Starting in early September 2025, Salesforce will restrict the use of uninstalled connected apps. This usage restriction will block end users from using uninstalled connected apps. This change is part of Salesforce's commitment to making our products and services secure-by-default.
To minimize disruption to existing app usage, end users can continue to use uninstalled apps only if both of these criteria apply.
Any new user trying to access these same uninstalled apps will be blocked. All uninstalled apps that use the OAuth 2.0 device flow will be blocked, even for specific users who have previously authorized the app. Connected apps installed before the change will continue to function without interruption.
There is no change to user permissions required to install new connected apps, which are Customize Application AND either Modify All Data OR Manage Connected Apps. Take steps to review and install connected apps that you want to make accessible for end-users. Block any apps that you do not trust
This new user permission is automatically assigned to the System Administrator standard profile. Custom profiles aren’t automatically updated, including those previously cloned from the System Administrator standard profile.
After the connected app usage restriction is enforced in September 2025, this user permission grants access to use uninstalled connected apps, bypassing the new usage restriction. It should only be assigned to highly trusted users, such as administrators and those involved in managing or testing connected app integrations.
We recommend using care when assigning this user permission. For example, only grant to admin users and to users who manage connected app integrations and need to test the apps before installing on the org for access by other end users.
Customer Admins or users responsible for managing connected apps should:
Review OAuth Usage for Connected Apps
Customer Admins or users responsible for managing connected apps should review connected app OAuth Usage to identify uninstalled apps currently being used, and determine if they are trusted and need installed or if they are untrusted apps and should be blocked.
Performing these steps before the change and installing trusted apps helps ensure continued user access, minimizing disruption. If you don’t install trusted apps, most end users will be blocked from using these apps when this change takes effect. The review process can also occur after the change, and regular reviews of connected app usage are recommended to uphold the principle of least privilege.
For each app that displays an Install button, review the app details and the User Count.
To see more information about which users are using an app, click the number in the User Count column. You can see which users are using the app, when they first connected, when they last used the app, and their use count.
Group uninstalled apps into two categories:
a. Trusted apps
b. Untrusted apps - Look for app names that you don’t recognize, and unusual usage patterns.
After a connected app is installed in your org, you can manage access to it. To configure which users can access the connected app, select a Permitted Users setting.
Note: Salesforce recommends the Admin approved users are pre-authorized setting as this provides the most control over who can access the connected app by allowing the Admin to explicitly grant access through profiles and permission sets, restricting access to only authorized users.
See the help article here for more information on Managing Access to a Connected App.
This step ensures that users can no longer access untrusted apps. Blocking an app ends all current user sessions and prevents future sessions.
Here are some of the error scenarios that can be encountered by users trying to access / install connected apps.
If API Access control isn’t enabled, end users see the following error message in the UI if they try to access an uninstalled app: “We can’t authorize you because of an OAuth error. For more information, contact your Salesforce administrator.” and the OAUTH_APPROVAL_ERROR_GENERIC message.
The URL describes the error in more detail using these parameters.
error=invalid_client
error_description=app must be installed into org
Here’s an example URL with this error.
https://example[.]com?error=invalid_client&error_description=app+must+be+installed+into+org
As described above, the users without the "Approve Uninstalled Connected Apps" permission will face the error message "OAUTH_APPROVAL_ERROR_GENERIC", however we have also seen edge case scenarios in Sandbox environments where the permission "Approve Uninstalled Connected Apps" is missing from the profiles and cannot be granted, in such scenario the admins are advised to run the "Match Production Licenses to Sandbox without a Refresh " tool in the effected sandbox environment, more details on this tool can be found here
If API Access Control is enabled, end users are redirected to the Callback URL, also known as the redirect_uri configured in your connected app OAuth settings.
The error is reflected in the URL using these parameters.
error=OAUTH_APP_BLOCKED
error_description=this+app+is+blocked+by+admin
Here’s an example URL with this error.
https://example.com?error=OAUTH_APP_BLOCKED&error_description=this+app+is+blocked+by+admin
Please refer the article : Resolving "Cannot Install a Sandbox App" Error for Connected Apps for further steps for this scenario.
Scenario: User/Admin trying to install a Connected app is blocked and sees this error message, “This application has already been installed”
When you have duplicate connected apps with the same name, you can only install one instance.
