Admins-Platform (Power Platform/Dataverse admins)

Step 2: Configure Environment Security Roles

  1. Sign in to the Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
  2. Navigate to Manage > Environments
  3. Select the target environment
  4. Select Settings > Users + permissions > Security roles
  5. Review and configure roles:
  6. Environment Maker: Can create apps and flows (assign to authorized makers only)
  7. Basic User: Can run apps but not create (for end users)
  8. Dataverse System Admin: Full control (limit to admins only)
  9. Remove Environment Maker role from unauthorized users

Recommended minimum assignments by environment:

Environment FSI-Agent-Makers-* FSI-Agent-Publishers-Prod FSI-Agent-Admins-Platform All Other Users
DEV Environment Maker - Dataverse System Admin -
UAT (optional) Environment Maker - Dataverse System Admin -
PROD - Environment Maker Dataverse System Admin Basic User only

Step 3: Restrict Copilot Studio Access

  1. In Power Platform Admin Center, select the environment
  2. Navigate to Settings > Features
  3. Configure the following:
  4. Who can create and edit Copilots: Select Only specific security groups
  5. Add the FSI-Agent-Makers security group(s)
  6. Select Save

Hardening notes:

  • Apply this setting in each environment where Copilot Studio is enabled.
  • In PROD, prefer restricting creation/editing to FSI-Agent-Publishers-Prod (or a dedicated production maker group) rather than broad maker groups.

Step 4: Configure Maker Sharing Restrictions (Team/Enterprise)

  1. In Power Platform Admin Center, navigate to Manage > Environments
  2. Select your environment > ... (ellipsis) > Enable Managed Environments (if not already)
  3. Configure Limit sharing:
  4. For team collaboration: Exclude Sharing to Security Groups
  5. For enterprise managed: Do not allow sharing (strictest)
  6. This prevents unauthorized distribution of agents

Step 5: Implement Approval Workflow (Team/Enterprise)

For collaborative and enterprise-managed environments, implement a formal approval process:

  1. Create Approval SharePoint List:
  2. Columns: Agent Name, Creator, Environment, Governance Tier, Approval Status, Approver, Date
  3. Configure permissions for Compliance team review

  4. Create Power Automate Approval Flow (optional automation):

  5. Trigger: When agent is ready for production
  6. Action: Send approval to designated approvers
  7. Outcome: Update registry and notify creator

  8. Document Approval Requirements:

  9. Team collaboration: Manager + Compliance acknowledgment
  10. Enterprise managed: Governance Committee + Legal review + Change Advisory Board

Release Gates (evidence-grade):

Gate Purpose Artifacts
Gate A Design & Data Review Agent purpose, data classification, connectors list
Gate B Security Review DLP/connector policy confirmation, least-privilege review
Gate C Testing/UAT Functional testing evidence, user acceptance sign-off
Gate D Production Publish Approval record + change ticket ID

Configuration by Governance Level

Setting Baseline (Personal) Recommended (Team) Regulated (Enterprise)
Security groups Optional Required Required + approval
Environment Maker role Default access Restricted to group Restricted + logged
Copilot Studio access All users Authorized groups Authorized + reviewed
Sharing restrictions None Exclude sharing to groups No sharing allowed
Approval workflow None Manager approval Governance committee
Publishing audit Basic Enhanced Complete with retention

Microsoft 365 Integrated Surfaces

If your organization exposes Copilot Studio agents through Microsoft 365 integrated surfaces (Microsoft Teams or Microsoft 365 publish targets):

  1. Only allow publishing to broad channels from the PROD environment.
  2. Restrict PROD maker/publishing rights to FSI-Agent-Publishers-Prod.
  3. If Teams distribution is used, ensure only designated administrators can manage org-wide availability.
  4. Require a change ticket/approval record for any publish that makes an agent broadly discoverable.

Evidence expectation: An auditor should be able to trace a publish event in audit logs back to an approved change record and to a user's membership in FSI-Agent-Publishers-Prod at the time of publish.


Agent and Tenant Configuration

Step 6: Configure Agent-Level Authentication (Copilot Studio)

For each Copilot Studio agent, configure authentication settings to prevent unauthorized or anonymous interactions:

  1. Open Copilot Studio (https://copilotstudio.microsoft.com)
  2. Navigate to Agents and select the target agent
  3. Go to Settings (right side of the agent header) > Security
  4. Configure authentication:
  5. Change authentication from "No Authentication" to "Authenticate with Microsoft" (recommended for internal agents) or "Authenticate Manually" (for OAuth-based scenarios)
  6. If using "Authenticate Manually," enable "Require users to sign in" to prevent anonymous interactions
  7. Set authentication enforcement timing:
  8. Enable "Require users to sign in" to enforce authentication at the start of every session
  9. Do not use "As Needed" — this allows unauthenticated session starts that create audit log gaps
  10. Select Save

Repeat for every agent in Zone 2 and Zone 3 environments.

Step 7: Restrict Agent Sharing Scope (Copilot Studio)

Automated Detection: Unrestricted Agent Sharing Detector

For continuous automated detection of agents with overly permissive sharing configurations, deploy the Unrestricted Agent Sharing Detector (UASD). UASD scans all agents for organization-wide sharing, public internet links, unapproved groups, excessive individual shares, and cross-tenant access — with automated remediation and exception management.

  1. In Copilot Studio, select the target agent
  2. Navigate to Channels > Share Settings
  3. Verify the agent is not shared with:
  4. "Anyone" (public access)
  5. "Any (multi-tenant)" (cross-tenant access)
  6. Restrict sharing to:
  7. Copilot Readers (for limited general access to low-risk agents)
  8. Specific Security Groups (for restricted access based on role)
  9. Document exceptions for any agents intentionally shared broadly (requires risk acceptance)
  1. Sign in to Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
  2. Navigate to Manage > Tenant Settings
  3. Locate "Publish bots with AI features"
  4. Set to Disabled until governance review confirms AI feature controls are in place
  5. Select Save

Step 9: Block Unapproved Shared Agents (M365 Admin Center)

  1. Sign in to M365 Admin Center (https://admin.microsoft.com)
  2. Navigate to Copilot > Agents & connectors > Agent Inventory
  3. Review all agents listed in the inventory
  4. For any agent that has not been through the approval workflow, select Block
  5. Document blocking decisions and notify agent owners

Validation

After completing these steps, verify:

  • Security groups created in Entra ID with correct membership
  • Environment Maker role restricted to authorized groups only
  • Copilot Studio access restricted to specific security groups
  • Managed Environment enabled with sharing limits configured
  • Unauthorized users cannot create/publish agents (test with non-member account)
  • All agents have authentication enabled (not "No Authentication")
  • Agents using manual authentication have "Require users to sign in" enabled
  • No agents are shared with unrestricted access ("Anyone" or "Any multi-tenant")
  • "Publish bots with AI features" is disabled at tenant level
  • Unapproved agents are blocked in M365 Admin Center Agent Inventory

Back to Control 1.1 | PowerShell Setup | Verification Testing | Troubleshooting


Updated: February 2026 | Version: v1.3 | Classification: Portal Walkthrough