PL-900 Objective 2.2: Describe Microsoft Power Platform Administration and Governance

 • 29 min read • Microsoft Power Platform Fundamentals

Share:

PL-900 Exam Focus: This objective covers governance and administration of Power Platform including security models, environment strategies, administrative portals, and compliance capabilities. Understanding how security layers work together, what environments provide, which admin centers manage different aspects, and how the platform supports data privacy and accessibility is essential. These governance concepts ensure secure, compliant, and well-managed Power Platform deployments.

Power Platform Administration and Governance Overview

Microsoft Power Platform administration and governance provide the frameworks, tools, and policies that ensure secure, compliant, and sustainable low-code development at enterprise scale. Without proper governance, organizations risk shadow IT proliferation, data leakage to unauthorized systems, compliance violations, and unmaintained solutions that become organizational liabilities. Effective governance balances enabling innovation through accessible development tools with maintaining appropriate controls that protect organizational data, ensure regulatory compliance, and promote sustainable solution development practices.

The Power Platform governance model operates through multiple layers working together cohesively. Environment strategies isolate resources and provide security boundaries. Role-based access control determines who can perform specific actions. Data Loss Prevention policies prevent inappropriate data flows between systems. Monitoring and analytics provide visibility into platform usage and adoption patterns. This multi-layered approach enables organizations to establish governance frameworks matching their risk tolerance, compliance requirements, and business objectives while empowering users to build solutions addressing real business needs.

The Microsoft Power Platform Security Model

Identity and Authentication

Power Platform leverages Microsoft Entra ID (formerly Azure Active Directory) as its identity foundation, providing enterprise-grade authentication and single sign-on across all platform services. Users authenticate once with their organizational credentials and gain access to appropriate Power Platform resources based on their Entra ID group memberships and assigned roles. This centralized identity management eliminates separate user account maintenance for Power Platform, ensures consistent password policies and multi-factor authentication requirements apply, and enables conditional access policies that require additional verification for sensitive operations or when accessing from untrusted locations.

Authentication supports multiple methods including username and password with multi-factor authentication, certificate-based authentication for high-security scenarios, and federated identity through SAML or OAuth providers for organizations using third-party identity systems. Conditional access policies evaluate risk factors including user location, device compliance status, application sensitivity, and sign-in risk before granting access. These policies can require additional verification, block access entirely, or limit available capabilities based on assessed risk levels, ensuring security controls adapt dynamically to changing threat landscapes.

Authorization and Role-Based Access

Authorization in Power Platform operates through role-based access control at multiple levels providing granular permissions management. Environment roles control who can create, manage, or administer resources within specific environments. Environment Maker roles allow creating apps and flows but not managing environment settings. Environment Admin roles provide full control over specific environments including user management and policy configuration. System Administrator and Global Administrator roles span multiple environments, managing platform-wide settings and policies that apply across the entire organization.

Dataverse security extends beyond environment-level permissions with security roles defining access to specific tables, fields, and records. These roles use privilege-based permissions specifying create, read, write, delete, append, and assign operations on each table. Organizations create custom security roles matching job functions, combining privileges that reflect actual work requirements rather than providing excessive permissions. Role assignment happens at user or team levels, with users potentially having multiple roles whose permissions combine to determine effective access. This fine-grained control ensures users access only data necessary for their responsibilities while maintaining appropriate audit trails of all data access.

Data Loss Prevention Policies

Data Loss Prevention (DLP) policies represent Power Platform's primary mechanism for preventing inappropriate data flows between systems and services. These policies classify connectors into groups representing business data, non-business data, or blocked services. Makers can only use connectors from the same group together in apps and flows, preventing scenarios where internal customer data copies to external consumer services. DLP policies enforce these restrictions at runtime, preventing apps from executing and flows from running when connector combinations violate established policies.

