Introduction
Microsoft Fabric is introducing a new workspace-level scope for workload assignment, enabling Workspace Admins to add workloads directly to their workspaces without requiring capacity-level configuration. This enhancement simplifies workload onboarding and promotes broader adoption across your organization.
When this will happen
Public Preview rollout begins mid-September 2025.
How this affects your organization
- A new tenant setting titled Allow workspace admins to add workloads will appear under Tenant Settings > Additional Workloads.
- This setting is enabled by default.
- When enabled, Workspace Admins can add workloads from the More workloads gallery directly to their workspace.
- This capability is independent of capacity-level settings. Workloads added at the workspace level will persist even if removed from capacity-level assignment.
- You can disable this behavior at any time via the Fabric Admin Portal.
- Disabling the setting does not remove existing workspace-level workloads.
- Important: Even when workspace-scope workload assignment is enabled, users and/or tenant admins must still provide Entra ID consents according to tenant policies to add and interact with workloads. This ensures user-level permissions and security boundaries are respected.
What you can do to prepare
- Review the new tenant setting once available.
- If your organization prefers centralized governance, disable the setting to maintain current controls.
- Notify Workspace Admins if you choose to keep the setting enabled.
- Ensure users are aware of Entra ID consent requirements:- Consent must be provided per tenant policies.
- This applies to both adding workloads and interacting with their items.
- Consent ensures workloads operate within authorized access boundaries.
 
Learn more: Add a workload in the workload hub (will be updated soon)
Compliance considerations| Compliance Area | Explanation | 
|---|---|
| Does the change alter how existing customer data is processed, stored, or accessed? | Workloads added at workspace scope may access user data, subject to Entra ID consent. | 
| Does the change modify how users can access, export, delete, or correct their personal data within Microsoft 365 services (GDPR Data Subject Rights)? | Access to workloads and their items is gated by Entra ID consent, which aligns with GDPR access controls. | 
| Does the change include an admin control and, can it be controlled through Entra ID group membership? | Admins can toggle the feature in the Fabric Admin Portal, and workload access can be scoped via Entra ID policies. | 
Source: Microsoft
Latest Posts
- GCP Release Notes: October 30, 2025 
- Updates available for Microsoft 365 Apps for Current Channel [MC1181780]![Updates available for Microsoft 365 Apps for Current Channel [MC1181780] 3 pexels apasaric 1411677](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==) 
- Microsoft Teams: File attachment control now enabled by default in external 1:1 and group chats [MC1181772]![Microsoft Teams: File attachment control now enabled by default in external 1:1 and group chats [MC1181772] 4 pexels scottwebb 593158](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==) 
- Microsoft Purview: eDiscovery admin content access restrictions when not in compliance with Entra policies [MC1181768]![Microsoft Purview: eDiscovery admin content access restrictions when not in compliance with Entra policies [MC1181768] 5 pexels ekaterina bolovtsova 4049991](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==) 
![Workspace-level workload assignment in Microsoft Fabric [MC1137612] 1 Workspace-level workload assignment in Microsoft Fabric [MC1137612]](https://mwpro.co.uk/wp-content/uploads/2025/06/teddy-bear-1835598_1920-1024x683.webp)

![Updates available for Microsoft 365 Apps for Current Channel [MC1181780] 3 pexels apasaric 1411677](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-apasaric-1411677-150x150.webp)
![Microsoft Teams: File attachment control now enabled by default in external 1:1 and group chats [MC1181772] 4 pexels scottwebb 593158](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-scottwebb-593158-150x150.webp)
![Microsoft Purview: eDiscovery admin content access restrictions when not in compliance with Entra policies [MC1181768] 5 pexels ekaterina bolovtsova 4049991](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-ekaterina-bolovtsova-4049991-150x150.webp)
![Streaming API support for Data Security tables in Microsoft Defender XDR Advanced Hunting [MC1137606] 6 Streaming API support for Data Security tables in Microsoft Defender XDR Advanced Hunting [MC1137606]](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-jan-krnc-268225-840810-96x96.webp) 
 ![Fix update: Enforcement of Admin Settings in Fabric Public API and CI/CD [MC1137600] 7 Fix update: Enforcement of Admin Settings in Fabric Public API and CI/CD [MC1137600]](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-googledeepmind-25630347-96x96.webp)