diff --git a/sharepoint/sharepoint-ps/sharepoint-online/Set-SPOTenant.md b/sharepoint/sharepoint-ps/sharepoint-online/Set-SPOTenant.md index 690cd8bfb..d1d65b814 100644 --- a/sharepoint/sharepoint-ps/sharepoint-online/Set-SPOTenant.md +++ b/sharepoint/sharepoint-ps/sharepoint-online/Set-SPOTenant.md @@ -87,6 +87,7 @@ Set-SPOTenant [-DisableModernListTemplateIds [Guid[]]] [-DisableOutlookPSTVersionTrimming ] [-DisablePersonalListCreation ] + [-DisableSharePointStoreAccess ] [-DisableSpacesActivation ] [-DisableVivaConnectionsAnalytics ] [-DisableWorkflow2010 ] @@ -1199,6 +1200,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableSharePointStoreAccess + +This feature allows the SharePoint Administrators to disable SharePoint Store access for all users in the tenant. + +Accepts a value of true (enabled) to hide the SharePoint app store or false (disabled) to show the SharePoint app store. By default this feature is set to false. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: SharePoint Online +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableCustomAppAuthentication Prevents apps using an Azure Access Control (ACS) app-only access token to access SharePoint. ACS, a service of Microsoft Entra ID, has been retired on November 7, 2018. This retirement does not impact the SharePoint add-in model, which uses the https://accounts.accesscontrol.windows.net hostname (which is not impacted by this retirement). For new tenants, apps using an ACS app-only access token are disabled by default. We recommend using the Microsoft Entra app-only model which is modern and more secure. Note that marking this property to $true doesn't prevent creating apps in SharePoint that use an Azure Access Control (ACS) app-only access token. Marking this property to $true only ensures that such apps can't access SharePoint anymore.