Configure how end-users consent to applications

Applications can integrate with the Microsoft Identity platform to allow users to sign in using their work or school account in Azure Active Directory (Azure AD), and to access your organization's data to deliver rich data-driven experiences. Different permissions allow the application different level of access to your users' and your organization's data.

By default, users can consent to applications accessing your organization's data, although only for some permissions. For example, by default a user can consent to allow an app to access their own mailbox or the Teams conversations for a team the user owns, but cannot consent to allow an app unattended access to read and write to all SharePoint sites in your organization. While allowing users to consent by themselves does allow users to easily acquire useful applications that integrate with Microsoft 365, Azure and other services, it can represent a risk if not used and monitored carefully.

Microsoft recommends disabling future user consent operations to help reduce your surface area and mitigate this risk. If user consent is disabled, previous consent grants will still be honored but all future consent operations must be performed by an administrator. Tenant-wide admin consent can be requested by users through an integrated admin consent request workflow or through your own support processes. See Five steps to securing your identity infrastructure for more details.

You can use the Azure portal to disable or enable users' ability to consent to applications accessing your organization's data:

  1. Sign in to the Azure portal as a Global Administrator.
  2. Select Azure Active Directory, then Enterprise applications, then User settings.
  3. Enable or disable user consent with the control labeled Users can consent to apps accessing company data on their behalf.
  4. (Optional) Configure admin consent request workflow to ensure users who aren't allowed to consent to an app can request approval.


To allow users to request an administrator's review of an application that the user is not allowed to consent to (for example, because user consent has been disabled, or because the application is requesting permissions that the user is not allowed to grant), consider configuring the admin consent workflow.

You can use the Azure AD PowerShell v1 module (MSOnline), to enable or disable users' ability to consent to applications accessing your organization's data.

  1. Sign in to your organization by running this cmdlet:

  2. Check if user consent is enabled by running this cmdlet:

    Get-MsolCompanyInformation | Format-List UsersPermissionToUserConsentToAppEnabled
  3. Enable or disable user consent. For example, to disable user consent, run this cmdlet:

    Set-MsolCompanySettings -UsersPermissionToUserConsentToAppEnabled $false


The following information is for an upcoming feature which will allow group owners to grant applications access to their groups' data. When this capability is released, it will be enabled by default. Although this feature is not yet released widely, you can use these instructions to disable the capability in advance of its release.

Group owners can authorize applications (for example, applications published by third-party vendors) to access your organization's data associated with a group. For example, a team owner (who is the owner of the Office 365 Group for the team) can allow an app to read all Teams messages in the team, or list the basic profile of a group's members.


Independent of this setting, a group owner is always allowed to add other users or apps directly as a group owners.

You can use the Azure AD PowerShell Preview module (AzureADPreview), to enable or disable group owners' ability to consent to applications accessing your organization's data for the groups they own.

  1. Ensure you are using the AzureADPreview module (this step is important if you have installed both the AzureAD module and the AzureADPreview module).

    Remove-Module AzureAD
    Import-Module AzureADPreview
  2. Connect to Azure AD PowerShell.

  3. Retrieve the current value for the Consent Policy Settings directory settings in your tenant. This requires checking if the directory settings for this feature have been created, and if not, using the values from the corresponding directory settings template.

    $consentSettingsTemplateId = "dffd5d46-495d-40a9-8e21-954ff55e198a" # Consent Policy Settings
    $settings = Get-AzureADDirectorySetting -All $true | Where-Object { $_.TemplateId -eq $consentSettingsTemplateId }
    if (-not $settings) {
        $template = Get-AzureADDirectorySettingTemplate -Id $consentSettingsTemplateId
        $settings = $template.CreateDirectorySetting()
    $enabledValue = $settings.Values | ? { $_.Name -eq "EnableGroupSpecificConsent" }
    $limitedToValue = $settings.Values | ? { $_.Name -eq "ConstrainGroupSpecificConsentToMembersOfGroupId" }
  4. Understand the setting values. There are two settings values that define which users would be able to allow an app to access their group's data:

    Setting Type Description
    EnableGroupSpecificConsent Boolean Flag indicating if groups owners are allowed to grant group-specific permissions.
    ConstrainGroupSpecificConsentToMembersOfGroupId Guid If EnableGroupSpecificConsent is set to "True" and this value set to a group's object ID, members of the group identified will be authorized to grant group-specific permissions to the groups they own.
  5. Update settings values for the desired configuration:

    # Disable group-specific consent entirely
    $enabledValue.Value = "False"
    $limitedToValue.Value = ""
    # Enable group-specific consent for all users
    $enabledValue.Value = "True"
    $limitedToValue.Value = ""
    # Enable group-specific consent for users in a given group
    $enabledValue.Value = "True"
    $limitedToValue.Value = "{group-object-id}"
  6. Save settings.

    if ($settings.Id) {
        # Update an existing directory settings
        Set-AzureADDirectorySetting -Id $settings.Id -DirectorySetting $settings
    } else {
        # Create a new directory settings to override the default setting 
        New-AzureADDirectorySetting -DirectorySetting $settings

Next steps

Configure the admin consent workflow

Grant tenant-wide admin consent to an application

Permissions and consent in the Microsoft identity platform

Azure AD on StackOverflow