Skip to content

Commit 7d31e4f

Browse files
committed
Merge branch 'main' into tnote
2 parents 785150c + 9e0fec3 commit 7d31e4f

File tree

89 files changed

+895
-338
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+895
-338
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -64,12 +64,6 @@
6464
"branch": "master",
6565
"branch_mapping": {}
6666
},
67-
{
68-
"path_to_root": "msft-shared-content",
69-
"url": "https://github.com/MicrosoftDocs/reusable-content",
70-
"branch": "main",
71-
"branch_mapping": {}
72-
},
7367
{
7468
"path_to_root": "shared-content",
7569
"url": "https://github.com/MicrosoftDocs/powerapps-docs-pr",

power-platform/admin/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -599,7 +599,7 @@
599599
href: analytics-ui-flow.md
600600
- name: Reports
601601
items:
602-
- name: Tenant-level analytics (default)
602+
- name: Tenant-level analytics (preview)
603603
href: tenant-level-analytics.md
604604
- name: Power Apps analytics
605605
href: powerapps-analytics-reports.md

power-platform/admin/about-lockbox.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -138,13 +138,15 @@ In addition, access to Customer Lockbox for Microsoft Power Platform and Dynamic
138138

139139
## Exclusions
140140

141-
Lockbox requests aren't triggered in the following engineering support scenarios:
141+
- Lockbox requests aren't triggered in the following engineering support scenarios:
142142

143-
- Emergency scenarios that fall outside of standard operating procedures, such as a major service outage that requires immediate attention to recover or restore services in unexpected or unpredictable cases. These “break glass” events are rare and, in most instances, don't require any access to customer data to resolve.
143+
- Emergency scenarios that fall outside of standard operating procedures, such as a major service outage that requires immediate attention to recover or restore services in unexpected or unpredictable cases. These “break glass” events are rare and, in most instances, don't require any access to customer data to resolve.
144144

145-
- A Microsoft engineer accesses the underlying platform as part of troubleshooting and is inadvertently exposed to customer data. It's rare that such scenarios would result in access to meaningful quantities of customer data.
145+
- A Microsoft engineer accesses the underlying platform as part of troubleshooting and is inadvertently exposed to customer data. It's rare that such scenarios would result in access to meaningful quantities of customer data.
146146

147-
Customer Lockbox requests are also not triggered by external legal demands for data. For details, refer to the discussion of government requests for data in the [Microsoft Trust Center](https://www.microsoft.com/trust-center/).
147+
- Customer Lockbox requests are also not triggered by external legal demands for data. For details, refer to the discussion of government requests for data in the [Microsoft Trust Center](https://www.microsoft.com/trust-center/).
148+
149+
- Customer Lockbox won't apply to the access and manual review of customer data shared for Copilot AI features. Customer Lockbox will remain enabled for all in-scope data.
148150

149151
## Known issues
150152

power-platform/admin/block-cookie-replay-attack.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Block cookie replay attacks in Dataverse
33
description: Learn how to use IP-based cookie binding to block session hijacking attacks in Dataverse.
4-
ms.date: 01/24/2023
4+
ms.date: 05/17/2023
55
ms.topic: conceptual
66
author: ritesp
7-
ms.reviewer: kvivek
7+
ms.reviewer: sericks
88
ms.author: ritesp
99
ms.subservice: admin
1010
search.audienceType:
@@ -14,7 +14,7 @@ search.audienceType:
1414

1515
Prevent session hijacking exploits in Dataverse with IP address-based cookie binding. Let's say that a malicious user copies a valid session cookie from an authorized computer that has cookie IP binding enabled. The user then tries to use the cookie on a different computer to gain unauthorized access to Dataverse. In real time, Dataverse compares the IP address of the cookie's origin against the IP address of the computer making the request. If the two are different, the attempt is blocked, and an error message is shown.
1616

17-
IP-based cookie binding is available in all environments across all tenants, including government clouds. You can enable this feature in the [Power Platform admin center](https://admin.powerplatform.microsoft.com/).
17+
IP-based cookie binding is available only for [Managed Environments](managed-environment-licensing.md) across all tenants, including government clouds. You can enable this feature in the [Power Platform admin center](https://admin.powerplatform.microsoft.com/).
1818

