How to revoke third-party access to a Microsoft account
One of the great benefits of having a Microsoft account is the ability to use your login information to log in to other applications and services.
Sometimes, applications and services will integrate with your account in some way. For example, you can connect your Google and Microsoft accounts so you can synchronize email and calendar between two services.
However, if you have used your Microsoft login information as a way to access third-party services over the past few years, you may have a long list of connected applications that present you. No longer used.
From a security standpoint, this is not good. Typically, you will grant these applications different reading and editing capabilities. If an old application is handed to another person, the owner can use those permissions in illicit ways.
To remedy this situation, you need to take action to recover third-party access for applications that you no longer use.
How to revoke access to your Microsoft account
To revoke third-party access to your Microsoft account, follow these steps:
1. Go to account.microsoft.com/account and log in to your account.
2. Click the Privacy tab at the top of the page. You may need to verify your identity by emailing code.
3. Scroll to the Other privacy settings section .
4. Go to the Apps and services section> Apps and services that can access your data .
5. Review the application list and set the applications you want to recall.
6. Click Edit under the corresponding application name.
7. Select Remove these permissions .
Good luck!
See more:
- Here's how to completely remove a Microsoft account on a Windows 10 computer
- Instructions for creating a Microsoft account for Windows Phone
- Instructions for linking Windows 10 Product key to Microsoft account
You should read it
- 5 best free alternatives for Microsoft Access
- TOP best Microsoft Access replacement software for databases
- Instructions for creating the fastest Microsoft account
- Useful Access shortcut key
- The error on Microsoft's login system allows hackers to take control of any Office account
- Microsoft Access test has the answer P1
- Steps to export Microsoft Access data to Word documents
- The Microsoft Access test has the answer P4
May be interested
- Netcat user guidenetcat can be used as a special solution for transferring files over a local or internet network. it is also useful for transferring data to or from virtual machines or containers, when they do not include this feature.
- How does IP address and MAC address work in parallel?the internet works in the same way as postal services. instead of sending mail, the device sends 'data packets', and the ip address or mac address determines where the packets will come.
- What to do if Google Chrome warns an unsafe website?check the top left of the address bar, you will see the lock image. that means that site is safe to access. you often see these things on the internet.
- The Touch ID and Face ID do not make you safer, why?it is impossible to acknowledge that the touch id and face id are extremely great features on smartphones today. but after all, we should put them into the category of utility features more reasonable than security features.
- How to scan websites for potential security vulnerabilities with Vega on Kali Linuxresisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.
- How to temporarily lock the computer when entering the wrong password many timesif you're worried that someone might try to guess your computer password, you can set windows to temporarily lock your computer when entering the wrong password multiple times.