Skip to content

Commit 2e314c6

Browse files
[Azure AD] Conditional Access - Troubleshooting Article from PG
1 parent 9a3efa7 commit 2e314c6

File tree

1 file changed

+20
-23
lines changed

1 file changed

+20
-23
lines changed

articles/active-directory/conditional-access/troubleshoot-conditional-access.md

Lines changed: 20 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -6,57 +6,55 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: troubleshooting
9-
ms.date: 07/03/2019
9+
ms.date: 03/13/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: calebb
14+
ms.reviewer: calebb, martinco
1515

1616
ms.collection: M365-identity-device-management
1717
---
1818
# Troubleshooting sign-in problems with Conditional Access
1919

20-
The information in this article can be used to troubleshoot unexpected sign in outcomes related to Conditional Access using error messages and Azure AD sign-ins log.
20+
The information in this article can be used to troubleshoot unexpected sign-in outcomes related to Conditional Access using error messages and Azure AD sign-ins log.
2121

22-
## Conditional Access sign-in interruption
22+
## Conditional Access sign-in interrupt
2323

2424
The first way is to review the error message that appears. For problems signing in when using a web browser, the error page itself has detailed information. This information alone may describe what the problem is and that may suggest a solution.
2525

2626
![Sign in error page from a browser](./media/troubleshoot-conditional-access/image1.png)
2727

2828
In the above error, the message states that the application can only be accessed from devices or client applications that meet the company's mobile device management policy. In this case, the application and device do not meet that policy.
2929

30-
## Azure AD Sign In events
30+
## Azure AD sign-in events
3131

32-
The second method to get detailed information about the sign-in interruption is to review the Azure AD Sign In events to see which Conditional Access policy or policies were applied and why.
32+
The second method to get detailed information about the sign-in interruption is to review the Azure AD sign-in events to see which Conditional Access policy or policies were applied and why.
3333

34-
More information can be found about the problem by clicking **More Details** in the initial error page. Clicking **More Details** will reveal troubleshooting information that is helpful when searching the Azure AD Sign In events for the specific failure event the user saw or when opening a support incident with Microsoft.
34+
More information can be found about the problem by clicking **More Details** in the initial error page. Clicking **More Details** will reveal troubleshooting information that is helpful when searching the Azure AD sign in events for the specific failure event the user saw or when opening a support incident with Microsoft.
3535

3636
![More details from a Conditional Access interrupted web browser sign-in.](./media/troubleshoot-conditional-access/image2.png)
3737

38-
> [!NOTE]
39-
> The Azure AD Sign-ins log is accessible to Global Admin, Global Reader and Security Administrator role members.
40-
4138
To find out which Conditional Access policy or policies applied and why do the following.
4239

43-
1.
44-
1. First, navigate to the **Azure AD Sign-ins blade**. The Azure AD Sign-In reports can be found in the **Monitoring** section of the Azure AD portal or directly from this link <https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/SignIns>.
45-
1. Next, update the **filters** to find the event for the sign-in you are reviewing. It is easy to find the event you are looking for by adjusting the filters.
46-
1. Update the **Date** filter to include the date and time the event occurred and then add the Conditional access field. Once, the **Conditional Access** field is added, click on it and select **Failure**. Then add username as an additional filter. Type in the **user principal name (UPN)** of the user and click **Apply**.
40+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or global reader.
41+
1. Browse to **Azure Active Directory** > **Sign-ins**.
42+
1. Find the event for the sign-in to review. Add or remove filters and columns to filter out unnecessary information.
43+
1. Add filters like:
44+
1. **Conditional access** to see policy failure and success
45+
1. **Username** to see information related to specific users.
46+
1. **Correlation ID** when you have a specific event to investigate.
4747

4848
![Selecting the Conditional access filter in the sign-ins log](./media/troubleshoot-conditional-access/image3.png)
4949

50-
![Filtering sign in events for Conditional Access failure](./media/troubleshoot-conditional-access/image4.png)
51-
52-
1. Update the **Date** filter to include the date and time the event occurred and then add **Correlation ID** as an additional filter. Paste in the **Correlation ID** from the failure event and then click **apply**.
5350
1. Once the sign-in event that corresponds to the user's sign-in failure has been found select the **Conditional Access** tab. The Conditional Access tab will show the specific policy or policies that resulted in the sign-in interruption.
54-
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name** will show the policy configuration user interface for the selected policy for review and editing.
55-
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
51+
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that did not meet compliance requirements.
52+
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name** will show the policy configuration user interface for the selected policy for review and editing.
53+
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
5654

5755
![Sign in event Conditional Access tab](./media/troubleshoot-conditional-access/image5.png)
5856

59-
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get wanted results, then a support incident may be opened. Navigate to that sign in event's **Troubleshooting and support** tab and select Create New Support Request.
57+
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get desired results, then a support incident may be opened. Navigate to that sign-in event's **Troubleshooting and support** tab and select **Create a new support request**.
6058

6159
![The Troubleshooting and support tab of the Sign-in event](./media/troubleshoot-conditional-access/image6.png)
6260

@@ -74,7 +72,6 @@ When submitting the incident, provide the request ID and time and date from the
7472

7573
## Next steps
7674

77-
- [Sign-in activity reports in the Azure Active Directory portal](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-sign-ins)
75+
- [Sign-in activity reports in the Azure Active Directory portal](../reports-monitoring/concept-sign-ins.md)
7876
- [Troubleshooting Conditional Access using the What If tool](troubleshoot-conditional-access-what-if.md)
79-
- Best practices for [Conditional Access in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/conditional-access/best-practices)
80-
- [How to roll out Conditional Access](https://www.youtube.com/watch?v=0_Fze7Zpyvc)
77+
- Best practices for [Conditional Access in Azure Active Directory](best-practices.md)

0 commit comments

Comments
 (0)