Skip to content

Commit c7d0ae7

Browse files
Merge pull request #191799 from MicrosoftGuyJFlo/GitHubIssue89495
[Azure AD] Conditional Access - GitHub Issue 89495
2 parents 34cb3ad + 10e9032 commit c7d0ae7

File tree

2 files changed

+11
-13
lines changed

2 files changed

+11
-13
lines changed

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ By default the policy will provide an option to exclude the current user from th
7474

7575
![Warning, don't lock yourself out!](./media/concept-conditional-access-users-groups/conditional-access-users-and-groups-lockout-warning.png)
7676

77-
If you do find yourself locked out[What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-you-are-locked-out-of-the-azure-portal)
77+
If you do find yourself locked out[What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
7878

7979
## Next steps
8080

articles/active-directory/conditional-access/troubleshoot-conditional-access.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: troubleshooting
9-
ms.date: 10/16/2020
9+
ms.date: 03/15/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: calebb, martinco
14+
ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -28,9 +28,9 @@ Organizations should avoid the following configurations:
2828
**For all users, all cloud apps:**
2929

3030
- **Block access** - This configuration blocks your entire organization.
31-
- **Require device to be marked as compliant** - For users that have not enrolled their devices yet, this policy blocks all access including access to the Intune portal. If you are an administrator without an enrolled device, this policy blocks you from getting back into the Azure portal to change the policy.
31+
- **Require device to be marked as compliant** - For users that haven't enrolled their devices yet, this policy blocks all access including access to the Intune portal. If you're an administrator without an enrolled device, this policy blocks you from getting back into the Azure portal to change the policy.
3232
- **Require Hybrid Azure AD domain joined device** - This policy block access has also the potential to block access for all users in your organization if they don't have a hybrid Azure AD joined device.
33-
- **Require app protection policy** - This policy block access has also the potential to block access for all users in your organization if you don't have an Intune policy. If you are an administrator without a client application that has an Intune app protection policy, this policy blocks you from getting back into portals such as Intune and Azure.
33+
- **Require app protection policy** - This policy block access has also the potential to block access for all users in your organization if you don't have an Intune policy. If you're an administrator without a client application that has an Intune app protection policy, this policy blocks you from getting back into portals such as Intune and Azure.
3434

3535
**For all users, all cloud apps, all device platforms:**
3636

@@ -42,7 +42,7 @@ The first way is to review the error message that appears. For problems signing
4242

4343
![Sign in error - compliant device required](./media/troubleshoot-conditional-access/image1.png)
4444

45-
In the above error, the message states that the application can only be accessed from devices or client applications that meet the company's mobile device management policy. In this case, the application and device do not meet that policy.
45+
In the above error, the message states that the application can only be accessed from devices or client applications that meet the company's mobile device management policy. In this case, the application and device don't meet that policy.
4646

4747
## Azure AD sign-in events
4848

@@ -66,7 +66,7 @@ To find out which Conditional Access policy or policies applied and why do the f
6666
![Selecting the Conditional access filter in the sign-ins log](./media/troubleshoot-conditional-access/image3.png)
6767

6868
1. Once the sign-in event that corresponds to the user's sign-in failure has been found select the **Conditional Access** tab. The Conditional Access tab will show the specific policy or policies that resulted in the sign-in interruption.
69-
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that did not meet compliance requirements.
69+
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that didn't meet compliance requirements.
7070
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name** will show the policy configuration user interface for the selected policy for review and editing.
7171
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
7272

@@ -80,11 +80,9 @@ Selecting the ellipsis on the right side of the policy in a sign-in event brings
8080

8181
The left side provides details collected at sign-in and the right side provides details of whether those details satisfy the requirements of the applied Conditional Access policies. Conditional Access policies only apply when all conditions are satisfied or not configured.
8282

83-
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get desired results, then a support incident may be opened. Navigate to that sign-in event's **Troubleshooting and support** tab and select **Create a new support request**.
83+
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get desired results, the sign-in diagnostic tool can be used. The sign-in diagnostic can be found under **Basic info** > **Troubleshoot Event**. For more information about the sign-in diagnostic, see the article [What is the sign-in diagnostic in Azure AD](../reports-monitoring/overview-sign-in-diagnostics.md).
8484

85-
![The Troubleshooting and support tab of the Sign-in event](./media/troubleshoot-conditional-access/image6.png)
86-
87-
When submitting the incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information will allow Microsoft support to find the event you're concerned about.
85+
If you need to submit a support incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information will allow Microsoft support to find the specific event you're concerned about.
8886

8987
### Conditional Access error codes
9088

@@ -96,9 +94,9 @@ When submitting the incident, provide the request ID and time and date from the
9694
| 53003 | BlockedByConditionalAccess |
9795
| 53004 | ProofUpBlockedDueToRisk |
9896

99-
## What to do if you are locked out of the Azure portal?
97+
## What to do if you're locked out of the Azure portal?
10098

101-
If you are locked out of the Azure portal due to an incorrect setting in a Conditional Access policy:
99+
If you're locked out of the Azure portal due to an incorrect setting in a Conditional Access policy:
102100

103101
- Check is there are other administrators in your organization that aren't blocked yet. An administrator with access to the Azure portal can disable the policy that is impacting your sign-in.
104102
- If none of the administrators in your organization can update the policy, submit a support request. Microsoft support can review and upon confirmation update the Conditional Access policies that are preventing access.

0 commit comments

Comments
 (0)