Problems signing in to a Microsoft application

Microsoft Applications (like Exchange, SharePoint, Yammer, etc.) are assigned and managed a bit differently than third-party SaaS applications or other applications you integrate with Microsoft Entra ID for single sign-on.

There are three main ways that a user can get access to a Microsoft-published application.

  • For applications in the Microsoft 365 or other paid suites, users are granted access through license assignment either directly to their user account, or through a group using our group-based license assignment capability.

  • For applications that Microsoft or a Third Party publishes freely for anyone to use, users may be granted access through user consent. This means that they sign in to the application with their Microsoft Entra work or school account and allow it to have access to some limited set of data on their account.

  • For applications that Microsoft or a third-party publishes freely for anyone to use, users may also be granted access through administrator consent. This means that an administrator has determined the application may be used by everyone in the organization, so they sign in to the application with a Global Administrator account and grant access to everyone in the organization.

To troubleshoot your issue, start with the General Problem Areas with Application Access to consider and then read the Walkthrough: Steps to troubleshoot Microsoft Application access to get into the details.

General Problem Areas with Application Access to consider

Following is a list of the general problem areas that you can drill into if you have an idea of where to start, but we recommend you read the walkthrough to get going quickly: Walkthrough: Steps to troubleshoot Microsoft Application access.

Steps to troubleshoot Microsoft Application access

Following are some common issues folks run into when their users can't sign in to a Microsoft application.

Problems with the user’s account

Application access can be blocked due to a problem with a user that is assigned to the application. Following are some ways you can troubleshoot and solve problems with users and their account settings:

Tip

Steps in this article might vary slightly based on the portal you start from.

Check if a user account exists in Microsoft Entra ID

To check if a user’s account is present, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.

  2. Browse to Identity > Users > All users.

  3. Search for the user you're interested in and select the row with the user's details.

  4. Check the properties of the user object to be sure that they look as you expect and no data is missing.

Check a user’s account status

To check a user’s account status, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.
  2. Browse to Identity > Users > All users.
  3. Search for the user you're interested in and select the row with the user's details.
  4. Select Profile.
  5. Under Settings ensure that Block sign in is set to No.

Reset a user’s password

To reset a user’s password, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.
  2. Browse to Identity > Users > All users.
  3. Search for the user you're interested in and select the row with the user's details.
  4. Select the Reset password button at the top of the user pane.
  5. Select the Reset password button on the Reset password pane that appears.
  6. Copy the temporary password or enter a new password for the user.
  7. Communicate this new password to the user, they be required to change this password during their next sign-in to Microsoft Entra ID.

Enable self-service password reset

To enable self-service password reset, follow the deployment steps in the following section:

Check a user’s multifactor authentication status

To check a user’s multifactor authentication status, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.

  2. Browse to Identity > Users > All users.

  3. Select the multifactor authentication button at the top of the pane.

  4. Once the multifactor authentication Administration portal loads, ensure you are on the Users tab.

  5. Find the user in the list of users by searching, filtering, or sorting.

  6. Select the user from the list of users and Enable, Disable, or Enforce multifactor authentication as desired.

    • Note: If a user is in an Enforced state, you may set them to Disabled temporarily to let them back into their account. Once they're back in, you can then change their state to Enabled again to require them to re-register their contact information during their next sign-in. Alternatively, you can follow the steps in the Check a user’s authentication contact info to verify or set this data for them.

Check a user’s authentication contact info

To check a user’s authentication contact info used for multifactor authentication, Conditional Access, Identity Protection, and Password Reset, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.

  2. Browse to Identity > Users > All users.

  3. Search for the user you're interested in and select the row with the user's details.

  4. Select Profile.

  5. Scroll down to Authentication contact info.

  6. Review the data registered for the user and update as needed.

Check a user’s group memberships

To check a user’s group memberships, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.

  2. Browse to Identity > Users > All users.

  3. Search for the user you're interested in and select the row with the user's details.

  4. Select Groups to see which groups the user is a member of.

Check a user’s assigned licenses

To check a user’s assigned licenses, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.

  2. Browse to Identity > Users > All users.

  3. Search for the user you're interested in and select the row with the user's details.

  4. Select Licenses to see which licenses the user currently has assigned.

Assign a user a license

To assign a license to a user, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator.

  2. Browse to Identity > Users > All users.

  3. Search for the user you're interested in and select the row with the user's details.

  4. Select Licenses to see which licenses the user currently has assigned.

  5. Select the Assign button.

  6. Select one or more products from the list of available products.

  7. Optional select the assignment options item to granularly assign products. Select Ok when this is completed.

  8. Select the Assign button to assign these licenses to this user.

Problems with groups

Application access can be blocked due to a problem with a group that is assigned to the application. Following are some ways you can troubleshoot and solve problems with groups and group memberships:

Check a group’s membership

To check a group’s membership, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator or groups administrator.
  2. Browse to Identity > Groups > All Groups.
  3. Search for the group you're interested in and select the row with the group's details.
  4. Select Members to review the list of users assigned to this group.

