An Azure service that provides hosted, universal storage for Azure app configurations.
The error is caused by a tenant-wide application management policy in Microsoft Entra ID that blocks adding client secrets (password credentials) to applications.
This setting is configured in the Microsoft Entra admin center under app management policies, or via Microsoft Graph:
- An admin with one of these roles must make the change:
- Security Administrator and Cloud App Administrator or Application Administrator, or
- Global Administrator.
- The relevant restriction is
passwordAddition(and typically alsosymmetricKeyAddition) in the tenant-wide default app management policy. When configured to block, the portal shows “Client secrets are blocked by a tenant-wide policy”. - To adjust this, the admin can either:
- Use the Microsoft Entra admin center (App management policy UX) to change the Block password addition setting, which controls
passwordAdditionandsymmetricKeyAddition, or - Use Microsoft Graph (beta) to update the
defaultAppManagementPolicyso thatpasswordAddition(and, if desired,symmetricKeyAddition) no longer block new secrets.
- Use the Microsoft Entra admin center (App management policy UX) to change the Block password addition setting, which controls
- After updating the policy, confirm it is applied by:
- Reading the default app management policy again and verifying the updated restrictions, and/or
- Trying to create a new application secret; the operation should now succeed if the restriction has been relaxed.
If the policy must remain strict tenant-wide, a custom app management policy can be created and assigned to specific applications to exempt them from the restriction.
References: