Did you know that âsharing limitsâ in Power Platform are one of the fastest, lowest-friction governance wins you can ship? They donât block makers from collaborating â they just put guardrails on how broadly an app or flow can be shared, which is where most data exposure incidents start.
What âsharing limitsâ actually controls
In Power Platform Admin Center, on a managed environment, you can configure:
- Maximum number of users an app can be shared with by a single maker.
- Whether sharing with security groups is allowed.
- Sharing with âEveryoneâ / tenant-wide sharing â usually the riskiest setting.
- Approval workflows for broad sharing (e.g. anything over 100 users requires admin sign-off).
These controls apply to canvas apps and, with adjacent settings, to flows and Copilot Studio agents.
Why oversharing is the #1 incident pattern
The usual story: a maker builds a useful HR app, shares it with their team, then someone says âcan the whole company use it?â â and they share it tenant-wide. The app reads from a SharePoint list that contains personal data, and now thousands of people have access to data the maker never intended to expose.
No one was malicious. No one wrote bad code. The platform just made oversharing one click away.
Sharing limits make that click not one click.
A practical pattern (that doesnât kill velocity)
- Dev environments: keep sharing open. Makers iterate freely with their team.
- Test/UAT environments: limit sharing to designated security groups. Forces the team to think about audience before promoting.
- Production environments:
- Disable tenant-wide sharing entirely.
- Allow sharing only with named security groups (managed by IT).
- Require an approval workflow for any sharing over a threshold (50, 100, whatever fits your org).
Pair this with Power Platform Hub or a custom audit dashboard so admins can spot âthis app was shared with 8,000 people last weekâ before it becomes a regulatorâs email.
Pitfalls to avoid
- Donât apply tight limits to Dev. Youâll create shadow IT â makers will move to personal environments where you have no visibility.
- Donât restrict without an alternative. Always pair limits with a clear, fast process to request broader sharing (security groups, helpdesk ticket, automated approval).
- Communicate the rules. A surprised maker who gets blocked at 5pm on a Friday becomes a vocal critic of your governance program.
Why this matters
Most âPower Platform data leakâ headlines arenât about clever attacks â theyâre about everyday makers oversharing because nothing stopped them. Sharing limits are the cheapest, fastest way to prevent that pattern. You donât need a six-month CoE rollout; you can ship this in an afternoon and still let your makers move fast.
đŹ Comments & Suggestions
Share your thoughts, tips, or drop a useful link below.