Governance

Use sharing limits to prevent accidental oversharing

Use sharing limits to reduce oversharing risk while keeping maker collaboration safe.

Click image to enlarge

Did you know that “sharing limits” in Power Platform are one of the fastest, lowest-friction governance wins you can ship? They don’t block makers from collaborating — they just put guardrails on how broadly an app or flow can be shared, which is where most data exposure incidents start.

What “sharing limits” actually controls

In Power Platform Admin Center, on a managed environment, you can configure:

  • Maximum number of users an app can be shared with by a single maker.
  • Whether sharing with security groups is allowed.
  • Sharing with “Everyone” / tenant-wide sharing — usually the riskiest setting.
  • Approval workflows for broad sharing (e.g. anything over 100 users requires admin sign-off).

These controls apply to canvas apps and, with adjacent settings, to flows and Copilot Studio agents.

Why oversharing is the #1 incident pattern

The usual story: a maker builds a useful HR app, shares it with their team, then someone says “can the whole company use it?” — and they share it tenant-wide. The app reads from a SharePoint list that contains personal data, and now thousands of people have access to data the maker never intended to expose.

No one was malicious. No one wrote bad code. The platform just made oversharing one click away.

Sharing limits make that click not one click.

A practical pattern (that doesn’t kill velocity)

  • Dev environments: keep sharing open. Makers iterate freely with their team.
  • Test/UAT environments: limit sharing to designated security groups. Forces the team to think about audience before promoting.
  • Production environments:
    • Disable tenant-wide sharing entirely.
    • Allow sharing only with named security groups (managed by IT).
    • Require an approval workflow for any sharing over a threshold (50, 100, whatever fits your org).

Pair this with Power Platform Hub or a custom audit dashboard so admins can spot “this app was shared with 8,000 people last week” before it becomes a regulator’s email.

Pitfalls to avoid

  • Don’t apply tight limits to Dev. You’ll create shadow IT — makers will move to personal environments where you have no visibility.
  • Don’t restrict without an alternative. Always pair limits with a clear, fast process to request broader sharing (security groups, helpdesk ticket, automated approval).
  • Communicate the rules. A surprised maker who gets blocked at 5pm on a Friday becomes a vocal critic of your governance program.

Why this matters

Most “Power Platform data leak” headlines aren’t about clever attacks — they’re about everyday makers oversharing because nothing stopped them. Sharing limits are the cheapest, fastest way to prevent that pattern. You don’t need a six-month CoE rollout; you can ship this in an afternoon and still let your makers move fast.

Share this tip

Did this tip help you?

Vote once and classify what made this tip valuable.

Try this now

Quick checklist to apply this tip immediately.

💬 Comments & Suggestions

Share your thoughts, tips, or drop a useful link below.