You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-sign-in-other-problem-access-panel.md
+54-83Lines changed: 54 additions & 83 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: troubleshooting
11
-
ms.date: 02/01/2022
11
+
ms.date: 09/05/2023
12
12
ms.author: jomondi
13
13
ms.reviewer: lenalepa
14
14
ms.custom: contperf-fy21q2, enterprise-apps
@@ -44,8 +44,8 @@ Here are some things to check if an app is appearing or not appearing:
44
44
- Make sure the user’s account is **enabled** for sign-ins.
45
45
- Make sure the user’s account is **not locked out.**
46
46
- Make sure the user’s **password is not expired or forgotten.**
47
-
- Make sure **Multi-Factor Authentication**is not blocking user access.
48
-
- Make sure a **Conditional Access policy** or **Identity Protection** policy is not blocking user access.
47
+
- Make sure **Multi-Factor Authentication**isn't blocking user access.
48
+
- Make sure a **Conditional Access policy** or **Identity Protection** policy isn't blocking user access.
49
49
- Make sure that a user’s **authentication contact info** is up to date to allow Multi-Factor Authentication or Conditional Access policies to be enforced.
50
50
- Make sure to also try clearing your browser’s cookies and trying to sign in again.
51
51
@@ -70,41 +70,32 @@ Access to My Apps can be blocked due to a problem with the user’s account. Fol
70
70
71
71
To check if a user’s account is present, follow these steps:
72
72
73
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
74
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
75
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
76
-
4. Select **Users and groups** in the navigation menu.
77
-
5. Select **All users**.
78
-
6.**Search** for the user you are interested in and **select the row** to select.
79
-
7. Check the properties of the user object to be sure that they look as you expect and no data is missing.
73
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
74
+
1. Browse to **Identity** > **Users** > **All users** >
75
+
1. Search for the user you're interested in and **select the row** to view the details of the user.
76
+
1. Check the properties of the user object to be sure that they look as you expect and no data is missing.
80
77
81
78
### Check a user’s account status
82
79
83
80
To check a user’s account status, follow these steps:
84
81
85
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
86
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
87
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
88
-
4. Select **Users and groups** in the navigation menu.
89
-
5. Select **All users**.
90
-
6.**Search** for the user you are interested in and **select the row** to select.
91
-
7. Select **Profile**.
92
-
8. Under **Settings** ensure that **Block sign in** is set to **No**.
82
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
83
+
1. Browse to **Identity** > **Users** > **All users** >
84
+
1.**Search** for the user you're interested in and **select the row** to select.
85
+
1. Select **Profile**.
86
+
1. Under **Settings** ensure that **Block sign in** is set to **No**.
93
87
94
88
### Reset a user’s password
95
89
96
90
To reset a user’s password, follow these steps:
97
91
98
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
99
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
100
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
101
-
4. Select **Users and groups** in the navigation menu.
102
-
5. Select **All users**.
103
-
6.**Search** for the user you are interested in and **select the row** to select.
104
-
7. Select the **Reset password** button at the top of the user pane.
105
-
8. Select the **Reset password** button on the **Reset password** pane that appears.
106
-
9. Copy the **temporary password** or **enter a new password** for the user.
107
-
10. Communicate this new password to the user, they be required to change this password during their next sign-in to Azure Active Directory.
92
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
93
+
1. Browse to **Identity** > **Users** > **All users** >
94
+
1.**Search** for the user you're interested in and **select the row** to select.
95
+
1. Select the **Reset password** button at the top of the user pane.
96
+
1. Select the **Reset password** button on the **Reset password** pane that appears.
97
+
1. Copy the **temporary password** or **enter a new password** for the user.
98
+
1. Communicate this new password to the user, they be required to change this password during their next sign-in to Azure Active Directory.
108
99
109
100
### Enable self-service password reset
110
101
@@ -117,84 +108,68 @@ To enable self-service password reset, follow these deployment steps:
117
108
118
109
To check a user’s multi-factor authentication status, follow these steps:
119
110
120
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
121
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
122
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
123
-
4. Select **Users and groups** in the navigation menu.
124
-
5. Select **All users**.
125
-
6. Select the **Multi-Factor Authentication** button at the top of the pane.
126
-
7. Once the **Multi-Factor Authentication Administration Portal** loads, ensure you are on the **Users** tab.
127
-
8. Find the user in the list of users by searching, filtering, or sorting.
128
-
9. Select the user from the list of users and **Enable**, **Disable**, or **Enforce** multi-factor authentication as desired.
111
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
112
+
1. Browse to **Identity** > **Users** > **All users** >
113
+
1. Select the **Per-user MFA** button at the top of the pane.
114
+
1. Once the **Multi-Factor Authentication** administration portal loads, ensure you are on the **Users** tab.
115
+
1. Find the user in the list of users by searching, filtering, or sorting.
116
+
1. Select the user from the list of users and **Enable**, **Disable**, or **Enforce** multi-factor authentication as desired.
129
117
>[!NOTE]
130
118
>If a user is in an **Enforced** state, you may set them to **Disabled** temporarily to let them back into their account. Once they are back in, you can then change their state to **Enabled** again to require them to re-register their contact information during their next sign-in. Alternatively, you can follow the steps in the [Check a user’s authentication contact info](#check-a-users-authentication-contact-info) to verify or set this data for them.
