Understand Microsoft Fabric admin roles
To be a Microsoft Fabric admin for your organization, you must be in one of the following roles:
Power Platform administrator
Fabric administrator
Microsoft 365 user admins assign users to the Fabric administrator or Power Platform administrator roles in the Microsoft 365 admin portal, or by using a PowerShell script. For more information, see Assign roles to user accounts with PowerShell.
Users in Fabric administrator and Power Platform administrator roles have full control over org-wide Microsoft Fabric settings and admin features, except for licensing. Once a user is assigned an admin role, they can access the admin portal. There, they have access to org-wide usage metrics and can control org-wide usage of Microsoft Fabric features. These admin roles are ideal for users who need access to the Fabric admin portal without also granting those users full Microsoft 365 administrative access.
To assign users to an admin role in the Microsoft 365 admin portal, follow these steps.
In the Microsoft 365 admin portal, select Users > Active Users.
Select the user that you want to assign the role to.
Under Roles, select Manage roles.
Expand Show all by category, then select Fabric administrator or Power Platform administrator.
Select Save changes.
You can also assign users to roles by using PowerShell. Users are managed in Microsoft Graph PowerShell. If you don't already have the Microsoft Graph PowerShell SDK, download and install the latest version.
Connect to your tenant:
Connect-MgGraph -Scopes "RoleManagement.Read.Directory","User.Read.All","RoleManagement.ReadWrite.Directory"
Get the Id for the Fabric administrator role. You can run Get-MgDirectoryRole to get the Id.
Get-MgDirectoryRole
Id DisplayName Description -------- ----------- ----------- 6ebd1a24-c502-446f-94e5-fa2997fd26c3 Fabric Administrator Manages all aspects of Microsoft Fabric. 70fd9723-a627-48ef-8b2c-82c22b65211e SharePoint Administrator Can manage all aspects of the SharePoint service. 727aeffc-89db-4d43-a680-8b36f56b38c5 Windows Update Deployment Administrator Can create and manage all aspects of Windows Update deployments through the Windows Update for Business deployment service. 7297504b-c536-41f6-af7c-d742d59b2541 Security Operator Creates and manages security events. 738e1e1e-f7ec-4d99-b6b4-1c190d880b4d Application Administrator Can create and manage all aspects of app registrations and enterprise apps. 782450d2-5aae-468e-a4fb-1103e1be6833 Service Support Administrator Can read service health information and manage support tickets. 80f7e906-2e72-4db0-bd50-3b40545685a5 Attribute Assignment Administrator Assign custom security attribute keys and values to supported Azure AD objects. 831d152c-42b8-4dc9-826e-42f8419afc9c Partner Tier2 Support Do not use - not intended for general use.
In this case, the role's Id is 6ebd1a24-c502-446f-94e5-fa2997fd26c3.
Next, get the user's Id. You can find that by running Get-MgUser.
Get-MgUser -ConsistencyLevel eventual -Search '"UserPrincipalName:Casey@contoso.com"'
DisplayName Id Mail UserPrincipalName ----------- -- ---- ----------------- Casey Jensen 00aa00aa-bb11-cc22-dd33-44ee44ee44ee Casey@contoso.com Casey@contoso.com
To add the member to the role, run New-MgDirectoryRoleMemberByRef.
$DirectoryRoleId = "6ebd1a24-c502-446f-94e5-fa2997fd26c3" $UserId = "00aa00aa-bb11-cc22-dd33-44ee44ee44ee" New-MgDirectoryRoleMemberByRef -DirectoryRoleId $DirectoryRoleId ` -OdataId "https://graph.microsoft.com/v1.0/directoryObjects/$UserId"
To learn more about using PowerShell to assign admin roles, see Microsoft.Graph.Identity.DirectoryManagement.