You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: power-platform/admin/about-lockbox.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,13 +138,15 @@ In addition, access to Customer Lockbox for Microsoft Power Platform and Dynamic
138
138
139
139
## Exclusions
140
140
141
-
Lockbox requests aren't triggered in the following engineering support scenarios:
141
+
-Lockbox requests aren't triggered in the following engineering support scenarios:
142
142
143
-
- Emergency scenarios that fall outside of standard operating procedures, such as a major service outage that requires immediate attention to recover or restore services in unexpected or unpredictable cases. These “break glass” events are rare and, in most instances, don't require any access to customer data to resolve.
143
+
- Emergency scenarios that fall outside of standard operating procedures, such as a major service outage that requires immediate attention to recover or restore services in unexpected or unpredictable cases. These “break glass” events are rare and, in most instances, don't require any access to customer data to resolve.
144
144
145
-
- A Microsoft engineer accesses the underlying platform as part of troubleshooting and is inadvertently exposed to customer data. It's rare that such scenarios would result in access to meaningful quantities of customer data.
145
+
- A Microsoft engineer accesses the underlying platform as part of troubleshooting and is inadvertently exposed to customer data. It's rare that such scenarios would result in access to meaningful quantities of customer data.
146
146
147
-
Customer Lockbox requests are also not triggered by external legal demands for data. For details, refer to the discussion of government requests for data in the [Microsoft Trust Center](https://www.microsoft.com/trust-center/).
147
+
- Customer Lockbox requests are also not triggered by external legal demands for data. For details, refer to the discussion of government requests for data in the [Microsoft Trust Center](https://www.microsoft.com/trust-center/).
148
+
149
+
- Customer Lockbox won't apply to the access and manual review of customer data shared for Copilot AI features. Customer Lockbox will remain enabled for all in-scope data.
Copy file name to clipboardExpand all lines: power-platform/admin/block-cookie-replay-attack.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Block cookie replay attacks in Dataverse
3
3
description: Learn how to use IP-based cookie binding to block session hijacking attacks in Dataverse.
4
-
ms.date: 01/24/2023
4
+
ms.date: 05/17/2023
5
5
ms.topic: conceptual
6
6
author: ritesp
7
-
ms.reviewer: kvivek
7
+
ms.reviewer: sericks
8
8
ms.author: ritesp
9
9
ms.subservice: admin
10
10
search.audienceType:
@@ -14,7 +14,7 @@ search.audienceType:
14
14
15
15
Prevent session hijacking exploits in Dataverse with IP address-based cookie binding. Let's say that a malicious user copies a valid session cookie from an authorized computer that has cookie IP binding enabled. The user then tries to use the cookie on a different computer to gain unauthorized access to Dataverse. In real time, Dataverse compares the IP address of the cookie's origin against the IP address of the computer making the request. If the two are different, the attempt is blocked, and an error message is shown.
16
16
17
-
IP-based cookie binding is available in all environments across all tenants, including government clouds. You can enable this feature in the [Power Platform admin center](https://admin.powerplatform.microsoft.com/).
17
+
IP-based cookie binding is available only for [Managed Environments](managed-environment-licensing.md) across all tenants, including government clouds. You can enable this feature in the [Power Platform admin center](https://admin.powerplatform.microsoft.com/).
Copy file name to clipboardExpand all lines: power-platform/admin/content-security-policy.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: "Content security policy"
3
3
description: "Use content security policy to prevent clickjacking in Power Apps."
4
-
ms.date: 01/31/2023
4
+
ms.date: 05/16/2023
5
5
ms.topic: conceptual
6
6
author: JesseParsons
7
7
ms.subservice: admin
8
8
ms.author: jeparson
9
-
ms.reviewer: kvivek
9
+
ms.reviewer: sericks
10
10
ms.custom: "admin-security"
11
11
search.audienceType:
12
12
- admin
@@ -40,15 +40,15 @@ To configure CSP, navigate to the [Power Platform admin center](https://admin.po
40
40
41
41
### Reporting
42
42
43
-
The "Enable reporting" toggle controls whether model-driven and canvas apps send violation reports. Enabling it requires an endpoint to be specified. Violation reports will be sent to this endpoint regardless of whether CSP is enforced or not (using report-only mode if CSP isn't enforced). For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
43
+
The "Enable reporting" toggle controls whether model-driven and canvas apps send violation reports. Enabling it requires an endpoint to be specified. Violation reports are sent to this endpoint regardless of whether CSP is enforced or not (using report-only mode if CSP isn't enforced). For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
Enforcement of CSP is controlled independently for model-driven and canvas apps to provide granular control over policies. Use the model-driven/canvas pivot to modify the intended app type.
