MC1137600 – Fix update: Enforcement of Admin Settings in Fabric Public API and CI/CD (archived)

Power BI icon

check before: 2025-09-14

Product:

Fabric, Power BI

Platform:

Online, World tenant

Status:

Change type:

Feature update, Admin impact

Links:

Details:

Summary:
Starting September 15, 2025, Microsoft Fabric will enforce tenant and capacity-level admin settings to block creation of specified Fabric items via public APIs, Git integration, and deployment pipelines. Existing items remain unaffected. Admins should review settings to align with policies before enforcement begins.

Details:
Introduction
Starting September 15, 2025, Microsoft Fabric will begin enforcing tenant and capacity-level admin settings that restrict the creation of Fabric items through public APIs and CI/CD methods (Git integration and Deployment pipelines). This change ensures that admin-defined controls are consistently respected across all creation methods.
When this will happen
This enforcement will begin rolling out on September 15, 2025, and will be available by default.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2025-08-19

updated:
2025-08-19

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

XXXXXXX ... free basic plan only

Direct effects for Operations**

Blocked Creation of Fabric Items
Admins will be unable to create specified Fabric items through public APIs and CI/CD methods, leading to potential project delays.
   - roles: Admins, Developers
   - references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings

Increased Administrative Burden
Admins will need to review and potentially update tenant and capacity-level settings, increasing workload and time spent on compliance.
   - roles: Admins, IT Managers
   - references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings

User Experience Disruption
Users may experience disruptions in their workflows if they attempt to create blocked items without prior knowledge of the changes.
   - roles: End Users, Project Managers
   - references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings

Potential for Increased Support Tickets
The enforcement may lead to an increase in support tickets from users unaware of the new restrictions, impacting IT support resources.
   - roles: Support Staff, Admins
   - references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings

Compliance Risks
If admin settings are not reviewed and aligned with organizational policies, it may lead to compliance risks and governance issues.
   - roles: Compliance Officers, Admins
   - references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings

Configutation Options**

XXXXXXX ... paid membership only

Opportunities**

XXXXXXX ... free basic plan only

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

Starting September 15, 2025, Microsoft Fabric will implement a change that affects how certain items are created within its system. Imagine this like a new rule in a building where certain rooms can only be accessed by specific people. In this case, Microsoft Fabric is the building, and the rooms are different types of items that can be created within it.

Currently, admins have the ability to set rules about who can create what within Microsoft Fabric. However, these rules haven't always been enforced consistently across all methods of item creation. This is like having a rule that says only certain people can enter a room, but not having a guard at every door to ensure the rule is followed.

With the upcoming change, Microsoft Fabric will start enforcing these rules more strictly. This means that if an admin has set a rule to block the creation of certain items, this rule will now apply no matter how someone tries to create the item—whether through public APIs, Git integration, or deployment pipelines. Think of it as adding guards at every entrance to ensure only authorized people can enter.

Existing items that were created before this enforcement will not be affected. It's like if you were already in the room before the new guards were posted, you can stay there without any issue.

To prepare for this change, admins should review their current settings to make sure they align with their organization's policies. This is similar to checking a list of who should have access to certain rooms and making sure it's up to date before the new security measures are in place.

For more detailed guidance on how to manage these settings, admins can refer to the Microsoft Fabric admin portal documentation. This will help ensure that the transition to the new enforcement rules is smooth and aligns with the organization's needs.

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



Last updated 3 weeks ago

Leave a Reply

Share to MS Teams

Login to your account

Welcome Back, We Missed You!