1919

2020
## Enable IP address-based cookie binding

power-platform/admin/content-security-policy.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: "Content security policy"
33
description: "Use content security policy to prevent clickjacking in Power Apps."
4-
ms.date: 01/31/2023
4+
ms.date: 05/16/2023
55
ms.topic: conceptual
66
author: JesseParsons
77
ms.subservice: admin
88
ms.author: jeparson
9-
ms.reviewer: kvivek
9+
ms.reviewer: sericks
1010
ms.custom: "admin-security"
1111
search.audienceType:
1212
- admin
@@ -40,15 +40,15 @@ To configure CSP, navigate to the [Power Platform admin center](https://admin.po
4040

4141
### Reporting
4242

43-
The "Enable reporting" toggle controls whether model-driven and canvas apps send violation reports. Enabling it requires an endpoint to be specified. Violation reports will be sent to this endpoint regardless of whether CSP is enforced or not (using report-only mode if CSP isn't enforced). For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
43+
The "Enable reporting" toggle controls whether model-driven and canvas apps send violation reports. Enabling it requires an endpoint to be specified. Violation reports are sent to this endpoint regardless of whether CSP is enforced or not (using report-only mode if CSP isn't enforced). For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
4444

4545
![Enabling reporting endpoint](media/csp-reporting.png "Enabling reporting endpoint")
4646

4747
### Enforcement
4848

4949
Enforcement of CSP is controlled independently for model-driven and canvas apps to provide granular control over policies. Use the model-driven/canvas pivot to modify the intended app type.
5050

51-
The "Enforce content security policy" toggle turns on the default policy for enforcement, as specified above, for the given app type. Turning on this toggle will change the behavior of apps in this environment to adhere to the policy. Therefore, the suggested enablement flow would be:
51+
The "Enforce content security policy" toggle turns on the default policy for enforcement, as specified above, for the given app type. Turning on this toggle changes the behavior of apps in this environment to adhere to the policy. Therefore, the suggested enablement flow would be:
5252
1. Enforce on a dev/test environment.
5353
2. Enable report-only mode in production.
5454
3. Enforce in production once no violations are reported.
@@ -68,6 +68,8 @@ For Microsoft Teams integration using the [Dynamics 365 app](/dynamics365/teams-
6868
- `https://teams.microsoft.com/`
6969
- `https://msteamstabintegration.dynamics.com/`
7070

71+
For Dynamics 365 App for Outlook, you must add your Outlook Web App homepage origin to `frame-ancestors`.
72+
7173
### Important considerations
7274
Turning off the default directive and saving with an empty list *turns off the directive completely* and doesn't send it as part of the CSP response header.
7375

@@ -118,7 +120,7 @@ CSP can be configured without using the UI by modifying the following organizati
118120

119121
- [ContentSecurityPolicyConfigurationForCanvas](/powerapps/developer/data-platform/reference/entities/organization#BKMK_ContentSecurityPolicyConfigurationForCanvas) controls the policy for canvas using the same process described in `ContentSecurityPolicyConfiguration` above.
120122

121-
- [ContentSecurityPolicyReportUri](/powerapps/developer/data-platform/reference/entities/organization#BKMK_ContentSecurityPolicyReportUri) controls whether reporting should be used. This setting is used by both model-driven and canvas apps. A valid string will send violation reports to the specified endpoint, using report-only mode if `IsContentSecurityPolicyEnabled`/`IsContentSecurityPolicyEnabledForCanvas` is turned off. An empty string disables reporting. For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
123+
- [ContentSecurityPolicyReportUri](/powerapps/developer/data-platform/reference/entities/organization#BKMK_ContentSecurityPolicyReportUri) controls whether reporting should be used. This setting is used by both model-driven and canvas apps. A valid string sends violation reports to the specified endpoint, using report-only mode if `IsContentSecurityPolicyEnabled`/`IsContentSecurityPolicyEnabledForCanvas` is turned off. An empty string disables reporting. For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
122124

