Skip to content

Commit d6d44b9

Browse files
Merge pull request #214233 from omondiatieno/configure-user-consent
add clarity on how to get deleted service principal
2 parents a335572 + 0346073 commit d6d44b9

File tree

4 files changed

+35
-17
lines changed

4 files changed

+35
-17
lines changed

articles/active-directory/manage-apps/admin-consent-workflow-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
10-
ms.topic: how-to
11-
ms.date: 06/10/2022
10+
ms.topic: conceptual
11+
ms.date: 11/02/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Disable how a how a user signs in
2+
title: Disable user sign-in for application
33
description: How to disable an enterprise application so that no users may sign in to it in Azure Active Directory
44
services: active-directory
55
author: eringreenlee
@@ -12,19 +12,19 @@ ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
15-
#customer intent: As an admin, I want to disable the way a user signs in for an application so that no user can sign in to it in Azure Active Directory.
15+
#customer intent: As an admin, I want to disable user sign-in for an application so that no user can sign in to it in Azure Active Directory.
1616
---
1717
# Disable user sign-in for an application
1818

1919
There may be situations while configuring or managing an application where you don't want tokens to be issued for an application. Or, you may want to preemptively block an application that you do not want your employees to try to access. To accomplish this, you can disable user sign-in for the application, which will prevent all tokens from being issued for that application.
2020

21-
In this article, you will learn how to disable how a user signs in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
21+
In this article, you will learn how to prevent users from signing in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
2222

2323

2424

2525
## Prerequisites
2626

27-
To disable how a user signs in, you need:
27+
To disable user sign-in, you need:
2828

2929
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3030
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.

articles/active-directory/manage-apps/restore-application.md

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 07/28/2022
11+
ms.date: 11/02/2022
1212
ms.author: jomondi
1313
ms.reviewer: sureshja
1414
ms.custom: mode-other
@@ -53,8 +53,11 @@ To recover your enterprise application with its previous configurations, first d
5353
1. To view the recently deleted enterprise application, run the following command:
5454

5555
```powershell
56-
Get-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b'
57-
```
56+
Get-AzureADMSDeletedDirectoryObject -Id <id>
57+
```
58+
59+
Replace id with the object ID of the service principal that you want to restore.
60+
5861
:::zone-end
5962

6063
:::zone pivot="ms-powershell"
@@ -64,8 +67,10 @@ To recover your enterprise application with its previous configurations, first d
6467
1. To view the recently deleted enterprise applications, run the following command:
6568

6669
```powershell
67-
Get-MgDirectoryDeletedItem -DirectoryObjectId 'd4142c52-179b-4d31-b5b9-08940873507b'
70+
Get-MgDirectoryDeletedItem -DirectoryObjectId <id>
6871
```
72+
Replace id with the object ID of the service principal that you want to restore.
73+
6974
:::zone-end
7075

7176
:::zone pivot="ms-graph"
@@ -77,7 +82,11 @@ To get the list of deleted enterprise applications in your tenant, run the follo
7782
```http
7883
GET https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal
7984
```
80-
Record the ID of the enterprise application you want to restore.
85+
From the list of deleted service principals generated, record the ID of the enterprise application you want to restore.
86+
87+
Alternatively, if you want to get the specific enterprise application that was deleted, fetch the deleted service principal and filter the results by the client's application ID (appId) property using the following syntax:
88+
89+
`https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=appId eq '{appId}'`. Once you've retrieved the object ID of the deleted service principal, proceed to restore it.
8190

8291
:::zone-end
8392

@@ -89,17 +98,23 @@ Record the ID of the enterprise application you want to restore.
8998

9099

91100
```powershell
92-
Restore-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b'
101+
Restore-AzureADMSDeletedDirectoryObject -Id <id>
93102
```
103+
104+
Replace id with the object ID of the service principal that you want to restore.
105+
94106
:::zone-end
95107

96108
:::zone pivot="ms-powershell"
97109

98110
1. To restore the enterprise application, run the following command:
99111

100112
```powershell
101-
Restore-MgDirectoryObject -DirectoryObjectId 'd4142c52-179b-4d31-b5b9-08940873507b'
113+
Restore-MgDirectoryObject -DirectoryObjectId <id>
102114
```
115+
116+
Replace id with the object ID of the service principal that you want to restore.
117+
103118
:::zone-end
104119

105120
:::zone pivot="ms-graph"
@@ -109,6 +124,9 @@ Record the ID of the enterprise application you want to restore.
109124
```http
110125
POST https://graph.microsoft.com/v1.0/directory/deletedItems/{id}/restore
111126
```
127+
128+
Replace id with the object ID of the service principal that you want to restore.
129+
112130
:::zone-end
113131

114132
## Permanently delete an enterprise application
@@ -121,7 +139,7 @@ Record the ID of the enterprise application you want to restore.
121139
To permanently delete a soft deleted enterprise application, run the following command:
122140

123141
```powershell
124-
Remove-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b'
142+
Remove-AzureADMSDeletedDirectoryObject -Id <id>
125143
```
126144
:::zone-end
127145

@@ -130,7 +148,7 @@ Remove-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b
130148
1. To permanently delete the soft deleted enterprise application, run the following command:
131149

132150
```powershell
133-
Remove-MgDirectoryDeletedItem -DirectoryObjectId 'd4142c52-179b-4d31-b5b9-08940873507b'
151+
Remove-MgDirectoryDeletedItem -DirectoryObjectId <id>
134152
```
135153

136154
:::zone-end

articles/active-directory/manage-apps/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@
124124
href: assign-user-or-group-access-portal.md
125125
- name: Assign custom security attributes
126126
href: custom-security-attributes-apps.md
127-
- name: Disable user sign-on
127+
- name: Disable user sign-in
128128
href: disable-user-sign-in-portal.md
129129
- name: Force auto-acceleration
130130
href: configure-authentication-for-federated-users-portal.md
@@ -240,7 +240,7 @@
240240
href: application-sign-in-problem-application-error.md
241241
- name: Problem signing into a Microsoft app
242242
href: application-sign-in-problem-first-party-microsoft.md
243-
- name: Deprecate
243+
- name: Delete and restore apps
244244
items:
245245
- name: Delete an enterprise application
246246
href: delete-application-portal.md

0 commit comments

Comments
 (0)