Starting on January 26, 2026, we will introduce strict Content Security Policy (CSP) enforcement for Power Apps code apps (preview). CSP is a security feature that protects apps from malicious content by restricting which external sources an app can access.
How does this affect me?
After January 30, 2026, Power Apps code apps that call assets outside of Power Apps domains will have those requests blocked by default. The code app will play, but these assets called from an external source will not load.
Please visit How to: Configure Content Security Policy (preview) – Power Apps for more information about the default CSP configuration.
What action do I need to take?
To enable your code app to call assets from external sources, you will need to allowlist any required external sources using the CSP configuration settings in the Power Platform admin center.
To prepare for this change, we recommend you configure CSP by using Power Platform admin center and follow the steps below. We recommend taking these steps if you are unsure about what your CSP configuration should be, and your code app is business critical:
- Temporarily toggle off the Enforce content security policy setting.
- Toggle on the Enable reporting setting.
- Test which sources need to be added to your allowlist after the enforcement date of January 30, 2026.
- Add the required sources to your allowlist.
- Toggle on the Enforce content security policy setting.
Please contact Microsoft Support if you need further assistance.
Source: Microsoft
Latest Posts
- Frontier Admin Control: Single enrollment across all apps, platforms, and agents [MC1256117]
![Frontier Admin Control: Single enrollment across all apps, platforms, and agents [MC1256117] 2 pexels strangehappenings 14632013](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- Designer tools in Copilot [MC1256040]
![Designer tools in Copilot [MC1256040] 3 pexels divinetechygirl 1181248](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) Microsoft Office for the web: Apply sensitivity labels with user-defined permissions [MC1208688]
![(Updated) Microsoft Office for the web: Apply sensitivity labels with user-defined permissions [MC1208688] 4 pexels mikebirdy 381228](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) InfoPath 2013 client and InfoPath Forms Services in SharePoint Online will reach end of support in July 2026 [MC616550]
![(Updated) InfoPath 2013 client and InfoPath Forms Services in SharePoint Online will reach end of support in July 2026 [MC616550] 5 pexels pavel danilyuk 8438918](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
![Power Apps – Content Security Policy enforcement for Power Apps code apps [MC1218747] 1 Power Apps – Content Security Policy enforcement for Power Apps code apps [MC1218747]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-rodrigo-souza-1275988-2531608-1024x683.webp)
![Frontier Admin Control: Single enrollment across all apps, platforms, and agents [MC1256117] 2 pexels strangehappenings 14632013](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-strangehappenings-14632013-150x150.webp)
![Designer tools in Copilot [MC1256040] 3 pexels divinetechygirl 1181248](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-divinetechygirl-1181248-150x150.webp)
![(Updated) Microsoft Office for the web: Apply sensitivity labels with user-defined permissions [MC1208688] 4 pexels mikebirdy 381228](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-mikebirdy-381228-150x150.webp)
![(Updated) InfoPath 2013 client and InfoPath Forms Services in SharePoint Online will reach end of support in July 2026 [MC616550] 5 pexels pavel danilyuk 8438918](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-pavel-danilyuk-8438918-150x150.webp)
