diff --git a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md index 1af576f7ebb..ea55fa9aee8 100644 --- a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md +++ b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md @@ -32,8 +32,8 @@ Work together with the resource tenant owners to determine why the service princ | Scenario | Action | |--|--| -| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. | -| The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference. | +| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](/entra/identity/enterprise-apps/deactivate-application-portal) article.| +| The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference.| ## More information