You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-properties.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 09/22/2021
11
+
ms.date: 09/06/2022
12
12
ms.author: ergreenl
13
13
#Customer intent: As an administrator of an Azure AD tenant, I want to learn more about the properties of an enterprise application that I can configure.
In this scenario, Azure Active Directory (Azure AD) signs the user in. But the application displays an error message and doesn't let the user finish the sign-in flow. The problem is that the app didn't accept the response that Azure AD issued.
19
19
20
-
There are several possible reasons why the app didn't accept the response from Azure AD. If the error message doesn't clearly identify what's missing from the response, try the following:
20
+
There are several possible reasons why the app didn't accept the response from Azure AD. If there is an error message or code displayed, use the following resources to diagnose the error:
21
+
22
+
*[Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
If the error message doesn't clearly identify what's missing from the response, try the following:
21
28
22
29
- If the app is the Azure AD gallery, verify that you followed the steps in [How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
23
30
@@ -58,13 +65,13 @@ To add an attribute in the Azure AD configuration that will be sent in the Azure
58
65
59
66
The next time that the user signs in to the app, Azure AD will send the new attribute in the SAML response.
60
67
61
-
## The app doesn't identify the user
68
+
## The app cannot identify the user
62
69
63
70
Signing in to the app fails because the SAML response is missing an attribute such as a role. Or it fails because the app expects a different format or value for the **NameID** (User Identifier) attribute.
64
71
65
72
If you're using [Azure AD automated user provisioning](../app-provisioning/user-provisioning.md) to create, maintain, and remove users in the app, verify that the user has been provisioned to the SaaS app. For more information, see [No users are being provisioned to an Azure AD Gallery application](../app-provisioning/application-provisioning-config-problem-no-users-provisioned.md).
66
73
67
-
## Add an attribute to the Azure AD app configuration
74
+
###Add an attribute to the Azure AD app configuration
68
75
69
76
To change the User Identifier value, follow these steps:
70
77
@@ -87,7 +94,7 @@ To change the User Identifier value, follow these steps:
87
94
88
95
8. Under **User attributes**, select the unique identifier for the user from the **User Identifier** drop-down list.
89
96
90
-
## Change the NameID format
97
+
###Change the NameID format
91
98
92
99
If the application expects another format for the **NameID** (User Identifier) attribute, see [Editing nameID](../develop/active-directory-saml-claims-customization.md#editing-nameid) to change the NameID format.
93
100
@@ -155,4 +162,8 @@ To change the signing algorithm, follow these steps:
155
162
156
163
## Next steps
157
164
158
-
[How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
165
+
*[How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
166
+
167
+
*[Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-sign-in-unexpected-user-consent-error.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: troubleshooting
11
-
ms.date: 07/11/2017
11
+
ms.date: 09/06/2022
12
12
ms.author: ergreenl
13
13
ms.reviewer: phsignor, yuhko
14
14
ms.collection: M365-identity-device-management
@@ -31,31 +31,27 @@ This error occurs when a user who is not a Global Administrator attempts to use
31
31
32
32
This error can also occur when a user is prevented from consenting to an application due to Microsoft detecting that the permissions request is risky. In this case, an audit event will also be logged with a Category of "ApplicationManagement", Activity Type of "Consent to application" and Status Reason of "Risky application detected".
33
33
34
-
Another scenario in which this error might occur is when the user assignment is required for the application, but no administrator consent was provided. In this case, the administrator must first provide administrator consent.
34
+
Another scenario in which this error might occur is when the user assignment is required for the application, but no administrator consent was provided. In this case, the administrator must first provide tenant-wide admin consent for the application.
35
35
36
36
## Policy prevents granting permissions error
37
37
38
38
***AADSTS90093:** An administrator of <tenantDisplayName> has set a policy that prevents you from granting <name of app> the permissions it is requesting. Contact an administrator of <tenantDisplayName>, who can grant permissions to this app on your behalf.
39
39
40
-
This error occurs when a Global Administrator turns off the ability for users to consent to applications, then a non-administrator user attempts to use an application that requires consent. This error can be resolved by an administrator granting access to the application on behalf of their organization.
