Skip to content

Commit 5208232

Browse files
authored
clickthrough rate fix
1 parent fe79236 commit 5208232

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,19 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/23/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
1515
#customer intent: As an admin, I want to disable the way a user signs in for an application so that no user can sign in to it in Azure Active Directory.
1616
---
17-
# Disable how a user signs in for an application
17+
# Disable user sign-in for an application
18+
19+
There may be situations while configuring or managing an application where you don't want tokens to be issued for an application. Or, you may want to preemptively block an application that you do not want your employees to try to access. To accomplish this, you can disable user sign-in for the application, which will prevent all tokens from being issued for that application.
20+
21+
In this article, you will learn how to disable how a user signs in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
22+
1823

19-
In this article, you disable how a user signs in to an application in Azure Active Directory.
2024

2125
## Prerequisites
2226

@@ -39,7 +43,7 @@ To disable how a user signs in, you need:
3943

4044
Ensure you have installed the AzureAD module (use the command Install-Module -Name AzureAD). In case you are prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
4145

42-
If you know the AppId of an app that doesn't appear on the Enterprise apps list (for example, because you deleted the app or the service principal hasn't yet been created due to the app being pre-authorized by Microsoft), you can manually create the service principal for the app and then disable it by using [AzureAD PowerShell cmdlet](/powershell/module/azuread/New-AzureADServicePrincipal).
46+
If you know the AppId of an app that doesn't appear on the Enterprise apps list (for example, because you deleted the app or the service principal hasn't yet been created due to the app being pre-authorized by Microsoft), you can manually create the service principal for the app and then disable it by using the cmdlet below.
4347

4448
```PowerShell
4549
# The AppId of the app to be disabled

0 commit comments

Comments
 (0)