Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderM365 ReportPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderM365 ReportPortfolio

Connect

© 2026 M365 Message Center. Created with ❤ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1300584

Microsoft Entra: App Instance Lock enabled by default for new applications

Plan for Change

Message ID

MC1300584
View in Admin Center

Services

Microsoft Entra

Summary

Microsoft Entra ID will enable App Instance Lock by default for new applications starting June 2026, protecting sensitive properties from unauthorized changes outside the home tenant. Existing apps are unaffected. Admins can disable the lock if needed. Review and update automation or scripts accordingly before rollout.

Details

Introduction

To improve application security, Microsoft Entra ID will enable App Instance Lock by default for newly created applications. This change prevents sensitive application properties from being modified outside the application’s home tenant, reducing the risk of unauthorized changes that can lead to application compromise. Based on our data analysis, we do not expect this change to cause customer impact. App owners or administrators in the application home tenant can still disable App Instance Lock for specific applications if their scenario requires updates to protected properties in other tenants.

When this will happen

General Availability (Worldwide): We will begin rolling out in early June 2026 and expect to complete by late June 2026.

How this affects your organization

Who is affected

  • Microsoft Entra administrators
  • Developers who manage Microsoft Entra applications
  • Organizations using automation or scripts to update application credentials or security settings after app creation

What will happen?

  • App Instance Lock will be enabled by default for all newly created applications.
  • Sensitive service principal properties will be protected by default.
  • Attempts to modify these protected properties will be blocked unless App Instance Lock is explicitly disabled.
  • Blocked update attempts will return a 400 Bad Request error, and the update will not be applied.
  • Existing applications are not affected by this change.

Example Microsoft Graph error returned when attempting to update passwordCredentials on a locked application:

user settings

What you can do to prepare

  • Review automation, scripts, or provisioning workflows that modify service principal credentials or related settings.
  • Validate that existing workflows do not depend on App Instance Lock being disabled and update them to avoid modifying protected properties unless the lock is intentionally disabled.
  • Disable App Instance Lock for specific applications if post‑creation updates are required.
  • Test application provisioning and credential management flows prior to rollout in mid-May.

Learn more: How to configure app instance property lock in your applications | Microsoft identity platform | Microsoft Entra | Microsoft Learn

Compliance considerations

QuestionAnswer
Does the change include an admin control?Yes. Admins can disable App Instance Lock per application when required.

Timeline

Published
May 4, 2026
Message published to Message Center
Updated
May 4, 2026
Message content updated
Action Required By
May 28, 2026
Action deadline
End Date
Jul 23, 2026
Message timeline ends

Tags

#New feature#User impact#Admin impact

Category

Plan for Change

Related Messages

Similar updates

MC1279092

Microsoft Entra: Passkeys in registration campaigns update

Apr 13, 2026
MC1253746

Microsoft Entra: Passkeys in Microsoft registration campaigns

Mar 16, 2026
MC1221452â—Ź

(Update)Microsoft Entra ID: General Availability of passkey profiles and migration for existing Passkeys (FIDO2) tenants

Jan 23, 2026
MC1261596

Notice: Security Copilot will be included as part of your Microsoft 365 E5 plan soon

Mar 25, 2026
MC992218

Microsoft Entra: New People administrator role

Jan 30, 2025