check before: 2025-09-14
Product:
Fabric, Power BI
Platform:
Online, World tenant
Status:
Change type:
Feature update, Admin impact
Links:
Details:
Summary:
Starting September 15, 2025, Microsoft Fabric will enforce tenant and capacity-level admin settings to block creation of specified Fabric items via public APIs, Git integration, and deployment pipelines. Existing items remain unaffected. Admins should review settings to align with policies before enforcement begins.
Details:
Introduction
Starting September 15, 2025, Microsoft Fabric will begin enforcing tenant and capacity-level admin settings that restrict the creation of Fabric items through public APIs and CI/CD methods (Git integration and Deployment pipelines). This change ensures that admin-defined controls are consistently respected across all creation methods.
When this will happen
This enforcement will begin rolling out on September 15, 2025, and will be available by default.
Change Category:
XXXXXXX ... free basic plan only
Scope:
XXXXXXX ... free basic plan only
Release Phase:
Created:
2025-08-19
updated:
2025-08-19
Task Type
XXXXXXX ... free basic plan only
Docu to Check
XXXXXXX ... free basic plan only
MS How does it affect me
XXXXXXX ... free basic plan only
MS Preperations
XXXXXXX ... free basic plan only
MS Urgency
XXXXXXX ... free basic plan only
MS workload name
XXXXXXX ... free basic plan only
summary for non-techies**
XXXXXXX ... free basic plan only
Direct effects for Operations**
Blocked Creation of Fabric Items
Admins will be unable to create specified Fabric items through public APIs and CI/CD methods, leading to potential project delays.
- roles: Admins, Developers
- references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings
Increased Administrative Burden
Admins will need to review and potentially update tenant and capacity-level settings, increasing workload and time spent on compliance.
- roles: Admins, IT Managers
- references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings
User Experience Disruption
Users may experience disruptions in their workflows if they attempt to create blocked items without prior knowledge of the changes.
- roles: End Users, Project Managers
- references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings
Potential for Increased Support Tickets
The enforcement may lead to an increase in support tickets from users unaware of the new restrictions, impacting IT support resources.
- roles: Support Staff, Admins
- references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings
Compliance Risks
If admin settings are not reviewed and aligned with organizational policies, it may lead to compliance risks and governance issues.
- roles: Compliance Officers, Admins
- references: https://learn.microsoft.com/en-us/fabric/admin/service-admin-portal-microsoft-fabric-tenant-settings
Configutation Options**
XXXXXXX ... paid membership only
Opportunities**
XXXXXXX ... free basic plan only
Potentional Risks**
XXXXXXX ... paid membership only
IT Security**
XXXXXXX ... paid membership only
explanation for non-techies**
Starting September 15, 2025, Microsoft Fabric will implement a change that affects how certain items are created within its system. Imagine this like a new rule in a building where certain rooms can only be accessed by specific people. In this case, Microsoft Fabric is the building, and the rooms are different types of items that can be created within it.
Currently, admins have the ability to set rules about who can create what within Microsoft Fabric. However, these rules haven't always been enforced consistently across all methods of item creation. This is like having a rule that says only certain people can enter a room, but not having a guard at every door to ensure the rule is followed.
With the upcoming change, Microsoft Fabric will start enforcing these rules more strictly. This means that if an admin has set a rule to block the creation of certain items, this rule will now apply no matter how someone tries to create the item—whether through public APIs, Git integration, or deployment pipelines. Think of it as adding guards at every entrance to ensure only authorized people can enter.
Existing items that were created before this enforcement will not be affected. It's like if you were already in the room before the new guards were posted, you can stay there without any issue.
To prepare for this change, admins should review their current settings to make sure they align with their organization's policies. This is similar to checking a list of who should have access to certain rooms and making sure it's up to date before the new security measures are in place.
For more detailed guidance on how to manage these settings, admins can refer to the Microsoft Fabric admin portal documentation. This will help ensure that the transition to the new enforcement rules is smooth and aligns with the organization's needs.
** AI generated content. This information must be reviewed before use.
a free basic plan is required to see more details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
Last updated 3 weeks ago