Administrators create DLP policies at tenant or environment levels, with tenant-level policies providing baseline governance across all environments while environment-specific policies address unique requirements for particular business units or projects. Policy configuration includes connector classification, endpoint filtering that restricts specific URLs or domains even within allowed connectors, and custom connector controls. Organizations typically start with restrictive policies that loosen over time as they understand maker needs and risk profiles, balancing security with productivity. Regular policy review ensures governance keeps pace with new connector availability and evolving business requirements.

Understanding Environments

Environment Fundamentals

Environments serve as containers that isolate Power Platform resources including apps, flows, connections, custom connectors, and Dataverse databases. Each environment represents a separate boundary with its own security configuration, database instance, and resource collection. Users require explicit access to environments before creating or using resources within them, preventing unauthorized access to solutions and data. This isolation supports multiple critical scenarios including separating development from production systems, providing dedicated spaces for specific departments or projects, and enabling proper application lifecycle management with distinct environments for building, testing, and deploying solutions.

Organizations typically maintain several environment types serving different purposes. Production environments host solutions used by end users for actual business processes, requiring high availability, backup protection, and change management controls. Development environments provide spaces where makers experiment, build prototypes, and create initial solution versions without affecting production systems. Test or quality assurance environments enable thorough solution validation before production deployment, identifying issues in realistic environments that mirror production configurations. Sandbox environments offer temporary spaces for proof-of-concept work, training, or evaluation of new capabilities without consuming production capacity or affecting established solutions.

Environment Properties and Configuration

When creating environments, administrators configure several properties affecting capabilities and behavior. Environment types include production environments providing full platform capabilities with backup and recovery features, sandbox environments offering similar capabilities but designated for non-production use, developer environments providing free individual development spaces with limited capacity, and Microsoft Dataverse for Teams environments optimized for Teams integration with reduced capabilities suitable for team-level applications. Each type offers different capacity allocations, backup protection, and management capabilities matching intended use cases.

Geographic region selection determines physical data storage locations, important for data residency compliance, latency optimization for users in specific regions, and meeting regulatory requirements restricting where certain data resides. Once set during environment creation, regions cannot be changed, requiring new environment creation and solution migration for region changes. Security group assignments restrict who can access environments, with environments supporting open access to all organizational users or restricted access to specific Azure AD security groups. This flexibility enables environments serving entire organizations or dedicated spaces for specific teams with sensitive data or specialized requirements.

Environment Lifecycle Management

Proper environment lifecycle management ensures solutions progress through appropriate stages from initial development through testing to production deployment. Solutions built in development environments undergo testing in dedicated test environments before production deployment, preventing untested changes from affecting business operations. Solution import and export capabilities move solutions between environments, packaging apps, flows, custom connectors, and Dataverse customizations into portable solution files. Managed solutions provide production deployment targets with maker restrictions preventing unintended modifications, while unmanaged solutions remain editable for ongoing development work.

Organizations establish promotion processes defining approval requirements, testing criteria, and change management procedures for moving solutions between environments. These processes ensure appropriate stakeholders review changes, testing validates functionality and performance, and documentation captures solution purpose and configuration. Version control practices track solution changes over time, enabling rollback to previous versions if issues arise. Automated deployment pipelines can streamline promotion processes, executing tests automatically and deploying approved solutions with minimal manual intervention, reducing human error and accelerating delivery while maintaining quality standards.

Power Platform Admin Centers and Portals

Power Platform Admin Center

The Power Platform Admin Center serves as the primary management portal providing centralized control over environments, policies, analytics, and platform health across the entire organization. Administrators use this portal to create and configure environments, set up Data Loss Prevention policies, monitor capacity consumption, review usage analytics, and manage licensing. The portal offers dashboards showing key metrics including environment count, app and flow usage, Dataverse capacity consumption, and API call volumes. These insights enable proactive capacity planning, identify adoption trends, and highlight areas requiring governance attention.