Please try the following steps:
1- Rename the existing connected app – If you are the connected app owner please try updating the label of the existing Connected app and then attempt to install the Connected app again. if the connected app is coming from a managed package please reach out to the package provider to update the connected app label.
2 - Delete if you are the owner of the connected app, you can follow the below steps to delete the existing app (if not in use)
Steps to delete: Setup > App Manager > Search for the App name > Click on drop down > Click View >then you should be able to view the delete option.
Note: Before deleting the existing app, ensure it is no longer in use, as removal could impact your current configuration. Proceed with installation of the new connected app, please also note that deleting a managed connected app is not possible as these components are part of the managed package, please reach out to the package provider to make the changes to the connected app label instead.
What are "uninstalled connected apps" and how do I identify which ones are being used?
An "uninstalled connected app" is an application that was not explicitly installed by a System Administrator into your Salesforce org. Instead, a Salesforce end-user directly authorized it by logging in and granting access via an OAuth authorization page.
To find uninstalled connected apps, navigate to the "OAuth Connected App Usage" page in Setup. Look for applications that display an "Install" button in the "Actions" column. These are the apps that will be impacted by the new restrictions. Note that apps not used recently may not appear on this page.
What are the benefits of this feature change?
This update enhances your control over connected apps, and reduces the risk of unauthorized connected app access.
What does this change impact?
Users will be blocked from accessing uninstalled connected apps. In order to access new connected apps, the apps must be installed on the org. While users who previously authorized the uninstalled connected app can continue using those apps, any new user trying to access the same uninstalled apps will be blocked. Also, all usage of uninstalled apps that use the OAuth 2.0 device flow will be blocked, even if the user has previously authorized the app.
Specific user permission (“Approve Uninstalled Connected Apps”) are now required to use uninstalled connected apps. Salesforce recommends using care when assigning these permission as it allows users to bypass the restriction on using uninstalled connected apps. For example, you might only give these permission to users, such as an admin or developer, who manage connected apps and need to test the apps before installing them on the org for access of other end users.
What does this change not impact?
Connected apps installed prior to this change will continue to function without interruption.
If a Salesforce end-user has authorized a connected app prior to this change, that user can continue using it without interruption, even when the app is not installed on the org.
What is the difference between API Access Control and the new connected app usage restriction?
API Access Control is an existing, optional feature that you can use to restrict users from accessing Salesforce APIs. When this feature is enabled, users can access Salesforce APIs only though specific connected apps that you allowlist. You determine the criteria for the allowlist. To turn on API Access Control, you must contact Salesforce Customer Support.
The new connected app usage restriction is a new, required restriction that will be automatically enabled for all orgs. It can’t be turned off. It restricts end users from accessing uninstalled connected apps.
What is the impact for connected apps created and managed within the Org?
There is no impact from this change to connected apps created and managed on the org.
How will I know when the changes are applied in my org?
To confirm that restrictions on uninstalled connected apps have been successfully applied in your org,
Test with a new user: Have a new user attempt to self-authorize an uninstalled connected app.
Look for the error message: If the user is blocked and receives an OAuth error message with "app must be installed into org" in the URL's error_description, then the changes have been applied.
Please note that Customer Admins may see the "Approve Uninstalled Connected Apps" user permission assigned to the standard System Administrator profile in Setup, even before these restrictions are fully rolled out.
What is the impact on browser extensions?
If the browser extension integrates to your Salesforce Org using the Connected App Framework, new users will be blocked from using them after this change. Install it as a connected app and manage access to control who can use the browser extension to interact with your Org data.
If the browser extension relies on the user’s active session with Salesforce org and is not integrating as a connected app, the browser extension may not be affected by this change.
How will these changes affect existing users who have previously authorized an uninstalled app versus new users attempting to access it for the first time?
Existing Usage: Users who have previously authorized an uninstalled app (and it is not using the OAuth 2.0 device flow) will be able to continue using it without immediate disruption.
New Usage: However, all new users of these previously authorized uninstalled apps will be blocked.
OAuth 2.0 Device Flow Impact: All usage of uninstalled apps that specifically use the OAuth 2.0 device flow will be blocked, even if the user had authorized the app prior to this change. Device flow is typically used for devices with limited input capabilities.
005132365

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.