From 66867c9190f1fad6fcab576b22ad993f803e5f9f Mon Sep 17 00:00:00 2001 From: Ari Schorr <89283329+AriSchorr1@users.noreply.github.com> Date: Fri, 30 Jan 2026 12:22:46 -0800 Subject: [PATCH 1/5] Update error code documentation for AADSTS7000112 on backing application global disablement Clarified scenarios and actions regarding service principal status, including potential global disablement of the backing application by administrators, app owners, or Microsoft. --- .../error-code-aadsts7000112-application-is-disabled.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md index 1af576f7ebb..9bf879b50d9 100644 --- a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md +++ b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md @@ -32,8 +32,8 @@ Work together with the resource tenant owners to determine why the service princ | Scenario | Action | |--|--| -| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. | -| The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference. | +| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](docs/identity/enterprise-apps/deactivate-application-portal.md) article | +| The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference.| ## More information From 31f29f20d40b46227bcafd37f09c7804bf250bfb Mon Sep 17 00:00:00 2001 From: Ari Schorr <89283329+AriSchorr1@users.noreply.github.com> Date: Fri, 30 Jan 2026 12:27:38 -0800 Subject: [PATCH 2/5] Fix punctuation in service principal action table Added a period at the end of the action description for clarity. --- .../error-code-aadsts7000112-application-is-disabled.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md index 9bf879b50d9..965e7528634 100644 --- a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md +++ b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md @@ -32,7 +32,7 @@ Work together with the resource tenant owners to determine why the service princ | Scenario | Action | |--|--| -| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](docs/identity/enterprise-apps/deactivate-application-portal.md) article | +| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](docs/identity/enterprise-apps/deactivate-application-portal.md) article.| | The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference.| ## More information From eba418e493e7e7fc9d2deac4207335d7f9b9384f Mon Sep 17 00:00:00 2001 From: Ari Schorr <89283329+AriSchorr1@users.noreply.github.com> Date: Mon, 2 Feb 2026 20:35:10 -0800 Subject: [PATCH 3/5] Try to fix Update link in error code documentation --- .../error-code-aadsts7000112-application-is-disabled.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md index 965e7528634..dd19b05e0dd 100644 --- a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md +++ b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md @@ -32,7 +32,7 @@ Work together with the resource tenant owners to determine why the service princ | Scenario | Action | |--|--| -| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](docs/identity/enterprise-apps/deactivate-application-portal.md) article.| +| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](docs/identity/enterprise-apps/deactivate-application-portal) article.| | The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference.| ## More information From 1c7c1d511abd05fe3439b8f4f5ab3dc8f95a6259 Mon Sep 17 00:00:00 2001 From: Ari Schorr <89283329+AriSchorr1@users.noreply.github.com> Date: Tue, 3 Feb 2026 09:48:35 -0800 Subject: [PATCH 4/5] Update link to deactivate application article --- .../error-code-aadsts7000112-application-is-disabled.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md index dd19b05e0dd..b7d316f286a 100644 --- a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md +++ b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md @@ -32,7 +32,7 @@ Work together with the resource tenant owners to determine why the service princ | Scenario | Action | |--|--| -| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](docs/identity/enterprise-apps/deactivate-application-portal) article.| +| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](entra/identity/enterprise-apps/deactivate-application-portal) article.| | The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference.| ## More information From 50ccf1b0de96690b8fee0f63a22721fc7bd2f2df Mon Sep 17 00:00:00 2001 From: Ari Schorr <89283329+AriSchorr1@users.noreply.github.com> Date: Tue, 3 Feb 2026 09:58:08 -0800 Subject: [PATCH 5/5] Fix link formatting in error code documentation --- .../error-code-aadsts7000112-application-is-disabled.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md index b7d316f286a..ea55fa9aee8 100644 --- a/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md +++ b/support/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled.md @@ -32,7 +32,7 @@ Work together with the resource tenant owners to determine why the service princ | Scenario | Action | |--|--| -| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](entra/identity/enterprise-apps/deactivate-application-portal) article.| +| The service principal is supposed to be disabled. | Don't do anything. Access is intentionally blocked. We don't expect or recommend that resource tenant administrators of first-party applications disable the respective service principal. Microsoft Services automatically provisions and manages the service principals. It is possible that the backing application associated with this service principal was intentionally disabled globally by the home tenant administrator, the app owner, or by Microsoft. For more information, see the [Deactivate an enterprise application](/entra/identity/enterprise-apps/deactivate-application-portal) article.| | The service principal isn't supposed to be disabled, or it was disabled mistakenly. | Ask the resource tenant owners to re-enable the service principal. One method to re-enable the service principal is to use PowerShell to set the `-AccountEnabled` parameter to `$true`. For more information, see the [Set-AzureADServicePrincipal](/powershell/module/azuread/set-azureadserviceprincipal#example-1-disable-the-account-of-a-service-principal) cmdlet reference.| ## More information