40
+
This error can occur when a Global Administrator turns off the ability for users to consent to applications, then a non-administrator user attempts to use an application that requires consent. This error can be resolved by an administrator granting access to the application on behalf of their organization.
41
41
42
42
## Intermittent problem error
43
43
44
44
***AADSTS90090:** It looks like the sign-in process encountered an intermittent problem recording the permissions you attempted to grant to <clientAppDisplayName>. try again later.
45
45
46
46
This error indicates that an intermittent service side issue has occurred. It can be resolved by attempting to consent to the application again.
47
47
48
-
## Resource not available error
49
48
50
-
***AADSTS65005:** The app <clientAppDisplayName> requested permissions to access a resource <resourceAppDisplayName> that is not available.
51
-
52
-
Contact the application developer.
53
49
54
50
## Resource not available in tenant error
55
51
56
52
***AADSTS65005:**<clientAppDisplayName> is requesting access to a resource <resourceAppDisplayName> that is not available in your organization <tenantDisplayName>.
57
53
58
-
Ensure that this resource is available or contact an administrator of <tenantDisplayName>.
54
+
Ensure that these resources that provide the permissions requested are available in your tenant or contact an administrator of <tenantDisplayName>. Otherwise, there is a misconfiguration in how the application requests resources, and you should contact the application developer.
59
55
60
56
## Permissions mismatch error
61
57
@@ -91,3 +87,5 @@ End-users will not be able to grant consent to apps that have been detected as r
91
87
[Apps, permissions, and consent in Azure Active Directory (v1 endpoint)](../develop/quickstart-register-app.md)<br>
92
88
93
89
[Scopes, permissions, and consent in the Azure Active Directory (v2.0 endpoint)](../develop/v2-permissions-and-consent.md)
90
+
91
+
[Unexpected consent prompt when signing in to an application](application-sign-in-unexpected-user-consent-prompt.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-sign-in-unexpected-user-consent-prompt.md
+45-9Lines changed: 45 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,43 +8,79 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: troubleshooting
11
-
ms.date: 07/11/2017
11
+
ms.date: 09/07/2022
12
12
ms.author: ergreenl
13
13
ms.reviewer: phsignor, yuhko
14
14
ms.collection: M365-identity-device-management
15
15
---
16
16
17
17
# Unexpected consent prompt when signing in to an application
18
18
19
-
Many applications that integrate with Azure Active Directory require permissions to various resources in order to run. When these resources are also integrated with Azure Active Directory, permissions to access them is requested using the Azure AD consent framework.
19
+
Many applications that integrate with Azure Active Directory require permissions to various resources in order to run. When these resources are also integrated with Azure Active Directory, permissions to access them is requested using the Azure AD consent framework. These requests result in a consent prompt being shown the first time an application is used, which is often a one-time operation.
20
20
21
-
This results in a consent prompt being shown the first time an application is used, which is often a one-time operation.
21
+
In certain scenarios, additional consent prompts can appear when a user attempts to sign-in. In this article, we will diagnose the reason for the unexpected consent prompts showing, and how to troubleshoot.
Additional prompts can be expected in various scenarios:
27
+
Further prompts can be expected in various scenarios:
28
28
29
-
* The application has been configured to require assignment. User consent is not currently supported for apps which require assignment. If you configure an application to require assignment, be sure to also grant tenant-wide admin consent so that assigned user can signin.
29
+
* The application has been configured to require assignment. Individual user consent is not currently supported for apps which require assignment; thus the permissions must be granted by an admin for the whole directory. If you configure an application to require assignment, be sure to also grant tenant-wide admin consent so that assigned user can sign-in.
30
30
31
-
* The set of permissions required by the application has changed.
31
+
* The set of permissions required by the application has changed by the developer and needs to be granted again.
32
32
33
33
* The user who originally consented to the application was not an administrator, and now a different (non-admin) user is using the application for the first time.
34
34
35
-
* The user who originally consented to the application was an administrator, but they did not consent on-behalf of the entire organization.
35
+
* The user who originally consented to the application was an administrator, but they didn't consent on-behalf of the entire organization.
