Portal Walkthrough: Control 2.15 - Environment Routing and Auto-Provisioning
Last Updated: January 2026 Portal: Power Platform Admin Center Estimated Time: 30-60 minutes
Prerequisites
- Power Platform Admin role assigned
- Access to Power Platform Admin Center
- Environment groups defined and created
- Routing rules documented and approved
- Default environment governance strategy determined
Step-by-Step Configuration
Step 1: Access Environment Groups
- Open Power Platform Admin Center
- Navigate to Environments > Environment groups
- Review existing groups or create new ones
Step 2: Create Environment Group
- Click + New group
- Enter group details:
- Name: e.g., "FSI-Production-US"
- Description: Purpose and governance tier
- Click Save
Step 3: Add Environments to Group
- Open the environment group
- Click Add environments
- Select environments to include:
- Only add environments in the same governance tier
- Ensure all are Managed Environments (Control 2.1)
- Click Add
Step 4: Configure Environment Routing Rules
- In the environment group, select Rules
- Click + New rule
- Configure rule conditions:
Rule Types:
| Rule Type | Use Case |
|---|---|
| Security group | Route users by AD group membership |
| Domain | Route by email domain |
| Geographic | Route by user location |
| Custom | Advanced conditions |
- Set rule priority (lower number = higher priority)
- Click Save
Step 5: Configure Routing Priority
- Review all rules in the group
- Drag to reorder by priority
- Ensure most specific rules are highest priority
- Verify fallback behavior (default environment)
Step 6: Test Routing Configuration
- Sign in as a test user matching a routing rule
- Navigate to Power Apps or Copilot Studio
- Create a new app/agent
- Verify routed to expected environment
Configuration by Governance Level
| Setting | Baseline (Zone 1) | Recommended (Zone 2) | Regulated (Zone 3) |
|---|---|---|---|
| Environment Groups | Optional | Recommended | Required |
| Routing Rules | Basic (domain) | Security group based | Role-based + approvals |
| Default Environment | Developer | Sandbox | No direct access |
| Rule Documentation | Optional | Recommended | Mandatory with audit |
| Change Control | Informal | Documented | Formal approval |
FSI Example Configuration
Environment Group: FSI-Regulated-Production
Description: "Enterprise-managed production environments for regulated agents"
Environments:
- FSI-Wealth-Management-Prod
- FSI-Client-Services-Prod
- FSI-Compliance-Prod
Routing Rules:
1. Rule: "Wealth Management Team"
Type: Security Group
Group: sg-wealth-management-makers
Target: FSI-Wealth-Management-Prod
Priority: 1
2. Rule: "Client Services Team"
Type: Security Group
Group: sg-client-services-makers
Target: FSI-Client-Services-Prod
Priority: 2
3. Rule: "Compliance Analysts"
Type: Security Group
Group: sg-compliance-makers
Target: FSI-Compliance-Prod
Priority: 3
Default Behavior: Route to sandbox if no rule matches
Warning: Users in no group are redirected to non-production
Important Warning: Default Environment Fallback
CRITICAL: Users who don't match any routing rule will be directed to the default environment. Ensure your default environment has appropriate governance controls or consider blocking unrouted users.
FSI Recommendation: Configure the default environment as a sandbox with strict DLP policies, or implement a "deny by default" approach where users must be explicitly granted access.
Validation
After completing these steps, verify:
- Environment group is created with correct environments
- Routing rules target appropriate environments
- Rule priorities are correctly ordered
- Test users are routed as expected
- Default fallback behavior is acceptable
- Documentation is complete and approved
Back to Control 2.15 | PowerShell Setup | Verification Testing | Troubleshooting