Updated 8 hours ago
Posted on
April 14, 2026

Web-Only Limited Access in SPO: Two Meanings, One Confusing Name

by Sudha

You open your SharePoint site permissions and notice something you didn’t configure: A mysterious group with Web-Only Limited Accesspermission pops up in your permissions list. You try to remove it—but SharePoint Online won’t let you. You search for answers and come across articles about blocking unmanaged device access. This leads you to assume that this web-only limited access permission level is the result of a device restriction policy.

But actually, it isn’t. The problem here is the terminology.

In SharePoint, “Web-Only Limited Access” refers to two completely different things. One is a system-managed permission level that SharePoint assigns automatically. The other is an admin-configured policy that restricts web-only access from unmanaged or personal devices. They share the same name, but they are entirely unrelated.

This guide untangles both, so you can clearly understand which one you’re dealing with and what to do about it.

Two SharePoint Features, One Confusing Name – An Overview

The phrase ‘Web-Only Limited Access’ appears in two separate contexts in SharePoint and confusing them can send you down the wrong troubleshooting path. Let’s start with a high-level overview.

Aspect Permission Level Device Access Policy
What it is A system-assigned permission level in SharePoint site permissions An admin setting in the SharePoint admin center
Who creates it SharePoint assigns it automatically An admin configures it manually
Backed by SharePoint’s permission inheritance system Microsoft Entra Conditional Access policies
What it restricts Limits the user’s navigation to the web object (site) they need to reach the shared item Limits all unmanaged device users to browser-only access (no download, print, or sync)
Can you remove it? Not directly. Remove the source item-level sharing instead. Yes. Change the setting in the admin center, or turn off the Conditional Access policy

Now that you have an overview, let’s break them down clearly to get a full picture of what the ‘Web-Only Limited Access’ permission level is and what the ‘web-only access’ device policy means.

Web-Only Limited Access Permission Level in SharePoint Online

SharePoint assigns Web-Only Limited Access at the site level when a user gains access to content inside the site without having direct site permissions. Let’s break down the Web-Only Limited Access permission level in two parts: when it appears and how it works behind the scenes.

  1. Common triggers for the Web-Only Limited Access permission level
  2. How does Web-Only Limited Access work behind the scenes?

When does the “Web-Only Limited Access” Permission Level Appear?

Before understanding how it works, it is needed to know what triggers it. Here are the most common scenarios where SharePoint automatically assigns the Web-Only Limited Access permission level:

  1. Sharing a file with an internal user who lacks site access
  2. Sharing a file or folder via a “Specific people” link
  3. Sharing with external/guest users
  4. Manually broken inheritance with unique permissions

The common thread is the same: a user receives access to a specific item but has no membership or permissions on the site above it.

Web-only limited access group in SharePoint Online

Based on our observations, it works as expected in most of the above scenarios. However, there are cases where users do not appear in the group as expected. Hope it will work as expected!

The Permission Chain: How SharePoint Builds Web-Only Limited Access

SharePoint’s permission model follows a clear hierarchy. A site contains libraries, libraries contain folders, and folders contain files. By default, each level inherits permissions from its parent, ensuring consistent and streamlined access control throughout the structure.

But what happens when you share a single file with someone who doesn’t have access to the site? SharePoint has a problem. The user needs to reach that file, but they have no permissions on the site, library, or folder above it. SharePoint’s UI can’t render the path to the file without some level of access at each parent level.

So, SharePoint solves this automatically. The moment you share an item with someone who lacks site access, SharePoint:

  1. Breaks permission inheritance on that specific item
  2. Grants the user their assigned permissions (Edit, View, etc.) on that item
  3. Assigns Limited Access or Web-Only Limited Access at every parent level: the folder, the library, and the site

The admin doesn’t do this. SharePoint does it silently in the background. Now let’s see exactly what this looks like with a real example.

Automatic Assignment of Web-Only Limited Access

Let’s say: Admin shares Q1-Report.docx with User B (who has no access to the site). The file lives at: Marketing Site Documents Library Finance Folder Q1-Report.docx

Here’s what SharePoint does automatically!

Step 1: Break Inheritance on the File

SharePoint breaks permission inheritance on Q1-Report.docx so it can have its own unique permissions, separate from the folder above it.

Step 2: Grant the Actual Permission on the File

This is the only permission the admin explicitly granted. Everything in the next step is SharePoint acting on its own.

