diff --git a/common/djangoapps/third_party_auth/migrations/0005_auto_20210723_1527.py b/common/djangoapps/third_party_auth/migrations/0005_auto_20210723_1527.py
new file mode 100644
index 0000000000000000000000000000000000000000..ff525632ee5b80d1f518996469f927f06e9b060d
--- /dev/null
+++ b/common/djangoapps/third_party_auth/migrations/0005_auto_20210723_1527.py
@@ -0,0 +1,28 @@
+# Generated by Django 2.2.24 on 2021-07-23 15:27
+
+from django.db import migrations, models
+
+
+class Migration(migrations.Migration):
+
+    dependencies = [
+        ('third_party_auth', '0004_auto_20200919_0955'),
+    ]
+
+    operations = [
+        migrations.AddField(
+            model_name='ltiproviderconfig',
+            name='disable_for_enterprise_sso',
+            field=models.BooleanField(default=False, help_text='IDPs with this set to True will be excluded from the dropdown IDP selection in the EnterpriseCustomer Django Admin form.', verbose_name='Disabled for Enterprise TPA'),
+        ),
+        migrations.AddField(
+            model_name='oauth2providerconfig',
+            name='disable_for_enterprise_sso',
+            field=models.BooleanField(default=False, help_text='IDPs with this set to True will be excluded from the dropdown IDP selection in the EnterpriseCustomer Django Admin form.', verbose_name='Disabled for Enterprise TPA'),
+        ),
+        migrations.AddField(
+            model_name='samlproviderconfig',
+            name='disable_for_enterprise_sso',
+            field=models.BooleanField(default=False, help_text='IDPs with this set to True will be excluded from the dropdown IDP selection in the EnterpriseCustomer Django Admin form.', verbose_name='Disabled for Enterprise TPA'),
+        ),
+    ]
diff --git a/common/djangoapps/third_party_auth/models.py b/common/djangoapps/third_party_auth/models.py
index 9036be1a926227c20edf4e77024a26036b273030..25b0cc31ca6cedf6802419efbc67b3210ca06cb2 100644
--- a/common/djangoapps/third_party_auth/models.py
+++ b/common/djangoapps/third_party_auth/models.py
@@ -212,6 +212,16 @@ class ProviderConfig(ConfigurationModel):
         default=False,
         help_text="Use the presence of a profile from a trusted third party as proof of identity verification.",
     )
+
+    disable_for_enterprise_sso = models.BooleanField(
+        default=False,
+        verbose_name='Disabled for Enterprise TPA',
+        help_text=_(
+            "IDPs with this set to True will be excluded from the dropdown IDP selection "
+            "in the EnterpriseCustomer Django Admin form."
+        )
+    )
+
     prefix = None  # used for provider_id. Set to a string value in subclass
     backend_name = None  # Set to a field or fixed value in subclass
     accepts_logins = True  # Whether to display a sign-in button when the provider is enabled
diff --git a/requirements/constraints.txt b/requirements/constraints.txt
index be4bb20797a836c8f1fada1789fe8fdd0ed74040..1aadc178a4b69c09caf7158145b521032f0cc988 100644
--- a/requirements/constraints.txt
+++ b/requirements/constraints.txt
@@ -36,7 +36,7 @@ django-storages<1.9
 # The team that owns this package will manually bump this package rather than having it pulled in automatically.
 # This is to allow them to better control its deployment and to do it in a process that works better
 # for them.
-edx-enterprise==3.27.3
+edx-enterprise==3.27.6
 
 # Newer versions need a more recent version of python-dateutil
 freezegun==0.3.12
diff --git a/requirements/edx/base.txt b/requirements/edx/base.txt
index 67aecb8ca1db5054a64ed758f553bac1dd98917b..39b7bea0f347d4997f3dd5fe664f058a6d9b03d1 100644
--- a/requirements/edx/base.txt
+++ b/requirements/edx/base.txt
@@ -435,7 +435,7 @@ edx-drf-extensions==6.6.0
     #   edx-rbac
     #   edx-when
     #   edxval
-edx-enterprise==3.27.3
+edx-enterprise==3.27.6
     # via
     #   -c requirements/edx/../constraints.txt
     #   -r requirements/edx/base.in
diff --git a/requirements/edx/development.txt b/requirements/edx/development.txt
index 6139689f2bc5ac0dd8755ff2312e89be37a8c2e0..475661dfdf1fba0a0fbc1e12bcb34d5caab2f36d 100644
--- a/requirements/edx/development.txt
+++ b/requirements/edx/development.txt
@@ -528,7 +528,7 @@ edx-drf-extensions==6.6.0
     #   edx-rbac
     #   edx-when
     #   edxval
-edx-enterprise==3.27.3
+edx-enterprise==3.27.6
     # via
     #   -c requirements/edx/../constraints.txt
     #   -r requirements/edx/testing.txt
diff --git a/requirements/edx/testing.txt b/requirements/edx/testing.txt
index 141ea80fbf1783aff556a77d4c110d92aff6b757..8bc502d8cfb35848f58a7d42c597c67f05bd3f8e 100644
--- a/requirements/edx/testing.txt
+++ b/requirements/edx/testing.txt
@@ -511,7 +511,7 @@ edx-drf-extensions==6.6.0
     #   edx-rbac
     #   edx-when
     #   edxval
-edx-enterprise==3.27.3
+edx-enterprise==3.27.6
     # via
     #   -c requirements/edx/../constraints.txt
     #   -r requirements/edx/base.txt