Skip to content

Portal Walkthrough: Control 1.18 - Application-Level Authorization and RBAC

Last Updated: January 2026 Portal: Power Platform Admin Center, Microsoft Entra Admin Center Estimated Time: 3-5 hours

Prerequisites

  • Power Platform Admin role
  • Entra Global Admin or Privileged Role Admin
  • Dataverse System Admin for security role creation

Step-by-Step Configuration

Step 1: Create Security Groups

  1. Open Microsoft Entra Admin Center
  2. Navigate to Groups > All groups
  3. Create security groups:
  4. SG-PowerPlatform-Admins-Prod
  5. SG-CopilotStudio-Makers-Prod
  6. SG-CopilotStudio-Viewers-Prod
  7. SG-CopilotStudio-Testers-Prod

Step 2: Create Custom Dataverse Security Roles

  1. Open Power Platform Admin Center
  2. Select environment > Settings > Users + permissions > Security roles
  3. Create custom roles:

FSI - Agent Publisher: - Bot: Create, Read, Write, Delete, Append, Append To - Bot Component: Create, Read, Write, Delete - Environment: Read

FSI - Agent Viewer: - Bot: Read - Bot Component: Read - Environment: Read

FSI - Agent Tester: - Bot: Read, Write - Bot Component: Read - Environment: Read

Step 3: Assign Roles to Security Groups

  1. In Power Platform Admin Center
  2. Select environment > Settings > Users + permissions > Teams
  3. Create teams linked to security groups
  4. Assign security roles to teams

Step 4: Configure Privileged Identity Management

  1. Open Microsoft Entra Admin Center
  2. Navigate to Identity governance > Privileged Identity Management
  3. Select Microsoft Entra roles > Roles
  4. Configure PIM for Power Platform Admin:
  5. Maximum activation duration: 4 hours
  6. Require approval: Yes (CISO/Security Lead)
  7. Require MFA on activation: Yes

Step 5: Configure Column-Level Security

  1. In Power Platform Admin Center > Environment > Settings
  2. Navigate to Data management > Field security profiles
  3. Create profile: FSI-SensitiveFields
  4. Add sensitive columns (SSN, Account Balance, Credit Score)
  5. Assign allowed roles/users

Step 6: Set Up Access Reviews

  1. Open Microsoft Entra Admin Center
  2. Navigate to Identity governance > Access reviews
  3. Create review for each security group:
  4. Frequency: Quarterly (Zone 2/3), Annual (Zone 1)
  5. Reviewers: Group owners
  6. Auto-remove on non-response: Yes

Configuration by Governance Level

Setting Baseline (Zone 1) Recommended (Zone 2) Regulated (Zone 3)
Role Assignment Standard roles Group-based custom Least-privilege custom
Access Review Annual Semi-annual Quarterly
PIM Not required Admin roles All privileged roles
Approval Self-service Manager Multi-level
Column Security None Sensitive fields All PII/NPI fields

  1. Open Copilot Studio (https://copilotstudio.microsoft.com)
  2. Navigate to Agents and select each agent
  3. Go to Actions and locate each configured action
  4. For every action, enable "Ask the user before running this action"
  5. Where available, set "How do you want to ask the user?" to "You create the message" and configure a clear, human-written description of what the action will do
  6. Repeat for all agents in Zone 2 and Zone 3 environments

Step 8: Configure Connected Agent Governance

  1. In Copilot Studio, select each agent
  2. Navigate to Settings > under Connected Agents (Preview)
  3. Locate the toggle "Let other agents connect to and use this one"
  4. Set to Disabled by default
  5. Enable only with:
  6. Documented business justification
  7. Cross-agent data handling review
  8. Compliance officer sign-off
  9. Document all approved inter-agent connections and review quarterly

Step 9: Review Environment Admin Roles

  1. Sign in to Power Platform Admin Center (https://admin.powerplatform.microsoft.com)
  2. Navigate to Environments > select the target environment > Settings > Users + Permissions > Users
  3. Review all users with System Administrator role
  4. For any assignment that is not justified, select the user > Manage Roles > remove System Administrator
  5. Ensure fewer than 10 administrators per environment
  6. Document all admin role assignments with business justification

Validation

After completing these steps, verify:

  • Security groups created and populated
  • Custom security roles assigned to groups
  • PIM configured for admin roles
  • Access reviews scheduled
  • Column-level security enforced
  • All agent actions have "Ask the user before running this action" enabled (Copilot Studio > Agent > Actions)
  • Connected agent access disabled for all agents unless explicitly approved (Copilot Studio > Agent > Settings > Connected Agents)
  • Admin count is below 10 per environment (PPAC > Environment > Users + Permissions)

Back to Control 1.18 | PowerShell Setup | Verification Testing | Troubleshooting


Updated: February 2026 | Version: v1.2 | Classification: Portal Walkthrough