GDAP: Enhancing Security in Microsoft Ecosystems

  1. Key benefits of GDAP
  2. How GDAP Works in Practice
  3. Requesting a GDAP Relationship
  4. Service-Level Administrator Roles
  5. Environment Administrator
  6. Using Security Groups
  7. Power Platform Default Permissions: A Risk to Address
  8. Automation and Governance with Power Platform APIs
  9. Conclusion

Security is a critical component when managing customer environments in Microsoft ecosystems. To address this, Microsoft introduced Granular Delegated Admin Privileges (GDAP) — a modern security model that gives partners precise control over the administrative permissions they use when working on customer tenants.

Unlike the former Delegated Admin Privileges (DAP) model, which granted broad and often excessive access, GDAP enables fine‑grained, role‑based, and time‑limited permissions, significantly improving security and compliance.

Granular permissions
Partners can request only the exact administrative rights required for their responsibilities, reducing unnecessary exposure.

Enhanced security
Access is limited to specific resources and actions, strengthening both partner and customer security posture.

Regulatory compliance
GDAP follows the principle of least privilege, aligning with modern compliance and governance requirements.

GDAP introduces a trust-based model between partners and customers.

Partners create security groups in their own tenant that define which users are allowed to intervene on customer environments. These groups are then linked through the Partner Center.

The customer remains fully in control:

  • The partner submits a GDAP access request
  • The customer approves or rejects the request
  • Access is granted only for a defined time period

This ensures that interventions are controlled, traceable, and temporary.

Example of access segregation

Different teams can be clearly separated:

  • A Dynamics 365 team may only access Dynamics administration
  • No access is granted to Azure or other workloads

This segregation greatly reduces security risks and accidental over‑permissions.

Partners can request GDAP relationships directly from the Partner Center through a three‑step process:

  1. Submit a request
    Define required permissions and access duration.
  2. Customer approval
    The customer reviews and explicitly approves the request.
  3. Access management
    Permissions can be monitored and adjusted from the Partner Center.

Once approved, partners can administer Dynamics 365 and Power Platform environments within the approved scope.

An additional advantage of GDAP is visibility:

  • Overview of all customer connections
  • Clear view of upcoming access expirations
  • Dashboard monitoring
  • Reminders for expiring permissions

This improves operational governance and avoids forgotten permanent access.

Microsoft allows different administrative roles depending on the level of responsibility required. These roles can be configured in Microsoft Entra ID or the Microsoft 365 Admin Center.

Dynamics 365 Administrator

This role allows administrators to:

  • Manage environments
  • Install and manage Dynamics 365 applications
  • Manage environment groups
  • Focus strictly on Dynamics 365 administration

Power Platform Administrator

This role includes all Dynamics 365 Administrator permissions, plus additional capabilities:

  • Power Platform governance
  • Capacity management
  • Billing oversight
  • Global visibility across the Power Platform

This role is ideal for platform governance teams rather than application-only administrators.

Each Power Platform environment can have its own Environment Administrators.

These administrators can:

  • Manage a specific environment or environment group
  • Operate independently from global administrators
  • Have restricted visibility of business data

This model is particularly useful when customers have strong data security constraints. Administrators can maintain and configure environments without accessing sensitive business data — eliminating the need for anonymized environments.

Microsoft Entra ID security groups can be linked directly to Power Platform environments.

Benefits include:

  • Automatic role inheritance when users join a group
  • Centralized access management
  • Ability to build group hierarchies

This approach simplifies administration and ensures consistent security across teams.

By default, the Power Platform is highly permissive.

If no governance rules are defined:

  • Any user in the tenant can create environments

This can quickly lead to uncontrolled growth, security risks, and governance issues.

Organizations are strongly encouraged to:

  • Design a clear security model
  • Integrate governance into their Power Platform strategy
  • Control environment creation and administrative access

With the introduction of Power Platform APIs, organizations can now:

  • Automate governance workflows
  • Request temporary administrative access
  • Manage maintenance operations programmatically

This enables a modern, secure, and scalable governance model aligned with enterprise security standards.

GDAP, combined with structured administrator roles, environment-level security, and automation, forms the foundation of a secure and compliant Microsoft Power Platform and Dynamics 365 governance model.

By moving away from broad administrative access and adopting least‑privilege, time‑bound permissions, organizations can significantly reduce risk while maintaining operational efficiency.

Security is no longer a limitation — it becomes an enabler for controlled and trusted collaboration.


Comments

Leave a comment