web
You’re offline. This is a read only version of the page.
close
Skip to main content
Community site session details

Community site session details

Session Id :

enable or disable self-service sign-ups for Dynamics 365 Business Central using Microsoft Entra

Jun Wang Profile Picture Jun Wang 8,182 Super User 2025 Season 2
This article outlines the steps for Microsoft 365 tenant administrators to enable or disable self-service sign-ups for Dynamics 365 Business Central using Microsoft Entra (formerly Azure Active Directory). These steps are particularly useful for organizations that want to maintain control over who can sign up for and access their business applications.
Example Scenario: Disabling Self-Service Signups
Situation: Contoso Ltd. is a company that uses Dynamics 365 Business Central and has a policy that only IT-approved applications should be accessed by its employees. The IT department has decided to disable self-service signups to ensure that new users or services aren't added without their permission.
Process:
Open PowerShell: The IT admin opens Windows PowerShell with administrative rights.
Administrator Sign-in: They run the command $Msolcred = Get-credential to prompt for their Microsoft 365 admin credentials.
Connect to Microsoft Entra: With the credentials provided, they connect to the Microsoft Entra service using Connect-MsolService -Credential $MsolCred.
Disable Self-Service Signups: They execute Set-MsolCompanySettings -AllowAdHocSubscriptions $false to disable self-service sign-ups for the tenant.
Result: After completing these steps, Contoso Ltd.’s employees will no longer be able to sign up for Dynamics 365 Business Central or any other Microsoft services on their own.
Example Scenario: Enabling Self-Service Signups
Situation: Contoso Ltd. has now decided to promote user autonomy and wants to enable self-service sign-ups so that employees can leverage Dynamics 365 Business Central for different departmental needs without waiting for IT department approval.
Process:
Open PowerShell: The IT admin opens Windows PowerShell with administrative rights.
Administrator Sign-in: They sign in to the Microsoft Entra service using the same steps as before.
Enable Self-Service Signups: They run Set-MsolCompanySettings -AllowAdHocSubscriptions $true to enable self-service sign-ups.
Result: Employees at Contoso Ltd. can now sign up for Dynamics 365 Business Central and other Microsoft services as needed, fostering a more agile and responsive work environment.
Example Scenario: Verifying Self-Service Signups Status
Situation: The IT admin at Contoso Ltd. wants to verify the current status of self-service signups to ensure that company policies are being adhered to.
Process:
Open PowerShell: As before, the admin opens PowerShell with the necessary rights.
Sign-in and Connect: They sign in and connect to Microsoft Entra service using the provided admin credentials.
Check Signup Status: To check the status of self-service signups, they run a command similar to Get-MsolCompanyInformation, which will include a property indicating the status of the AllowAdHocSubscriptions setting.
Result: The IT admin can confirm whether the self-service signups are enabled or disabled and ensure compliance with the company’s IT policies.
Conclusion
Managing self-service sign-ups via Microsoft Entra ID is a powerful way for tenant administrators to control the proliferation of services within their organization. The PowerShell cmdlets provided are straightforward yet powerful tools for maintaining governance over service subscriptions.

Comments