Key administrative functions accessible through Power Platform Admin Center include environment management for creating, editing, backing up, and recovering environments; policy configuration for establishing DLP policies and connector controls; capacity monitoring showing database storage, file storage, and API request usage; analytics dashboards displaying usage patterns and adoption metrics; and tenant settings controlling platform-wide configurations like trial environment creation, capacity allocation, and integration settings. This centralized portal reduces administrative complexity by consolidating management tasks previously spread across multiple interfaces into a unified experience.

Microsoft 365 Admin Center

The Microsoft 365 Admin Center manages organizational aspects including user accounts, licenses, and service subscriptions spanning all Microsoft 365 services including Power Platform. Administrators assign Power Platform licenses to users, manage service availability, and configure organizational settings that apply across the Microsoft 365 ecosystem. While the Power Platform Admin Center focuses specifically on platform governance and environment management, the Microsoft 365 Admin Center handles broader organizational administration affecting all Microsoft cloud services.

License management through Microsoft 365 Admin Center includes assigning Power Apps per user or per app licenses, Power Automate per user or per flow licenses, and premium connector access. Administrators view license consumption, available licenses, and pending assignments. Integration with Azure AD enables license assignment based on group membership, automatically providing appropriate licenses as users join relevant groups. Service health dashboards show current status, planned maintenance, and reported issues across Microsoft 365 services, helping administrators understand platform availability and communicate status to users appropriately.

Power Apps and Power Automate Portals

The Power Apps maker portal (make.powerapps.com) and Power Automate portal (make.powerautomate.com) serve as development interfaces where makers create and manage their solutions. While primarily focused on solution development, these portals include administrative functions for environment selection, solution management, and resource organization. Makers switch between environments, view their created apps and flows, access templates and learning resources, and manage connections to external services. These portals provide the primary interface for citizen developers building business solutions within governed environments.

Administrative capabilities within maker portals include solution creation and management, connection configuration and credentials management, app and flow sharing with other users or groups, and version history viewing. Makers can export solutions for backup or migration purposes, import solutions from other environments, and monitor their solution usage and performance. The portals enforce environment boundaries and DLP policies, preventing actions that violate organizational governance rules while providing clear feedback about restrictions and their rationale.

Data Privacy and Accessibility Support

Data Privacy and Compliance

Power Platform provides comprehensive data privacy capabilities supporting regulatory compliance frameworks including GDPR, HIPAA, and industry-specific regulations. Data residency controls ensure customer data remains in specified geographic regions, meeting legal requirements about data storage locations. Microsoft Purview integration enables data governance, sensitivity labeling, and compliance assessment across Power Platform solutions. Organizations classify data sensitivity levels and apply appropriate protection policies automatically, ensuring consistent data handling regardless of where data appears within the platform.

Privacy features include subject rights requests enabling individuals to access, export, or delete their personal data stored in Dataverse; audit logging providing complete records of data access and modifications; retention policies automatically archiving or deleting data based on organizational requirements; and encryption protecting data at rest and in transit. Power Platform maintains extensive compliance certifications and attestations, regularly undergoing independent audits verifying security controls and operational practices. These certifications provide organizations with confidence that the platform meets rigorous security and privacy standards required for handling sensitive business data.

Accessibility Features and Guidelines

Microsoft Power Platform includes comprehensive accessibility features ensuring solutions work for users with diverse abilities and needs. The platform complies with Web Content Accessibility Guidelines (WCAG) 2.1 Level AA standards, providing keyboard navigation for users who cannot use mice, screen reader compatibility for visually impaired users, high-contrast mode support, focus indicators showing current interface position, and adjustable zoom capabilities. These built-in features ensure applications created on Power Platform inherit baseline accessibility without requiring makers to implement custom accessibility code.

