You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/disable-user-sign-in-portal.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Disable how a how a user signs in
2
+
title: Disable user sign-in for application
3
3
description: How to disable an enterprise application so that no users may sign in to it in Azure Active Directory
4
4
services: active-directory
5
5
author: eringreenlee
@@ -12,19 +12,19 @@ ms.date: 09/06/2022
12
12
ms.author: ergreenl
13
13
ms.custom: it-pro
14
14
ms.collection: M365-identity-device-management
15
-
#customer intent: As an admin, I want to disable the way a user signs in for an application so that no user can sign in to it in Azure Active Directory.
15
+
#customer intent: As an admin, I want to disable user sign-in for an application so that no user can sign in to it in Azure Active Directory.
16
16
---
17
17
# Disable user sign-in for an application
18
18
19
19
There may be situations while configuring or managing an application where you don't want tokens to be issued for an application. Or, you may want to preemptively block an application that you do not want your employees to try to access. To accomplish this, you can disable user sign-in for the application, which will prevent all tokens from being issued for that application.
20
20
21
-
In this article, you will learn how to disable how a user signs in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
21
+
In this article, you will learn how to prevent users from signing in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
22
22
23
23
24
24
25
25
## Prerequisites
26
26
27
-
To disable how a user signs in, you need:
27
+
To disable user sign-in, you need:
28
28
29
29
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
30
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
Replace id with the object ID of the service principal that you want to restore.
73
+
69
74
:::zone-end
70
75
71
76
:::zone pivot="ms-graph"
@@ -77,7 +82,11 @@ To get the list of deleted enterprise applications in your tenant, run the follo
77
82
```http
78
83
GET https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal
79
84
```
80
-
Record the ID of the enterprise application you want to restore.
85
+
From the list of deleted service principals generated, record the ID of the enterprise application you want to restore.
86
+
87
+
Alternatively, if you want to get the specific enterprise application that was deleted, fetch the deleted service principal and filter the results by the client's application ID (appId) property using the following syntax:
88
+
89
+
`https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=appId eq '{appId}'`. Once you've retrieved the object ID of the deleted service principal, proceed to restore it.
81
90
82
91
:::zone-end
83
92
@@ -89,17 +98,23 @@ Record the ID of the enterprise application you want to restore.
0 commit comments