50
50
51
-
The "Enforce content security policy" toggle turns on the default policy for enforcement, as specified above, for the given app type. Turning on this toggle will change the behavior of apps in this environment to adhere to the policy. Therefore, the suggested enablement flow would be:
51
+
The "Enforce content security policy" toggle turns on the default policy for enforcement, as specified above, for the given app type. Turning on this toggle changes the behavior of apps in this environment to adhere to the policy. Therefore, the suggested enablement flow would be:
52
52
1. Enforce on a dev/test environment.
53
53
2. Enable report-only mode in production.
54
54
3. Enforce in production once no violations are reported.
@@ -68,6 +68,8 @@ For Microsoft Teams integration using the [Dynamics 365 app](/dynamics365/teams-
68
68
-`https://teams.microsoft.com/`
69
69
-`https://msteamstabintegration.dynamics.com/`
70
70
71
+
For Dynamics 365 App for Outlook, you must add your Outlook Web App homepage origin to `frame-ancestors`.
72
+
71
73
### Important considerations
72
74
Turning off the default directive and saving with an empty list *turns off the directive completely* and doesn't send it as part of the CSP response header.
73
75
@@ -118,7 +120,7 @@ CSP can be configured without using the UI by modifying the following organizati
118
120
119
121
-[ContentSecurityPolicyConfigurationForCanvas](/powerapps/developer/data-platform/reference/entities/organization#BKMK_ContentSecurityPolicyConfigurationForCanvas) controls the policy for canvas using the same process described in `ContentSecurityPolicyConfiguration` above.
120
122
121
-
-[ContentSecurityPolicyReportUri](/powerapps/developer/data-platform/reference/entities/organization#BKMK_ContentSecurityPolicyReportUri) controls whether reporting should be used. This setting is used by both model-driven and canvas apps. A valid string will send violation reports to the specified endpoint, using report-only mode if `IsContentSecurityPolicyEnabled`/`IsContentSecurityPolicyEnabledForCanvas` is turned off. An empty string disables reporting. For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
123
+
-[ContentSecurityPolicyReportUri](/powerapps/developer/data-platform/reference/entities/organization#BKMK_ContentSecurityPolicyReportUri) controls whether reporting should be used. This setting is used by both model-driven and canvas apps. A valid string sends violation reports to the specified endpoint, using report-only mode if `IsContentSecurityPolicyEnabled`/`IsContentSecurityPolicyEnabledForCanvas` is turned off. An empty string disables reporting. For more information, see [reporting documentation](https://developer.mozilla.org/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only).
122
124
123
125
## Configuring CSP without UI
124
126
Especially for environments not in the Power Platform admin center such as on-premises configurations, admins may want to configure CSP using scripts to directly modify settings.
Copy file name to clipboardExpand all lines: power-platform/admin/database-security.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ contributors:
10
10
ms.custom: "admin-security"
11
11
ms.component: pa-admin
12
12
ms.topic: conceptual
13
-
ms.date: 05/07/2023
13
+
ms.date: 05/16/2023
14
14
search.audienceType:
15
15
- admin
16
16
---
@@ -57,9 +57,10 @@ For users who make apps that connect to the database and need to create or updat
57
57
| Environment Maker | Customizations | Can create new resources associated with an environment, including apps, connections, custom APIs, gateways, and flows using Microsoft Power Automate. However, this role doesn't have any privileges to access data within an environment. More information: [Environments overview](./environments-overview.md) <br /> <br />Environment makers can also distribute the apps they build in an environment to other users in your organization. They can share the app with individual users, security groups, or all users in the organization. More information: [Share an app in Power Apps](/powerapps/maker/canvas-apps/share-app)|
58
58
| Global Reader || The [Global Reader](/azure/active-directory/roles/permissions-reference) role is not yet supported in the Power Platform admin center. |
59
59
| Office Collaborator | Read (self) | Has Read permission to tables where a record from these tables was shared with the organization. Does not have access to any other core and custom table records. This role is assigned to the Office Collaborators owner team and not to an individual user. |
60
-
| Service Reader | Read | Has full Read permission to all entities including custom entities. This is primarily used by backend service that requires reading all entities. |
61
-
| Service Writer | Create, Read, Write | Has full Create, Read, and Write permission to all entities including custom entities. This is primarily used by backend service that requires creating and updating records. |
62
-
| Support User | Read Customizations, Read Business Management settings | Has full Read permission to customization and business management settings to allow Support staff to troubleshoot environment configuration issues. Does not have access to core records. |
60
+
| Service Deleted | Delete | Has full Delete permission to all entities, including custom entities. This is primarily used by the service and requires deleting records in all entities. **This role cannot be assigned to a user or team.**|
61
+
| Service Reader | Read | Has full Read permission to all entities, including custom entities. This is primarily used by the service and requires reading all entities. **This role cannot be assigned to a user or team.**|
62
+
| Service Writer | Create, Read, Write | Has full Create, Read, and Write permission to all entities, including custom entities. This is primarily used by the service and requires creating and updating records. **This role cannot be assigned to a user or team.**|
63
+
| Support User | Read Customizations, Read Business Management settings | Has full Read permission to customization and business management settings, which allow support staff to troubleshoot environment configuration issues. This role does not have access to core records. **This role cannot be assigned to a user or team.**|
63
64
| System Administrator | Create, Read, Write, Delete, Customizations, Security Roles | Has full permission to customize or administer the environment, including creating, modifying, and assigning security roles. Can view all data in the environment. More information: [Privileges required for customization](/power-apps/maker/model-driven-apps/privileges-required-customization)|
64
65
| System Customizer | Create, Read, Write, Delete, Customizations | Has full permission to customize the environment. Can view all custom table data in the environment. However, users with this role can only view rows (records) that they create in Account, Contact, Activity tables. More information: [Privileges required for customization](/power-apps/maker/model-driven-apps/privileges-required-customization)|
65
66
@@ -99,18 +100,20 @@ The following table describes which resources can be authored by each security r
<sup>*</sup>Dataverse for Teams users don’t get access to desktop flows by default. You need to upgrade your environment to full Dataverse capabilities and acquire [Desktop flow license plans](https://powerautomate.microsoft.com/pricing/) in order to use desktop flows.