Power Apps provides accessible controls and templates by default, with the accessibility checker identifying potential issues during app development. This tool scans applications for common accessibility problems including insufficient color contrast, missing alternative text for images, incorrect tab order, and unlabeled controls. Makers receive specific recommendations for addressing identified issues, improving solution accessibility before deployment. Model-driven apps automatically implement accessibility best practices through their standardized interface patterns, while canvas apps require maker attention to accessibility considerations during design. Organizations should establish accessibility requirements in governance standards and test solutions with assistive technologies before production deployment.

Governance Best Practices

Establishing a Center of Excellence

A Center of Excellence (CoE) provides organizational structure for Power Platform governance, bringing together key stakeholders to establish standards, provide guidance, and support makers across the organization. CoE teams typically include executive sponsors providing strategic direction and funding, IT administrators managing infrastructure and security, experienced makers serving as mentors and reviewers, and business representatives ensuring solutions align with organizational needs. This cross-functional team develops governance policies, maintains documentation and templates, provides training resources, and resolves escalated issues.

CoE responsibilities extend beyond policy creation to active community building and enablement. Regular office hours or drop-in sessions provide makers with direct access to experts for guidance on complex scenarios. Internal community platforms like Teams channels or Yammer groups facilitate knowledge sharing between makers. Solution showcases highlight successful implementations, inspiring others and demonstrating best practices. The CoE identifies common requirements across multiple makers, creating reusable components, templates, and connectors that accelerate development while ensuring consistency. This proactive approach prevents duplicate effort and promotes high-quality, maintainable solutions.

Monitoring and Analytics

Continuous monitoring through Power Platform Admin Center analytics provides visibility into platform adoption, usage patterns, and potential issues requiring attention. Dashboards show active apps and flows, user engagement metrics, capacity consumption trends, and error rates. These insights enable administrators to identify successful solutions worth promoting, unused resources consuming capacity unnecessarily, and potential governance violations requiring investigation. Regular analytics review informs governance adjustments, capacity planning, and training focus areas.

Organizations should establish key performance indicators (KPIs) for platform success including active user counts, solution creation rates, business value delivered by applications, time-to-solution for common scenarios, and governance compliance metrics. Tracking these KPIs over time demonstrates platform value to leadership, identifies improvement opportunities, and justifies continued investment. Automated reporting provides stakeholders with regular updates on platform health and adoption without manual report preparation, ensuring consistent communication about platform status.

Real-World Governance Scenarios

Scenario 1: Financial Services Organization

Challenge: A bank needs to enable business users to build apps while ensuring strict compliance with financial regulations and preventing data leakage.

Solution: Implement multiple environments separating production from development, restrictive DLP policies blocking social media and consumer file storage connectors, role-based access limiting production data access to authorized personnel only, and comprehensive audit logging tracking all data access. Regular compliance assessments verify policy effectiveness and identify areas requiring additional controls.

Governance Approach: Center of Excellence reviews all apps before production deployment, mandatory training covers data handling requirements, pre-approved templates for common scenarios ensure compliance, and monitoring alerts flag suspicious activity or policy violations immediately.

Scenario 2: Healthcare Provider

Challenge: A hospital system requires patient data protection meeting HIPAA requirements while enabling clinical staff to build workflow improvements.

Solution: Dedicated environments for clinical applications with enhanced security, encryption of sensitive data fields in Dataverse, DLP policies preventing patient data export to unauthorized systems, and audit logging providing complete access history. Azure AD conditional access requires multi-factor authentication for accessing patient data applications.

Governance Approach: Privacy officer reviews solutions accessing protected health information, developers complete HIPAA training before receiving maker access, regular security audits verify compliance, and incident response procedures address potential breaches quickly.

Scenario 3: Manufacturing Company

Challenge: A global manufacturer wants consistent governance across multiple regions while accommodating local business requirements and data residency rules.

Solution: Region-specific environments for Americas, EMEA, and APAC with data stored in local regions, tenant-level DLP policies providing baseline governance, environment-specific policies addressing regional compliance requirements, and centralized CoE providing global standards with regional representatives adapting to local needs.

