Designing the Power Platform core security model
Designing a Power Platform core security model involves tackling access to data and systems from three vectors:
- Authentication: This vector helps provide a means for users or other systems to validate their right to access Power Platform applications. Authentication is generally handled by the Microsoft 365 user management processes.
- Network: We know that connecting to Power Platform systems requires access at the network level. Power Platform solutions are SaaS cloud-hosted. Network access to those cloud-hosted services is, therefore, part of the solution architects’ design remit.
- Authorization: Once a user is authenticated, they are granted access to Power Platform resources and/or systems based on the permissions associated with their account. Solution architects define the authorization strategies that grant user access.
Understanding an organization’s security requirements
During the discovery...