131
119
132
120
### Check a user’s authentication contact info
133
121
134
122
To check a user’s authentication contact info used for Multi-factor authentication, Conditional Access, Identity Protection, and Password Reset, follow these steps:
135
123
136
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
137
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
138
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
139
-
4. Select **Users and groups** in the navigation menu.
140
-
5. Select **All users**.
141
-
6.**Search** for the user you are interested in and **select the row** to select.
142
-
7. Select **Profile**.
143
-
8. Scroll down to **Authentication contact info**.
144
-
9.**Review** the data registered for the user and update as needed.
124
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
125
+
1. Browse to **Identity** > **Users** > **All users** >
126
+
1.**Search** for the user you're interested in and **select the row** to select.
127
+
1. Select **Authentication method** under **Manage**.
128
+
1.**Review** the data registered for the user and update as needed.
145
129
146
130
### Check a user’s group memberships
147
131
148
132
To check a user’s group memberships, follow these steps:
149
133
150
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
151
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
152
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
153
-
4. Select **Users and groups** in the navigation menu.
154
-
5. Select **All users**.
155
-
6.**Search** for the user you are interested in and **select the row** to select.
156
-
7. Select **Groups** to see which groups the user is a member of.
134
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
135
+
1. Browse to **Identity** > **Users** > **All users** >
136
+
1.**Search** for the user you're interested in and **select the row** to select.
137
+
1. Select **Groups** to see which groups the user is a member of.
157
138
158
139
### Check if a user has more than 999 app role assignments
159
140
160
141
If a user has more than 999 app role assignments, then they may not see all of their apps on My Apps.
161
142
162
-
This is because My Apps currently reads up to 999 app role assignments to determine the apps to which users are assigned. If a user is assigned to more than 999 apps, it is not possible to control which of those apps will show in the My Apps portal.
143
+
This is because My Apps currently reads up to 999 app role assignments to determine the apps to which users are assigned. If a user is assigned to more than 999 apps, it isn't possible to control which of those apps show in the My Apps portal.
163
144
164
145
To check if a user has more than 999 app role assignments, follow these steps:
165
146
166
147
1. Install the [**Microsoft.Graph**](https://github.com/microsoftgraph/msgraph-sdk-powershell) PowerShell module.
167
-
2. Run `Connect-MgGraph -Scopes "User.ReadBasic.All Application.Read.All"`.
168
-
3. Run `(Get-MgUserAppRoleAssignment -UserId "<user-id>" -PageSize 999).Count` to determine the number of app role assignments the user currently has granted.
169
-
4. If the result is 999, the user likely has more than 999 app roles assignments.
148
+
2. Run `Connect-MgGraph -Scopes "User.ReadBasic.All Application.Read.All"`and sign in as at least a [User Administrator](../roles/permissions-reference.md#user-administrator)..
149
+
1. Run `(Get-MgUserAppRoleAssignment -UserId "<user-id>" -PageSize 999).Count` to determine the number of app role assignments the user currently has granted.
150
+
1. If the result is 999, the user likely has more than 999 app roles assignments.
170
151
171
152
### Check a user’s assigned licenses
172
153
173
154
To check a user’s assigned licenses, follow these steps:
174
155
175
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
176
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
177
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
178
-
4. Select **Users and groups** in the navigation menu.
179
-
5. Select **All users**.
180
-
6.**Search** for the user you are interested in and **select the row** to select.
181
-
7. Select **Licenses** to see which licenses the user currently has assigned.
156
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
157
+
1. Browse to **Identity** > **Users** > **All users** >
158
+
1.**Search** for the user you're interested in and **select the row** to select.
159
+
1. Select **Licenses** to see which licenses the user currently has assigned.
182
160
183
161
### Assign a user a license
184
162
185
163
To assign a license to a user, follow these steps:
186
164
187
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
188
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
189
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
190
-
4. Select **Users and groups** in the navigation menu.
191
-
5. Select **All users**.
192
-
6.**Search** for the user you are interested in and **select the row** to select.
193
-
7. Select **Licenses** to see which licenses the user currently has assigned.
194
-
8. Select the **Assign** button.
195
-
9. Select **one or more products** from the list of available products.
196
-
10.**Optional** select the **assignment options** item to granularly assign products. Select **Ok**.
197
-
11. Select the **Assign** button to assign these licenses to this user.
165
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
166
+
1. Browse to **Identity** > **Users** > **All users** >
167
+
1.**Search** for the user you're interested in and **select the row** to select.
168
+
1. Select **Licenses** to see which licenses the user currently has assigned.
169
+
1. Select the **Assignments** button.
170
+
1. Select one or more licenses from the list of available products.
171
+
1. Optional: Select **Review license options** to granularly assign products.
172
+
1. Select **Save**.
198
173
199
174
## Troubleshooting deep links
200
175
@@ -204,14 +179,10 @@ Deep links or User access URLs are links your users may use to access their pass
204
179
205
180
To check if you have the correct deep link, follow these steps:
206
181
207
-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator** or **Co-admin.**
208
-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
209
-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
210
-
4. Select **Enterprise Applications** from the Azure Active Directory left-hand navigation menu.
211
-
5. Select **All Applications** to view a list of all your applications.
212
-
- If you do not see the application you want show up here, use the **Filter** control at the top of the **All Applications List** and set the **Show** option to **All Applications.**
213
-
6. Select the application you want the check the deep link for.
214
-
7. Find the label **User Access URL**. Your deep link should match this URL.
182
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
0 commit comments