Governance Approach: Global standards define environment strategies and security baselines, regional administrators manage local environments within established frameworks, regular cross-regional sharing sessions promote consistency, and centralized analytics provide visibility across all regions.

Exam Preparation Tips

Key Concepts to Master

  • Security layers: Understand how Microsoft Entra ID, environment roles, and Dataverse security work together
  • Environment purpose: Know why environments exist and how they support development lifecycle management
  • DLP policies: Understand how Data Loss Prevention prevents inappropriate connector combinations
  • Admin centers: Recognize which center manages environments (Power Platform) versus licenses (Microsoft 365)
  • Compliance capabilities: Know how Power Platform supports data privacy through residency, encryption, and audit logging
  • Accessibility features: Understand built-in accessibility support and maker responsibilities

Practice Questions

Sample PL-900 Exam Questions:

  1. An organization wants to prevent customer data from being sent to social media services through Power Apps. Which governance feature provides this control?
  2. A development team needs a separate space to build and test apps without affecting production systems. What Power Platform feature provides this isolation?
  3. Where do administrators create and manage Power Platform environments?
  4. An organization must ensure customer data remains stored within the European Union. Which environment property addresses this requirement?
  5. What identity platform does Power Platform use for user authentication?

PL-900 Success Tip: Focus on understanding governance purposes rather than detailed configuration steps. Know that environments provide isolation, DLP policies prevent data leakage, Power Platform Admin Center manages platform-wide settings, and accessibility is built into the platform. Understand how these governance elements work together to enable secure, compliant low-code development. Remember that security operates in layers from Microsoft Entra ID authentication through environment permissions to Dataverse record-level security.

Hands-On Practice Lab

Lab Objective

Explore Power Platform administration and governance features through admin center interfaces. This lab requires Power Platform administrator access or ability to view admin center features in a trial environment.

Lab Activities

Activity 1: Explore Power Platform Admin Center

  • Access the admin center: Navigate to admin.powerplatform.microsoft.com and explore the main dashboard
  • Review environments: View existing environments, note their types (production, sandbox, etc.), and geographic regions
  • Check analytics: Explore usage analytics showing app launches, flow runs, and capacity consumption
  • Review tenant settings: Examine organizational settings controlling platform capabilities and restrictions

Activity 2: Understand DLP Policies

  • View existing policies: Navigate to Data Policies section and examine configured DLP policies
  • Review connector groups: See which connectors are classified as business, non-business, or blocked
  • Understand policy scope: Note whether policies apply at tenant or environment level
  • Identify implications: Consider how existing policies affect what makers can build in your environment

Activity 3: Examine Environment Security

  • Select an environment: Choose a specific environment to examine in detail
  • Review security roles: Navigate to Dataverse security settings and view available security roles
  • Understand access: Check which users have access to the environment and their assigned roles
  • Explore properties: Review environment properties including region, type, and database information

Activity 4: Explore Compliance Features

  • Check data residency: Confirm where environment data is stored geographically
  • Review audit settings: Examine audit logging configuration for data access tracking
  • Explore privacy features: Investigate available compliance and privacy capabilities in your tenant
  • Understand certifications: Research Power Platform compliance certifications relevant to your industry

Lab Outcomes

After completing this lab, you'll understand how administrators manage Power Platform through admin centers, how environments provide isolation and security boundaries, how DLP policies prevent inappropriate data flows, and what compliance capabilities exist. This practical knowledge helps you understand governance concepts tested in the PL-900 exam and prepares you for discussions about Power Platform governance in organizational contexts.

Frequently Asked Questions

What is the Power Platform security model based on?

The Power Platform security model is based on Microsoft Entra ID (formerly Azure Active Directory) for identity management and role-based access control. Security operates at multiple layers including environment-level permissions that control who can create and manage resources, Dataverse security roles that define access to specific tables and records, and Data Loss Prevention policies that control which connectors can be used together. This layered approach ensures security controls apply at appropriate granularity levels from broad environment access down to individual record permissions.

