From 212e89aed629639b6d6d2900114900bb629d04e5 Mon Sep 17 00:00:00 2001 From: Sergii Cherkashyn Date: Fri, 5 Dec 2025 12:59:35 -0500 Subject: [PATCH] Update assign-app-owners.md updating per internal Epic 1436967 --- docs/identity/enterprise-apps/assign-app-owners.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/docs/identity/enterprise-apps/assign-app-owners.md b/docs/identity/enterprise-apps/assign-app-owners.md index cac52ba5ca0..9a02fda6510 100644 --- a/docs/identity/enterprise-apps/assign-app-owners.md +++ b/docs/identity/enterprise-apps/assign-app-owners.md @@ -85,6 +85,9 @@ Content-Type: application/json > [!NOTE] > If the user setting **Restrict access to Microsoft Entra administration portal** is set to `Yes`, non-admin users aren't able to use the Microsoft Entra admin center to manage the applications they own. For more information about the actions that can be performed on owned enterprise applications, see [Owned enterprise applications](~/fundamentals/users-default-permissions.md#owned-enterprise-applications). +> [!NOTE] +> Currently due to background applications and service principals objects settings dependencies, the application owners added by other than Entra admin center means (Graph API, PowerShell), will not be able to manage some enterprise applications settings like attributes and claims, modify configured SAML certificates properties or token encryption settings, etc. + ## Next steps - [Delegate app registration permissions in Microsoft Entra ID](~/identity/role-based-access-control/delegate-app-roles.md)