Portal Walkthrough: Control 1.1 - Restrict Agent Publishing by Authorization
Last Updated: February 2026 Portal: Power Platform Admin Center, Microsoft Entra Admin Center Estimated Time: 15-30 minutes
Prerequisites
- Power Platform Admin role assigned
- Access to Power Platform Admin Center
- Access to Microsoft Entra Admin Center
- Security groups configured in Microsoft Entra ID for maker management
- Control 2.1: Managed Environments enabled (recommended)
Step-by-Step Configuration
Step 0 (Recommended): Establish Release Gates and Separation of Duties
Use environment separation to enforce authorization as a technical control (not just policy):
- Create at least DEV/UAT/PROD environments (all in US regions).
- Assign roles so that:
- Makers can create/edit only in DEV (and optionally UAT).
- Publishers/Release Managers (small group) can publish to production channels in PROD.
- Compliance approvers cannot publish; they approve via workflow/tickets.
- Enforce "no direct publish to PROD" by ensuring unauthorized users do not have maker/admin rights in PROD.
This release-gate model is what makes "restrict publishing by authorization" auditable.
Step 1: Create Security Groups for Authorized Makers
- Sign in to the Microsoft Entra Admin Center (https://entra.microsoft.com)
- Navigate to Identity > Groups > All groups
- Select New group
- Configure the group:
- Group type: Security
- Group name:
FSI-Agent-Makers-TeamorFSI-Agent-Makers-Enterprise - Group description:
Authorized makers for team/enterprise agent development - Membership type: Assigned (for strict control) or Dynamic (for automation)
- Add authorized users as members
- Select Create
Create additional security groups to support segregation of duties and release gates:
FSI-Agent-Publishers-Prod(small, named individuals only)FSI-Agent-Approvers-Compliance(approvers only; no maker rights required)FSI-Agent-Admins-Platform(Power Platform/Dataverse admins)
Step 2: Configure Environment Security Roles
- Sign in to the Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
- Navigate to Manage > Environments
- Select the target environment
- Select Settings > Users + permissions > Security roles
- Review and configure roles:
- Environment Maker: Can create apps and flows (assign to authorized makers only)
- Basic User: Can run apps but not create (for end users)
- Dataverse System Admin: Full control (limit to admins only)
- Remove Environment Maker role from unauthorized users
Recommended minimum assignments by environment:
| Environment | FSI-Agent-Makers-* | FSI-Agent-Publishers-Prod | FSI-Agent-Admins-Platform | All Other Users |
|---|---|---|---|---|
| DEV | Environment Maker | - | Dataverse System Admin | - |
| UAT | (optional) Environment Maker | - | Dataverse System Admin | - |
| PROD | - | Environment Maker | Dataverse System Admin | Basic User only |
Step 3: Restrict Copilot Studio Access
- In Power Platform Admin Center, select the environment
- Navigate to Settings > Features
- Configure the following:
- Who can create and edit Copilots: Select Only specific security groups
- Add the FSI-Agent-Makers security group(s)
- Select Save
Hardening notes:
- Apply this setting in each environment where Copilot Studio is enabled.
- In PROD, prefer restricting creation/editing to
FSI-Agent-Publishers-Prod(or a dedicated production maker group) rather than broad maker groups.
Step 4: Configure Maker Sharing Restrictions (Team/Enterprise)
- In Power Platform Admin Center, navigate to Manage > Environments
- Select your environment > ... (ellipsis) > Enable Managed Environments (if not already)
- Configure Limit sharing:
- For team collaboration: Exclude Sharing to Security Groups
- For enterprise managed: Do not allow sharing (strictest)
- This prevents unauthorized distribution of agents
Step 5: Implement Approval Workflow (Team/Enterprise)
For collaborative and enterprise-managed environments, implement a formal approval process:
- Create Approval SharePoint List:
- Columns: Agent Name, Creator, Environment, Governance Tier, Approval Status, Approver, Date
-
Configure permissions for Compliance team review
-
Create Power Automate Approval Flow (optional automation):
- Trigger: When agent is ready for production
- Action: Send approval to designated approvers
-
Outcome: Update registry and notify creator
-
Document Approval Requirements:
- Team collaboration: Manager + Compliance acknowledgment
- Enterprise managed: Governance Committee + Legal review + Change Advisory Board
Release Gates (evidence-grade):
| Gate | Purpose | Artifacts |
|---|---|---|
| Gate A | Design & Data Review | Agent purpose, data classification, connectors list |
| Gate B | Security Review | DLP/connector policy confirmation, least-privilege review |
| Gate C | Testing/UAT | Functional testing evidence, user acceptance sign-off |
| Gate D | Production Publish | Approval record + change ticket ID |
Configuration by Governance Level
| Setting | Baseline (Personal) | Recommended (Team) | Regulated (Enterprise) |
|---|---|---|---|
| Security groups | Optional | Required | Required + approval |
| Environment Maker role | Default access | Restricted to group | Restricted + logged |
| Copilot Studio access | All users | Authorized groups | Authorized + reviewed |
| Sharing restrictions | None | Exclude sharing to groups | No sharing allowed |
| Approval workflow | None | Manager approval | Governance committee |
| Publishing audit | Basic | Enhanced | Complete with retention |
Microsoft 365 Integrated Surfaces
If your organization exposes Copilot Studio agents through Microsoft 365 integrated surfaces (Microsoft Teams or Microsoft 365 publish targets):
- Only allow publishing to broad channels from the PROD environment.