What is an environment in Power Platform?

An environment is a container that isolates Power Platform resources including apps, flows, connections, and Dataverse databases. Each environment provides separate security boundaries, allowing organizations to separate development from production, isolate different business units or departments, or provide dedicated spaces for specific projects. Environments include their own Dataverse database instances, security roles, and access controls. This isolation prevents unauthorized access between environments and supports proper application lifecycle management with distinct spaces for building, testing, and deploying solutions.

What is the Power Platform Admin Center used for?

The Power Platform Admin Center is the primary management portal where administrators create and manage environments, configure Data Loss Prevention policies, monitor usage analytics, manage capacity and licensing, and review platform health. It provides centralized governance for all Power Platform services across the organization. Administrators use this portal to establish environment strategies, control who can create apps and flows, set compliance policies, and troubleshoot issues. The admin center offers comprehensive visibility into platform adoption, resource consumption, and security configuration across all environments.

How does Data Loss Prevention work in Power Platform?

Data Loss Prevention (DLP) policies control which connectors can be used together in apps and flows, preventing sensitive business data from flowing to unauthorized services. Administrators classify connectors into business data groups, non-business data groups, or blocked categories. Apps and flows can only use connectors from the same group together, preventing scenarios like copying customer data from internal CRM systems to personal social media accounts. DLP policies apply at environment or tenant level, providing flexible governance that balances security with productivity. Violations prevent apps from running and flows from executing until makers resolve connector conflicts.

Can different departments have separate Power Platform environments?

Yes, organizations commonly create separate environments for different departments, business units, or regions to provide appropriate isolation and governance. Each department's environment maintains its own Dataverse database, security configuration, and resources. This approach prevents one department from accidentally accessing or modifying another department's data and applications. Department-specific environments allow customized DLP policies reflecting different compliance requirements, dedicated capacity allocation, and localized administration where department leads manage their own environments within corporate governance guidelines. Shared resources can exist in common environments accessible across departments when collaboration is needed.

What accessibility features does Power Platform support?

Power Platform includes comprehensive accessibility features complying with WCAG 2.1 standards including keyboard navigation for users who cannot use mice, screen reader compatibility for visually impaired users, high-contrast mode support, adjustable font sizes and zoom capabilities, and focus indicators showing current interface position. Power Apps provides accessible controls and templates by default, with accessibility checker tools identifying potential issues during development. Model-driven apps automatically inherit accessibility features from the platform. Makers should test applications with accessibility tools and consider diverse user needs when designing solutions to ensure inclusive experiences for all users.

How does Power Platform handle data residency and compliance?

Power Platform supports data residency requirements through region-specific deployments where organizations choose geographic locations for environment creation. Data stored in environments remains in the selected region, helping meet regulatory requirements like GDPR or industry-specific compliance needs. Power Platform maintains certifications for major compliance frameworks including SOC 2, ISO 27001, HIPAA, and regional regulations. Microsoft Purview integration provides data governance, compliance assessment, and risk management capabilities. Administrators configure compliance features through admin centers, ensuring solutions meet organizational and regulatory requirements while maintaining platform benefits.

What happens when an environment reaches capacity limits?

When environments approach capacity limits for database storage, file storage, or API calls, administrators receive notifications in Power Platform Admin Center. Exceeding limits may prevent creating new records, uploading files, or executing flows until capacity is increased or usage is reduced. Organizations can purchase additional capacity, optimize existing resource usage by archiving old records or removing unnecessary files, or redistribute resources across multiple environments. Admin center analytics help identify top capacity consumers and usage trends, enabling proactive capacity planning. Proper capacity management ensures consistent application performance and prevents unexpected disruptions to business processes.

Share:

Written by Joe De Coppi - Last Updated November 14, 2025