Mastering new features in Power Platform: A New Era of Governance š“āā ļø
- Tristan Danic
- Sep 24
- 3 min read

Data protection and privacy
In the ever-expanding sea of low-code development, governance is your compass š§.
Microsoftās new Advanced Connector Policies (Preview) bring a fresh wind to Power Platform governance, giving admins the tools to control connector usage with surgical precision.
āļø What Are Advanced Connector Policies?
Advanced Connector Policies allow Power Platform admins to define fine-grained rules that go beyond traditional DLP policies.
Instead of just blocking or allowing entire connectors, you can now:
ā Allow or block specific actions within a connector (for example: only allow āReadā operations)
š Apply policies to environment groups, not just individual environments
š Combine with existing DLP policies for layered governance
This means you can, for example, allow users to read data from SharePoint but block them from creating or deleting items all within the same connector! š§
š§± Why It Matters
Traditional DLP policies were like using a cannon to swat a fly šŖ° (effective, but not always precise).
With Advanced Connector Policies, you can:
š”ļø Reduce risk of data exfiltration
š§Ŗ Enable safe experimentation in dev environments
š§° Empower makers without compromising compliance
š§Ŗ How to Get Started
Navigate to the Power Platform Admin Center
Go to Data Policies > Advanced Connector Policies (Preview)
Create a new policy and define:
Environment group(s)
Connector(s)
Allowed or blocked actions
š” Pro tip: Combine this with Connector Action Classification to understand what each action does before allowing it.
š¦ How does it work ? š
š§ Final Thoughts
Advanced Connector Policies are a game-changer for Power Platform governance.
They give you the granularity, flexibility, and control needed to scale low-code safely across your organization.
So hoist the sails, set your governance compass, and steer your Power Platform ship with confidence! š“āā ļø
āļø Fortify Your Power Platform Fortress: New Identity & Access Management Features (Preview)
Introduction
In the ever-expanding archipelago of Power Platform environments, managing who can do what and where is no longer optional.
Microsoft has launched a fleet of new Identity and Access Management (IAM) features (in preview) to help admins steer their governance ship with precision and confidence š§.
Letās hoist the sails and explore these new tools that give you granular control over access, authentication, and privileges across your Power Platform estate āµ
šļø App Access Control (Preview)
This feature lets you restrict access to specific apps based on user identity, group membership, or other conditions. Think of it as a gatekeeper for your most sensitive apps.
š Benefits:
Prevent unauthorised access to critical apps
Enforce conditional access policies
Tailor app visibility based on roles or departments
Perfect for organisations with tiered access models or sensitive business logic embedded in apps.
š Administrator Privileges (Preview)
Not all admins need full control of the ship! This feature introduces role-based admin privileges, allowing you to assign limited admin rights based on responsibilities.
āļø Use cases:
Assign environment-specific admins
Limit access to only certain admin functions
Reduce risk of accidental changes or overreach
This is a major win for delegated governance and least privilege access models.
š§ Guest Access (Preview)
Ahoy, external collaborators! With Guest Access, you can now securely onboard external users (e.g., partners, contractors) into your Power Platform environments.
š”ļø Key capabilities:
Control what guests can see and do
Apply DLP and IAM policies to guests
Monitor guest activity
This feature is ideal for cross-org collaboration without compromising security.
š Authentication for Agents (Preview)
Agents (like bots or services) now get their own authentication model, separate from user identities. This means service-to-service communication can be secured using managed identities or app registrations.
ā Benefits:
No more shared credentials
Improved auditability
Seamless integration with Azure AD
This is a must-have for automated workflows and enterprise-grade integrations.
š°ļø Agent Access Points (Preview)
This feature allows you to define where and how agents can access resources. Think of it as a navigation chart for your bots and services.
š§ Capabilities:
Restrict agent access to specific endpoints
Monitor and log agent activity
Apply conditional access rules
Together with Authentication for Agents, this ensures your automated systems are both powerful and secure.
š¦ How does it work ? š
š“āā ļø Final Thoughts
These new IAM features are a treasure chest for Power Platform admins looking to tighten security, delegate control, and enable collaboration without losing sight of governance.
Whether you're managing a small crew or a global fleet of makers, these tools help you navigate the seas of access control with confidence.
š Learn more: Identity and access management - Power Platform | Microsoft Learn
#PowerPlatform #IAM #Governance #Security #CaptainGreybeard #LowCode #AdminLife š“āā ļø
Comments