Verify that That 'Users Can Register Applications' Is Set to 'No'
Framework Reference: 6.14 Application Registration Restrictions – Microsoft Entra ID (Level 1)
Why this matters
- Allowing all users to register applications in Microsoft Entra ID increases the risk of unauthorized or malicious applications gaining access to directory data.
- When users can freely register applications:
- Third-party or custom apps may bypass formal security review
- Excessive API permissions may be granted without oversight
- Sensitive directory data may be exposed
- Attackers may leverage app registrations for persistence or privilege escalation
- Restricting application registration to administrators (or tightly delegated roles) ensures:
- Proper security review before exposure to identity data
- Controlled permission grants
- Alignment with least-privilege and privileged access strategies
- This is a foundational governance control for identity security.
What this check does
This Auto Check verifies whether non-administrative users are prevented from registering applications in Microsoft Entra ID.
Check Logic
Passes if:
Users can register applicationsis set to No, andAllowedToCreateAppsis set to False in the authorization policy.
Fails if:
The setting is Yes, or
AllowedToCreateAppsreturns True.
Applies to:
- Microsoft Entra ID tenant-wide settings
- All users within the directory
- The check queries Microsoft Graph authorization policy settings.
How to fix it
Disable user self-service application registration.
Azure Portal
- From Azure Home, open the Portal Menu.
- Select Microsoft Entra ID.
- Under Manage, select Users.
- Under Manage, select User settings.
- Set Users can register applications to No.
- Click Save.
PowerShell (Microsoft Graph)
Verify current setting:
(Get-MgPolicyAuthorizationPolicy).DefaultUserRolePermissions | Format-List AllowedToCreateApps
Remediate if needed:
$param = @{ AllowedToCreateApps = "$false" }
Update-MgPolicyAuthorizationPolicy -DefaultUserRolePermissions $param
Default value
By default, Users can register applications is set to Yes.
Impact
- Increases administrative workload due to app registration approval requests.
- May require delegation models for developer teams.
- If delegation is poorly controlled, privileged users could still approve malicious applications.
- Organizations should balance operational efficiency with security risk by defining a formal approval and delegation process.
Exceptions
If developers or integration teams require application registration capabilities:
- Delegate permissions only to controlled roles.
- Enforce documented security review procedures.
- Monitor app registrations and permission grants regularly.
- Implement conditional access and app governance policies.
References
- https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/delegate-app-roles#restrict-who-can-create-applications
- https://learn.microsoft.com/en-us/entra/identity-platform/how-applications-are-added#who-has-permission-to-add-applications-to-my-azure-ad-instance
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-governance-strategy#gs-6-define-and-implement-identity-and-privileged-access-strategy
- https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-privileged-access#pa-1-separate-and-limit-highly-privilegedadministrative-users
- https://learn.microsoft.com/en-us/powershell/module/microsoft.graph.identity.signins/get-mgpolicyauthorizationpolicy?view=graph-powershell-1.0