Conditional access in Fabric

The Conditional Access feature in Microsoft Entra ID offers several ways enterprise customers can secure apps in their tenants, including:

  • Multifactor authentication
  • Allowing only Intune enrolled devices to access specific services
  • Restricting user locations and IP ranges

For more information on the full capabilities of Conditional Access, see the article Microsoft Entra Conditional Access documentation.

Configure conditional access for Fabric

To ensure that conditional access for Fabric works as intended and expected, it's recommended to adhere to the following best practices:

  • Configure a single, common, conditional access policy for the Power BI Service, Azure Data Explorer, Azure SQL Database, and Azure Storage. Having a single, common policy significantly reduces unexpected prompts that might arise from different policies being applied to downstream services, and the consistent security posture provides the best user experience in Microsoft Fabric and its related products.

    The products to include in the policy are the following:

    Product

    • Power BI Service
    • Azure Data Explorer
    • Azure SQL Database
    • Azure Storage
  • If you create a restrictive policy (such as one that blocks access for all apps except Power BI), certain features, such as dataflows, won't work.

Note

If you already have a conditional access policy configured for Power BI, be sure to include the other products listed above in your existing Power BI policy, otherwise conditional access may not operate as intended in Fabric.

The following steps show how to configure a conditional access policy for Microsoft Fabric.

  1. Sign in to the Azure portal using an account with global administrator permissions.
  2. Select Microsoft Entra ID.
  3. On the Overview page, choose Security from the menu.
  4. On the Security | Getting started page, choose Conditional Access.
  5. On the Conditional Access | Overview page, select +Create new policy.
  6. Provide a name for the policy.
  7. Under Assignments, select the Users field. Then, on the Include tab, choose Select users and groups, and then check the Users and groups checkbox. The Select users and groups pane opens, and you can search for and select a Microsoft Entra user or group for conditional access. When done, click Select.
  8. Place your cursor in the Target resources field and choose Cloud apps from the drop-down menu. Then, on the Include tab, choose Select apps and place your cursor in the Select field. In the Select side pane that appears, find and select Power BI Service, Azure Data Explorer, Azure SQL Database, and Azure Storage. When you've selected all four items, close the side pane by clicking Select.
  9. Under Access controls, put your cursor in the Grant field. In the Grant side pane that appears, configure the policy you want to apply, and then click Select.
  10. Set the Enable policy toggle to On, then select Create.