You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/troubleshoot-conditional-access.md
+20-23Lines changed: 20 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,57 +6,55 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: troubleshooting
9
-
ms.date: 07/03/2019
9
+
ms.date: 03/13/2020
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: daveba
14
-
ms.reviewer: calebb
14
+
ms.reviewer: calebb, martinco
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
# Troubleshooting sign-in problems with Conditional Access
19
19
20
-
The information in this article can be used to troubleshoot unexpected signin outcomes related to Conditional Access using error messages and Azure AD sign-ins log.
20
+
The information in this article can be used to troubleshoot unexpected sign-in outcomes related to Conditional Access using error messages and Azure AD sign-ins log.
21
21
22
-
## Conditional Access sign-in interruption
22
+
## Conditional Access sign-in interrupt
23
23
24
24
The first way is to review the error message that appears. For problems signing in when using a web browser, the error page itself has detailed information. This information alone may describe what the problem is and that may suggest a solution.
25
25
26
26

27
27
28
28
In the above error, the message states that the application can only be accessed from devices or client applications that meet the company's mobile device management policy. In this case, the application and device do not meet that policy.
29
29
30
-
## Azure AD Sign In events
30
+
## Azure AD sign-in events
31
31
32
-
The second method to get detailed information about the sign-in interruption is to review the Azure AD Sign In events to see which Conditional Access policy or policies were applied and why.
32
+
The second method to get detailed information about the sign-in interruption is to review the Azure AD sign-in events to see which Conditional Access policy or policies were applied and why.
33
33
34
-
More information can be found about the problem by clicking **More Details** in the initial error page. Clicking **More Details** will reveal troubleshooting information that is helpful when searching the Azure AD Sign In events for the specific failure event the user saw or when opening a support incident with Microsoft.
34
+
More information can be found about the problem by clicking **More Details** in the initial error page. Clicking **More Details** will reveal troubleshooting information that is helpful when searching the Azure AD sign in events for the specific failure event the user saw or when opening a support incident with Microsoft.
35
35
36
36

37
37
38
-
> [!NOTE]
39
-
> The Azure AD Sign-ins log is accessible to Global Admin, Global Reader and Security Administrator role members.
40
-
41
38
To find out which Conditional Access policy or policies applied and why do the following.
42
39
43
-
1.
44
-
1. First, navigate to the **Azure AD Sign-ins blade**. The Azure AD Sign-In reports can be found in the **Monitoring** section of the Azure AD portal or directly from this link <https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns>.
45
-
1. Next, update the **filters** to find the event for the sign-in you are reviewing. It is easy to find the event you are looking for by adjusting the filters.
46
-
1. Update the **Date** filter to include the date and time the event occurred and then add the Conditional access field. Once, the **Conditional Access** field is added, click on it and select **Failure**. Then add username as an additional filter. Type in the **user principal name (UPN)** of the user and click **Apply**.
40
+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or global reader.
41
+
1. Browse to **Azure Active Directory** > **Sign-ins**.
42
+
1. Find the event for the sign-in to review. Add or remove filters and columns to filter out unnecessary information.
43
+
1. Add filters like:
44
+
1.**Conditional access** to see policy failure and success
45
+
1.**Username** to see information related to specific users.
46
+
1.**Correlation ID** when you have a specific event to investigate.
47
47
48
48

49
49
50
-

51
-
52
-
1. Update the **Date** filter to include the date and time the event occurred and then add **Correlation ID** as an additional filter. Paste in the **Correlation ID** from the failure event and then click **apply**.
53
50
1. Once the sign-in event that corresponds to the user's sign-in failure has been found select the **Conditional Access** tab. The Conditional Access tab will show the specific policy or policies that resulted in the sign-in interruption.
54
-
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name** will show the policy configuration user interface for the selected policy for review and editing.
55
-
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
51
+
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that did not meet compliance requirements.
52
+
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name** will show the policy configuration user interface for the selected policy for review and editing.
53
+
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
56
54
57
55

58
56
59
-
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get wanted results, then a support incident may be opened. Navigate to that signin event's **Troubleshooting and support** tab and select Create New Support Request.
57
+
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get desired results, then a support incident may be opened. Navigate to that sign-in event's **Troubleshooting and support** tab and select **Create a new support request**.
60
58
61
59

62
60
@@ -74,7 +72,6 @@ When submitting the incident, provide the request ID and time and date from the
74
72
75
73
## Next steps
76
74
77
-
-[Sign-in activity reports in the Azure Active Directory portal](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-sign-ins)
75
+
-[Sign-in activity reports in the Azure Active Directory portal](../reports-monitoring/concept-sign-ins.md)
78
76
-[Troubleshooting Conditional Access using the What If tool](troubleshoot-conditional-access-what-if.md)
79
-
- Best practices for [Conditional Access in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/conditional-access/best-practices)
80
-
-[How to roll out Conditional Access](https://www.youtube.com/watch?v=0_Fze7Zpyvc)
77
+
- Best practices for [Conditional Access in Azure Active Directory](best-practices.md)
0 commit comments