123125
## Configuring CSP without UI
124126
Especially for environments not in the Power Platform admin center such as on-premises configurations, admins may want to configure CSP using scripts to directly modify settings.

power-platform/admin/database-security.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ contributors:
1010
ms.custom: "admin-security"
1111
ms.component: pa-admin
1212
ms.topic: conceptual
13-
ms.date: 05/07/2023
13+
ms.date: 05/16/2023
1414
search.audienceType:
1515
- admin
1616
---
@@ -57,9 +57,10 @@ For users who make apps that connect to the database and need to create or updat
5757
| Environment Maker | Customizations | Can create new resources associated with an environment, including apps, connections, custom APIs, gateways, and flows using Microsoft Power Automate. However, this role doesn't have any privileges to access data within an environment. More information: [Environments overview](./environments-overview.md) <br /> <br />Environment makers can also distribute the apps they build in an environment to other users in your organization. They can share the app with individual users, security groups, or all users in the organization. More information: [Share an app in Power Apps](/powerapps/maker/canvas-apps/share-app) |
5858
| Global Reader | | The [Global Reader](/azure/active-directory/roles/permissions-reference) role is not yet supported in the Power Platform admin center. |
5959
| Office Collaborator | Read (self) | Has Read permission to tables where a record from these tables was shared with the organization. Does not have access to any other core and custom table records. This role is assigned to the Office Collaborators owner team and not to an individual user. |
60-
| Service Reader | Read | Has full Read permission to all entities including custom entities. This is primarily used by backend service that requires reading all entities. |
61-
| Service Writer | Create, Read, Write | Has full Create, Read, and Write permission to all entities including custom entities. This is primarily used by backend service that requires creating and updating records. |
62-
| Support User | Read Customizations, Read Business Management settings | Has full Read permission to customization and business management settings to allow Support staff to troubleshoot environment configuration issues. Does not have access to core records. |
60+
| Service Deleted | Delete | Has full Delete permission to all entities, including custom entities. This is primarily used by the service and requires deleting records in all entities. **This role cannot be assigned to a user or team.** |
61+
| Service Reader | Read | Has full Read permission to all entities, including custom entities. This is primarily used by the service and requires reading all entities. **This role cannot be assigned to a user or team.** |
62+
| Service Writer | Create, Read, Write | Has full Create, Read, and Write permission to all entities, including custom entities. This is primarily used by the service and requires creating and updating records. **This role cannot be assigned to a user or team.** |
63+
| Support User | Read Customizations, Read Business Management settings | Has full Read permission to customization and business management settings, which allow support staff to troubleshoot environment configuration issues. This role does not have access to core records. **This role cannot be assigned to a user or team.** |
6364
| System Administrator | Create, Read, Write, Delete, Customizations, Security Roles | Has full permission to customize or administer the environment, including creating, modifying, and assigning security roles. Can view all data in the environment. More information: [Privileges required for customization](/power-apps/maker/model-driven-apps/privileges-required-customization) |
6465
| System Customizer | Create, Read, Write, Delete, Customizations | Has full permission to customize the environment. Can view all custom table data in the environment. However, users with this role can only view rows (records) that they create in Account, Contact, Activity tables. More information: [Privileges required for customization](/power-apps/maker/model-driven-apps/privileges-required-customization) |
6566

@@ -99,18 +100,20 @@ The following table describes which resources can be authored by each security r
99100
|Resource |Environment Maker |Environment Admin |System Customizer |System Admin |
100101
|---------|---------|---------|---------|---------|
101102
|Canvas app |X |X |X |X |
102-
|Cloud flow |X (non-solution aware) |X |X (solution aware) |X |
103+
|Cloud flow |X (non-solution aware) |X |X |X |
103104
|Connector |X (non-solution aware) |X |X |X |
104-
|Connection |X |X |X |X |
105+
|Connection<sup>*</sup> |X |X |X |X |
105106
|Data gateway |X |X |- |X |
106107
|Dataflow |X |X |- |X |
107108
|Dataverse tables |- |- |X |X |
108109
|Model-driven app |X |- |X |X |
109110
|Solution framework |X |- |X |X |
110-
|<sup>*</sup>Desktop flow |- |- |X |X |
111+
|Desktop flow<sup>**</sup> |- |- |X |X |
111112
|AI Builder |- |- |X |X |
112113

