Skip to content

Commit 29cb608

Browse files
Merge pull request #250196 from omondiatieno/disable-signin
Disable sign in - Update UI steps
2 parents 7640ce1 + 38b5d2c commit 29cb608

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -26,18 +26,17 @@ In this article, you learn how to prevent users from signing in to an applicatio
2626

2727
To disable user sign-in, you need:
2828

29-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30-
- One of the following roles: An administrator, or owner of the service principal.
29+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3131

3232
## Disable user sign-in
3333

3434
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3535

3636
:::zone pivot="portal"
3737

38-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator for your directory.
39-
1. Search for and select **Azure Active Directory**.
40-
1. Select **Enterprise applications**.
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
39+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
4140
1. Search for the application you want to disable a user from signing in, and select the application.
4241
1. Select **Properties**.
4342
1. Select **No** for **Enabled for users to sign-in?**.
@@ -49,11 +48,11 @@ To disable user sign-in, you need:
4948

5049
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
5150

52-
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER.
51+
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
5352

5453
```PowerShell
5554
# Connect to Azure AD PowerShell
56-
Connect-AzureAD -Scopes "Application.ReadWrite.All"
55+
Connect-AzureAD -Scopes
5756
5857
# The AppId of the app to be disabled
5958
$appId = "{AppId}"
@@ -74,7 +73,7 @@ if ($servicePrincipal) {
7473

7574
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
7675

77-
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`).
76+
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`). You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
7877

7978
```powershell
8079
# Connect to Microsoft Graph PowerShell
@@ -98,7 +97,7 @@ else { $servicePrincipal = New-MgServicePrincipal -AppId $appId –AccountEnabl
9897

9998
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
10099

101-
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
100+
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
102101

103102
You need to consent to the `Application.ReadWrite.All` permission.
104103

0 commit comments

Comments
 (0)