- Restrict PROD maker/publishing rights to
FSI-Agent-Publishers-Prod. - If Teams distribution is used, ensure only designated administrators can manage org-wide availability.
- Require a change ticket/approval record for any publish that makes an agent broadly discoverable.
Evidence expectation: An auditor should be able to trace a publish event in audit logs back to an approved change record and to a user's membership in FSI-Agent-Publishers-Prod at the time of publish.
Agent and Tenant Configuration
Step 6: Configure Agent-Level Authentication (Copilot Studio)
For each Copilot Studio agent, configure authentication settings to prevent unauthorized or anonymous interactions:
- Open Copilot Studio (https://copilotstudio.microsoft.com)
- Navigate to Agents and select the target agent
- Go to Settings (right side of the agent header) > Security
- Configure authentication:
- Change authentication from "No Authentication" to "Authenticate with Microsoft" (recommended for internal agents) or "Authenticate Manually" (for OAuth-based scenarios)
- If using "Authenticate Manually," enable "Require users to sign in" to prevent anonymous interactions
- Set authentication enforcement timing:
- Enable "Require users to sign in" to enforce authentication at the start of every session
- Do not use "As Needed" — this allows unauthenticated session starts that create audit log gaps
- Select Save
Repeat for every agent in Zone 2 and Zone 3 environments.
Step 7: Restrict Agent Sharing Scope (Copilot Studio)
Automated Detection: Unrestricted Agent Sharing Detector
For continuous automated detection of agents with overly permissive sharing configurations, deploy the Unrestricted Agent Sharing Detector (UASD). UASD scans all agents for organization-wide sharing, public internet links, unapproved groups, excessive individual shares, and cross-tenant access — with automated remediation and exception management.
- In Copilot Studio, select the target agent
- Navigate to Channels > Share Settings
- Verify the agent is not shared with:
- "Anyone" (public access)
- "Any (multi-tenant)" (cross-tenant access)
- Restrict sharing to:
- Copilot Readers (for limited general access to low-risk agents)
- Specific Security Groups (for restricted access based on role)
- Document exceptions for any agents intentionally shared broadly (requires risk acceptance)
Step 8: Control AI-Featured Agent Publishing (Tenant Level)
- Sign in to Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
- Navigate to Manage > Tenant Settings
- Locate "Publish bots with AI features"
- Set to Disabled until governance review confirms AI feature controls are in place
- Select Save
Step 9: Block Unapproved Shared Agents (M365 Admin Center)
- Sign in to M365 Admin Center (https://admin.microsoft.com)
- Navigate to Copilot > Agents & connectors > Agent Inventory
- Review all agents listed in the inventory
- For any agent that has not been through the approval workflow, select Block
- Document blocking decisions and notify agent owners
Validation
After completing these steps, verify:
- Security groups created in Entra ID with correct membership
- Environment Maker role restricted to authorized groups only
- Copilot Studio access restricted to specific security groups
- Managed Environment enabled with sharing limits configured
- Unauthorized users cannot create/publish agents (test with non-member account)
- All agents have authentication enabled (not "No Authentication")
- Agents using manual authentication have "Require users to sign in" enabled
- No agents are shared with unrestricted access ("Anyone" or "Any multi-tenant")
- "Publish bots with AI features" is disabled at tenant level
- Unapproved agents are blocked in M365 Admin Center Agent Inventory
Back to Control 1.1 | PowerShell Setup | Verification Testing | Troubleshooting
Updated: February 2026 | Version: v1.3 | Classification: Portal Walkthrough