Level Object Permission Granted How
File Q1-Report.docx Edit or View (whatever you chose when sharing) Direct permission on the item

Step 3: Auto-Assign Limited Access Up the Chain

SharePoint works upward from the file, assigning the minimum access needed at each parent level:

Level Object Permission Auto-Assigned Group Added To Why
Folder Finance Folder Limited Access (direct assignment) User B needs to traverse this folder to reach the file
Library Documents Limited Access (direct assignment) User B needs to traverse this library to reach the folder
Site Marketing Site Web-Only Limited Access Limited Access System Group For Web User B needs to enter the site but nothing more

Step 4 — What User B Can Actually Do

Level Object What User B Can Do What User B Cannot Do
Site Marketing Site Open the site (web object only) Use client integration, remote interfaces (APIs), application pages
Library Documents Library Open, use client integration, use remote interfaces (APIs), browse user info Nothing restricted at this level
Folder Finance Folder Open, use client integration, use remote interfaces (APIs), browse user info Nothing restricted at this level
File Q1-Report.docx Full edit or view per sharing settings Nothing restricted — this is the shared item

Hope you are clear about the Web-Only Limited Access group. Now, let’s move to the unmanaged device policy, causing limited, web-only limited access.

Unmanaged Device Policy for Limited Access in SharePoint Online

Now, this is a completely different thing from the SharePoint permission level we just discussed — there is no relation between them.

SharePoint admin center has an access control setting specifically for unmanaged devices. Under this setting, there are three options:

  1. Allow full access from desktop apps, mobile apps, and the web
  2. Allow limited, web-only access
  3. Block access

The catch lies in the second option –“Allow limited, web-only access.” While it sounds identical to the permission level seen in site permissions, it serves an entirely different purpose. When enabled, it restricts users on personal or unmanaged devices to browser-only access, preventing them from using desktop or mobile apps altogether.

Unmanaged device policy in SharePoint Online

Let’s see when it triggers and how it works behind the scenes.

  1. When does the unmanaged device policy take effect?
  2. What powers the unmanaged device restriction behind the scenes?

When Does the Unmanaged Device Policy Take Effect?

The device policy–driven “Web-Only Limited Access” comes into effect in the following scenarios:

  • When a user accesses SharePoint from a personal or unmanaged device and an organization-wide restriction is enabled
  • When a user accesses a specific site from an unmanaged device where per-site restriction has been applied via PowerShell
  • When a user accesses a sensitivity-labeled site from an unmanaged device

We will be publishing a detailed blog on the different scenarios of enforcing web-only access using this device restriction policy. Stay tuned! Now that we’ve covered when this policy is triggered, let’s take a closer look at what happens behind the scenes.

What Powers the Unmanaged Device Restriction Behind the Scenes?

Once an admin enables “Allow limited, web-only access” in the SharePoint admin center, a chain of events kicks off automatically behind the scenes. Here’s what happens:

  1. Conditional Access policy auto-creation — When the admin selects “Allow limited, web-only access,” SharePoint doesn’t enforce this itself. It creates a Conditional Access policy in Microsoft Entra ID automatically.
  2. Device compliance check — At every sign-in, Entra evaluates whether the device is hybrid Azure AD joined or Intune compliant with the configured Conditional Access Policy. If neither, the device is treated as unmanaged.
  3. SharePoint applies the restrictions — once detected as unmanaged, SharePoint enforces browser-only access: blocks download, print, sync, and desktop/mobile app access.
  4. Banner notification — SharePoint renders the restriction banner at the top of every site as well as on the files, like this Your organization doesn’t allow you to download, print, or sync using this device. To use other actions, use a device that’s joined to a domain or marked compliant by Intune. For help, contact your IT department.”

With a clear understanding of what’s happening behind the scenes, the next logical question is—how to remove it?

Remove Web-Only Limited Access in SharePoint Online

If you determine that either the Web-Only Limited Access permission or the device restriction policy is not required, you can remove or modify them as needed.

  • To remove the Web-only Limited Access permission, identify the source (such as the specific document or item sharing) and remove the unique permissions accordingly.
  • If you don’t want the device restriction (browser-only) policy, you can turn it off from the SharePoint admin center. Alternatively, you can disable or modify the Conditional Access policy based on your requirements.

That’s it! The confusion ends once you recognize that the name is shared—but the behavior isn’t. With this clarity, you can confidently identify whether you’re dealing with a permission or a policy and act accordingly. Happy reading!

About the author

Sudha is a Microsoft 365 solutions specialist focusing on governance and identity access control, helping administrators implement accurate configurations through structured, example-driven guidance.

Previous Article

Manage Microsoft 365 Groups Using a PowerShell Script