113-
<sup>*</sup>Dataverse for Teams users don’t get access to desktop flows by default. You need to upgrade your environment to full Dataverse capabilities and acquire [Desktop flow license plans](https://powerautomate.microsoft.com/pricing/) in order to use desktop flows.
114+
\*Connections are used in [canvas apps](/power-apps/maker/canvas-apps/add-manage-connections) and [Power Automate](/power-automate/add-manage-connections).
115+
116+
\**Dataverse for Teams users don’t get access to desktop flows by default. You need to upgrade your environment to full Dataverse capabilities and acquire [Desktop flow license plans](https://powerautomate.microsoft.com/pricing/) in order to use desktop flows.
114117

115118
## Assign security roles to users in an environment that has no Dataverse database
116119

power-platform/admin/delete-business-unit.md

Lines changed: 21 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,20 @@
11
---
2-
title: "Delete a business unit from an environment"
3-
description: "Learn how to deactivate and delete a business unit from an environment. Learn about the considerations before taking this irreversible action."
4-
author: jimholtz
5-
2+
title: "Disable and delete a business unit from an environment"
3+
description: "Learn how to disable and delete a business unit from an environment. Learn about the considerations before taking this irreversible action."
4+
author: paulliew
65
ms.component: pa-admin
76
ms.topic: conceptual
8-
ms.date: 03/10/2020
7+
ms.date: 05/18/2023
98
ms.subservice: admin
10-
ms.author: jimholtz
9+
ms.author: paulliew
10+
ms.reviewer: sericks
1111
search.audienceType:
1212
- admin
1313
---
14-
# Delete a business unit
1514

16-
You can delete a business unit to completely remove it.
15+
# Disable and delete a business unit
16+
17+
You can delete a business unit to completely remove it. To delete a business unit, you must first disable it.
1718

1819
> [!IMPORTANT]
1920
> Before deleting a business unit, be sure to consider the following:
@@ -22,25 +23,34 @@ You can delete a business unit to completely remove it.
2223
> - The records owned by the business unit (for example: Teams, Facilities/Equipment, and Resource Groups) are deleted at the same time you delete the business unit.
2324
> - You can't delete a business unit until you reassign all the business unit records to another business unit.
2425
26+
## Disable a business unit
27+
2528
1. In the Microsoft Power Platform admin center, select an environment.
2629

2730
2. Select **Settings** > **Users + permissions** > **Business units**.
2831

29-
3. Click to select the business unit that you want to delete.
32+
3. Click to select the business unit that you want to disable.
3033

3134
4. On the Actions toolbar, choose **More Actions** > **Disable**.
3235

3336
> [!IMPORTANT]
34-
> When you disable a business unit, all users and teams associated with the business unit will not be able to sign in. You will need to reparent users and teams to another business unit and reassign security roles.
37+
> When you disable a business unit which has child business units, all child business units (all depths) are disabled.
38+
>
39+
> All users and teams associated with the business unit or child business units won't be able to sign in. You must reparent users and teams to another business unit and reassign security roles.
3540
3641
5. In the **Confirm Deactivation** dialog box, choose **Deactivate**.
37-
42+
43+
## Delete a business unit
44+
3845
6. Change the view to **Inactive Business Units**.
3946

4047
7. Select the business unit to delete, and then choose the **Delete** icon ![Delete button.](../admin/media/delete.png "Delete button").
4148

4249
8. In the **Confirm Deletion** dialog box, choose **Delete**.
4350

51+
> [!IMPORTANT]
52+
> When you need to delete a business unit which has child business units, all child business units (all depths) must be deleted first.
53+
4454
> [!TIP]
4555
> If you get an error, be sure to reparent users and teams to another business unit.
4656

0 commit comments

Comments
 (0)