Check a dynamic group’s membership criteria

To check a dynamic group’s membership criteria, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator or groups administrator.

  2. Browse to Identity > Groups > All Groups.

  3. Search for the group you're interested in and select the row with the group's details.

  4. Select Dynamic membership rules.

  5. Review the simple or advanced rule defined for this group and ensure that the user you want to be a member of this group meets these criteria.

Check a group’s assigned licenses

To check a group’s assigned licenses, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator or groups administrator.

  2. Browse to Identity > Groups > All Groups.

  3. Search for the group you're interested in and select the row with the group's details.

  4. Select Licenses to see which licenses the group currently has assigned.

Reprocess a group’s licenses

To reprocess a group’s assigned licenses, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator or groups administrator.

  2. Browse to Identity > Groups > All Groups.

  3. Search for the group you're interested in and select the row with the group's details.

  4. Select Licenses to see which licenses the group currently has assigned.

  5. Select the Reprocess button to ensure that the licenses assigned to this group’s members are up-to-date. This may take a long time, depending on the size and complexity of the group.

    Note

    To do this faster, consider temporarily assigning a license to the user directly. Assign a user a license.

Assign a group a license

To assign a license to a group, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a user administrator or groups administrator.

  2. Browse to Identity > Groups > All Groups.

  3. Search for the group you're interested in and select the row with the group's details.

  4. Select Licenses to see which licenses the group currently has assigned.

  5. Select the Assign button.

  6. Select one or more products from the list of available products.

  7. Optional select the assignment options item to granularly assign products. Select Ok when this is completed.

  8. Select the Assign button to assign these licenses to this group. This may take a long time, depending on the size and complexity of the group.

    Note

    To do this faster, consider temporarily assigning a license to the user directly. Assign a user a license.

Problems with Conditional Access policies

Check a specific Conditional Access policy

To check or validate a single Conditional Access policy:

  1. Sign in to the Microsoft Entra admin center as at least a conditional access administrator.

  2. Browse to Identity > Applications > Enterprise applications.

  3. Select the Conditional Access navigation item.

  4. Select the policy you're interested in inspecting.

  5. Review that there are no specific conditions, assignments, or other settings that may be blocking user access.

    Note

    You may wish to temporarily disable this policy to ensure it is not affecting sign-ins. To do this, set the Enable policy toggle to No and click the Save button.

Check a specific application’s Conditional Access policy

To check or validate a single application’s currently configured Conditional Access policy:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Identity > Applications > Enterprise applications > All applications.

  3. Search for the application you're interested in, or the user is attempting to sign in to by application display name or application ID.

  4. Select the Conditional Access navigation item.

  5. Select the policy you're interested in inspecting.

  6. Review that there are no specific conditions, assignments, or other settings that may be blocking user access.

    Note

    You may wish to temporarily disable this policy to ensure it is not affecting sign-ins. To do this, set the Enable policy toggle to No and click the Save button.

Disable a specific Conditional Access policy

To check or validate a single Conditional Access policy:

  1. Sign in to the Microsoft Entra admin center as at least a conditional access administrator.
  2. Browse to Identity > Applications > Enterprise applications.
  3. Select the Conditional Access navigation item.
  4. Select the policy you're interested in inspecting.
  5. Disable the policy by setting the Enable policy toggle to No and select the Save button.

Application access can be blocked because the proper permissions consent operation hasn't occurred. Following are some ways you can troubleshoot and solve application consent issues:

  • For any OpenID Connect-enabled application that requests permissions, navigating to the application’s sign-in screen performs a user level consent to the application for the signed-in user.

  • If you wish to do this programmatically, see Requesting individual user consent.

  • For only applications developed using the V1 application model, you can force this administrator level consent to occur by adding “?prompt=admin_consent” to the end of an application’s sign-in URL.

  • For any application developed using the V2 application model, you can enforce this administrator-level consent to occur by following the instructions under the Request the permissions from a directory admin section of Using the admin consent endpoint.

  • For single-tenant applications that request permissions (like those you're developing or own in your organization), you can perform an administrative-level consent operation on behalf of all users by signing in as a Global Administrator and clicking on the Grant permissions button at the top of the Application Registry -> All Applications -> Select an App -> Required Permissions pane.

  • For any application developed using the V1 or V2 application model, you can enforce this administrator-level consent to occur by following the instructions under the Request the permissions from a directory admin section of Using the admin consent endpoint.

  • For multitenant applications that request permissions (like an application a third party, or Microsoft, develops), you can perform an administrative-level consent operation. Sign in as a Global Administrator and clicking on the Grant permissions button under the Enterprise Applications -> All Applications -> Select an App -> Permissions pane (available soon).

  • You can also enforce this administrator-level consent to occur by following the instructions under the Request the permissions from a directory admin section of Using the admin consent endpoint.

Next steps

Using the admin consent endpoint