Microsoft is strengthening security in Power Platform. Starting March 30, 2026, Microsoft enables Power Platform tenant isolation by default for new tenants. If you created your tenant before this date, you need to enable it manually. In this article, you will learn how to enable tenant isolation in Power Platform.
Enable tenant isolation in Power Platform admin center
Note: Starting March 30, 2026, only new tenants will have tenant isolation enabled by default. Existing tenants will not have their existing tenant isolation turned on. So you must enable it yourself.
Important: Microsoft highly recommends enabling tenant isolation following the instructions below.
To enable tenant isolation in Power Platform admin center, follow the steps below:
- Sign in to the Power Platform admin center.
- Select Security in the navigation pane.
- Select Identity and access.
- Select Tenant isolation.


- Turn on the Restrict cross-tenant connections option to allow tenant isolation.
- Click Save.


Set up exceptions in tenant isolation
To allow cross-tenant communication:
- Select Add exceptions in the Tenant isolation pane.
- From the Allowed direction dropdown list, select the direction of the allow list entry.
- Enter the value of the allowed tenant as either the tenant domain or tenant ID in the Tenant ID field.
Once saved, the entry gets added to the allow list along with other allowed tenants. If you use the tenant domain to add the allow list entry, the Power Platform admin center automatically calculates the tenant ID.
You can use “*” as a special character to indicate that all tenants are allowed in the designated direction when tenant isolation is enabled. However, this is not recommended.
- Click Save.
Note: If tenant isolation is Off, you can still add or edit the exception list. However, the exception lists aren’t enforced until you turn on tenant isolation.
That’s it!
Read more: How to Restrict access to Microsoft Entra admin center »
Conclusion
You learned how to enable tenant isolation in Power Platform. This recommended approach improves your Microsoft tenant security, and every tenant should enable restrict cross-tenant connections. If you need to securely connect to other tenants that have data, set up exceptions to allow inbound and outbound directions.
Did you enjoy this article? You may also like How to Grant Access to Another User OneDrive. Don’t forget to follow us and share this article.