36
36
37
-
* The application is using [incremental and dynamic consent](../azuread-dev/azure-ad-endpoint-comparison.md#incremental-and-dynamic-consent) to request additional permissions after consent was initially granted. This is often used when optional features of an application additional require permissions beyond those required for baseline functionality.
37
+
* The application is using [incremental and dynamic consent](../azuread-dev/azure-ad-endpoint-comparison.md#incremental-and-dynamic-consent) to request further permissions after consent was initially granted. Incremental and dynamic consent is often used when optional features of an application require permissions beyond those required for baseline functionality.
38
38
39
39
* Consent was revoked after being granted initially.
40
40
41
-
* The developer has configured the application to require a consent prompt every time it is used (note: this is not best practice).
41
+
* The developer has configured the application to require a consent prompt every time it is used (note: this behavior isn't best practice).
42
42
43
43
> [!NOTE]
44
44
> Following Microsoft's recommendations and best practices, many organizations have disabled or limited users' permission to grant consent to apps. If an application forces users to grant consent every time they sign in, most users will be blocked from using these applications even if an administrator grants tenant-wide admin consent. If you encounter an application which is requiring user consent even after admin consent has been granted, check with the app publisher to see if they have a setting or option to stop forcing user consent on every sign in.
45
45
46
+
## Troubleshooting steps
47
+
48
+
### Compare permissions requested and granted for the applications
49
+
50
+
To ensure the permissions granted for the application are up-to-date, you can compare the permissions that are being requested by the application with the permissions already granted in the tenant.
51
+
52
+
1. Sign-in to the Azure portal with an administrator account.
53
+
2. Navigate to **Enterprise applications**.
54
+
3. Select the application in question from the list.
55
+
4. Under Security in the left-hand navigation, choose **Permissions**
56
+
5. View the list of already granted permissions from the table on the Permissions page
57
+
6. To view the requested permissions, click on the **Grant admin consent** button. (NOTE: This will open a consent prompt listing all of the requested permissions. Don't click accept on the consent prompt unless you are sure you want to grant tenant-wide admin consent.)
58
+
7. Within the consent prompt, expand the listed permissions and compare with the table on the permissions page. If any are present in the consent prompt but not the permissions page, that permission has yet to be consented to. Unconsented permissions may be the cause for unexpected consent prompts showing for the application.
59
+
60
+
### View user assignment settings
61
+
62
+
If the application requires assignment, individual users can't consent for themselves. To check if assignment is required for the application, do the following:
63
+
64
+
1. Sign-in to the Azure portal with an administrator account.
65
+
2. Navigate to **Enterprise applications**.
66
+
3. Select the application in question from the list.
67
+
4. Under Manage in the left-hand navigation, choose **Properties**.
68
+
5. Check to see if **Assignment required?** is set to **Yes**.
69
+
6. If set to yes, then an admin must consent to the permissions on behalf of the entire organization.
70
+
71
+
### Review tenant-wide user consent settings
72
+
73
+
Determining whether an individual user can consent to an application can be configured by every organization, and may differ from directory to directory. Even if every permission doesn't require admin consent by default, your organization may have disabled user consent entirely, preventing an individual user to consent for themselves for an application. To view your organization's user consent settings, do the following:
74
+
75
+
1. Sign-in to the Azure portal with an administrator account.
76
+
2. Navigate to **Enterprise applications**.
77
+
3. Under Security in the left-hand navigation, choose **Consent and permissions**.
78
+
4. View the user consent settings. If set to *Do not allow user consent*, users will never be able to consent on behalf of themselves for an application.
79
+
46
80
## Next steps
47
81
48
82
*[Apps, permissions, and consent in Azure Active Directory (v1.0 endpoint)](../develop/quickstart-register-app.md)
49
83
50
84
*[Scopes, permissions, and consent in the Azure Active Directory (v2.0 endpoint)](../develop/v2-permissions-and-consent.md)
85
+
86
+
*[Unexpected error when performing consent to an application](application-sign-in-unexpected-user-consent-error.md)
0 commit comments