114
+
\*Connections are used in [canvas apps](/power-apps/maker/canvas-apps/add-manage-connections) and [Power Automate](/power-automate/add-manage-connections).
115
+
116
+
\**Dataverse for Teams users don’t get access to desktop flows by default. You need to upgrade your environment to full Dataverse capabilities and acquire [Desktop flow license plans](https://powerautomate.microsoft.com/pricing/) in order to use desktop flows.
114
117
115
118
## Assign security roles to users in an environment that has no Dataverse database
Copy file name to clipboardExpand all lines: power-platform/admin/delete-business-unit.md
+21-11Lines changed: 21 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,20 @@
1
1
---
2
-
title: "Delete a business unit from an environment"
3
-
description: "Learn how to deactivate and delete a business unit from an environment. Learn about the considerations before taking this irreversible action."
4
-
author: jimholtz
5
-
2
+
title: "Disable and delete a business unit from an environment"
3
+
description: "Learn how to disable and delete a business unit from an environment. Learn about the considerations before taking this irreversible action."
4
+
author: paulliew
6
5
ms.component: pa-admin
7
6
ms.topic: conceptual
8
-
ms.date: 03/10/2020
7
+
ms.date: 05/18/2023
9
8
ms.subservice: admin
10
-
ms.author: jimholtz
9
+
ms.author: paulliew
10
+
ms.reviewer: sericks
11
11
search.audienceType:
12
12
- admin
13
13
---
14
-
# Delete a business unit
15
14
16
-
You can delete a business unit to completely remove it.
15
+
# Disable and delete a business unit
16
+
17
+
You can delete a business unit to completely remove it. To delete a business unit, you must first disable it.
17
18
18
19
> [!IMPORTANT]
19
20
> Before deleting a business unit, be sure to consider the following:
@@ -22,25 +23,34 @@ You can delete a business unit to completely remove it.
22
23
> - The records owned by the business unit (for example: Teams, Facilities/Equipment, and Resource Groups) are deleted at the same time you delete the business unit.
23
24
> - You can't delete a business unit until you reassign all the business unit records to another business unit.
24
25
26
+
## Disable a business unit
27
+
25
28
1. In the Microsoft Power Platform admin center, select an environment.
3. Click to select the business unit that you want to delete.
32
+
3. Click to select the business unit that you want to disable.
30
33
31
34
4. On the Actions toolbar, choose **More Actions** > **Disable**.
32
35
33
36
> [!IMPORTANT]
34
-
> When you disable a business unit, all users and teams associated with the business unit will not be able to sign in. You will need to reparent users and teams to another business unit and reassign security roles.
37
+
> When you disable a business unit which has child business units, all child business units (all depths) are disabled.
38
+
>
39
+
> All users and teams associated with the business unit or child business units won't be able to sign in. You must reparent users and teams to another business unit and reassign security roles.
35
40
36
41
5. In the **Confirm Deactivation** dialog box, choose **Deactivate**.
37
-
42
+
43
+
## Delete a business unit
44
+
38
45
6. Change the view to **Inactive Business Units**.
39
46
40
47
7. Select the business unit to delete, and then choose the **Delete** icon .
41
48
42
49
8. In the **Confirm Deletion** dialog box, choose **Delete**.
43
50
51
+
> [!IMPORTANT]
52
+
> When you need to delete a business unit which has child business units, all child business units (all depths) must be deleted first.
53
+
44
54
> [!TIP]
45
55
> If you get an error, be sure to reparent users and teams to another business unit.
0 commit comments