[Introduction]
To improve application security, Microsoft Entra ID will enable App Instance Lock by default for newly created applications. This change prevents sensitive application properties from being modified outside the application’s home tenant, reducing the risk of unauthorized changes that can lead to application compromise. Based on our data analysis, we do not expect this change to cause customer impact. App owners or administrators in the application home tenant can still disable App Instance Lock for specific applications if their scenario requires updates to protected properties in other tenants.
[When this will happen]
General Availability (Worldwide): We will begin rolling out in early June 2026 and expect to complete by late June 2026.
[How this affects your organization]
Who is affected
- Microsoft Entra administrators
- Developers who manage Microsoft Entra applications
- Organizations using automation or scripts to update application credentials or security settings after app creation
What will happen?
- App Instance Lock will be enabled by default for all newly created applications.
- Sensitive service principal properties will be protected by default.
- Attempts to modify these protected properties will be blocked unless App Instance Lock is explicitly disabled.
- Blocked update attempts will return a 400 Bad Request error, and the update will not be applied.
- Existing applications are not affected by this change.
Example Microsoft Graph error returned when attempting to update passwordCredentials on a locked application:
![Microsoft Entra: App Instance Lock enabled by default for new applications [MC1300584] 6 user settings](https://cxcs.microsoft.net/static/public/messagecenter/neutral/9cf75157-6d59-4921-a212-8ec6ee19e17e/88ab297e762809524363da1c76b8a03905949838.png)
[What you can do to prepare]
- Review automation, scripts, or provisioning workflows that modify service principal credentials or related settings.
- Validate that existing workflows do not depend on App Instance Lock being disabled and update them to avoid modifying protected properties unless the lock is intentionally disabled.
- Disable App Instance Lock for specific applications if post‑creation updates are required.
- Test application provisioning and credential management flows prior to rollout in mid-May.
[Compliance considerations]
| Question | Answer |
| Does the change include an admin control? | Yes. Admins can disable App Instance Lock per application when required. |
Source: Microsoft
![Microsoft Entra: App Instance Lock enabled by default for new applications [MC1300584] 1 Microsoft Entra: App Instance Lock enabled by default for new applications [MC1300584]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-cottonbro-8721343-1024x683.webp)
![Microsoft Entra: App Instance Lock enabled by default for new applications [MC1300584] 2 pexels cottonbro 8721343](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-cottonbro-8721343-150x150.webp)

![Power Pages - Use Dynamics 365 websites with Bootstrap 5 and enhanced data model [MC1300450] 4 pexels googledeepmind 25626442](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-googledeepmind-25626442-150x150.webp)
