How to Deactivate Enterprise Applications in Microsoft Entra ID

Deactivate an enterprise application

Security teams frequently encounter situations where they need to immediately stop an application’s access to organizational resources. Whether it’s suspicious API activity, a compromised integration, or a compliance requirement, administrators need a solution that blocks access instantly without destroying configuration data that took weeks to set up.

Application deactivation in Microsoft Entra ID provides this capability, allowing you to halt an app’s access while preserving all settings for future investigation or reactivation.

What Does Deactivating an Enterprise Application in Microsoft Entra Mean?

Deactivating an enterprise application stops it from accessing your organization’s resources without deleting its configuration. When you deactivate an app in Microsoft Entra, you immediately prevent it from getting new access while preserving all its settings and configuration data.

When you deactivate an application:

  • Access tokens: The app can no longer request new access tokens
  • User sign-in: Users cannot sign in and receive an error message
  • Existing tokens: Current access tokens remain valid until they expire (typically 1 hour)
  • Configuration preservation: All permissions, settings, user assignments, and certificates remain intact

When to Deactivate an Enterprise Application

  • Conducting Security Investigations Without Losing Data: When you suspect a security issue but need time to investigate, deactivation stops the app’s access immediately while preserving all configuration data for forensic analysis.
  • Temporary Application Suspension for Compliance: When a vendor’s security certificate expires or you’re waiting for them to patch a vulnerability, deactivation lets you pause the integration without rebuilding everything from scratch.
  • Preserving Complex Application Configurations in Microsoft Entra: Enterprise applications often require weeks to configure properly. Custom API permissions, user role mappings, and federated authentication settings are preserved during deactivation, allowing you to reactivate without reconfiguration.
  • Application Deactivation During Compliance Audits: During compliance reviews, you can temporarily disable applications that don’t meet current security standards while working with vendors to update them.

📝 Note:

Before deactivating the application, remove all assigned owners.

This ensures that only users with the tenant-wide microsoft.directory/applications/enable permission can reactivate the application.

How to Deactivate Enterprise Applications Using Microsoft Graph API

Prerequisites for Deactivating Applications in Microsoft Entra ID

You need:

-> Role: Cloud Application Administrator or Application Administrator

-> API permissions: Application.ReadWrite.All (delegated or application) / Application.ReadWrite.OwnedBy (application, for owned apps only)

1. Find Your Application ID in Microsoft Entra

If you don’t have the application ID, search by name:

GET https://graph.microsoft.com/v1.0/applications?$filter=displayName eq 'YourAppName'

2. Deactivate the Enterprise Application Using Graph API

Use the PATCH endpoint to set the isDisabled flag:

PATCH https://graph.microsoft.com/beta/applications/{application-id}
Content-Type: application/json

{
    "isDisabled": true
}

3. Verify Application Deactivation Status Confirm the deactivation

GET https://graph.microsoft.com/beta/applications/{application-id}

Look for "isDisabled": true in the response.

How to View All Deactivated Applications in Microsoft Entra ID

GET https://graph.microsoft.com/beta/applications?$filter=isDisabled eq true

Check Specific Application Deactivation Status

GET https://graph.microsoft.com/beta/applications/{application-id}?$select=displayName,isDisabled,appId

How to Reactivate Enterprise Applications in Microsoft Entra ID

PATCH https://graph.microsoft.com/v1.0/applications/{application-id}
Content-Type: application/json

{
    "isDisabled": false
}

Verify Successful Application Reactivation Confirm reactivation status:

GET https://graph.microsoft.com/v1.0/applications/{application-id}?$select=displayName,isDisabled

You should see "isDisabled": false in the response.

Application deactivation in Microsoft Entra ID is an essential security control that gives administrators the ability to respond quickly to threats without sacrificing operational efficiency.

By understanding when to use deactivation versus other blocking methods, following the proper API procedures, and implementing best practices during investigations, you can protect your organization’s resources while maintaining the flexibility to restore access when appropriate.

Previous Article

New Content Management Assessment Tool in SharePoint

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Subscribe to Newsletter

Subscribe to our email newsletter to get the latest posts delivered right to your email.
Powered by Amail.