Skip to content

Commit d98cd1e

Browse files
authored
Merge pull request #250278 from omondiatieno/other-problem
Other sign in problem - update UI steps
2 parents 01f6459 + c12edef commit d98cd1e

File tree

1 file changed

+54
-83
lines changed

1 file changed

+54
-83
lines changed

articles/active-directory/manage-apps/application-sign-in-other-problem-access-panel.md

Lines changed: 54 additions & 83 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 02/01/2022
11+
ms.date: 09/05/2023
1212
ms.author: jomondi
1313
ms.reviewer: lenalepa
1414
ms.custom: contperf-fy21q2, enterprise-apps
@@ -44,8 +44,8 @@ Here are some things to check if an app is appearing or not appearing:
4444
- Make sure the user’s account is **enabled** for sign-ins.
4545
- Make sure the user’s account is **not locked out.**
4646
- Make sure the user’s **password is not expired or forgotten.**
47-
- Make sure **Multi-Factor Authentication** is not blocking user access.
48-
- Make sure a **Conditional Access policy** or **Identity Protection** policy is not blocking user access.
47+
- Make sure **Multi-Factor Authentication** isn't blocking user access.
48+
- Make sure a **Conditional Access policy** or **Identity Protection** policy isn't blocking user access.
4949
- Make sure that a user’s **authentication contact info** is up to date to allow Multi-Factor Authentication or Conditional Access policies to be enforced.
5050
- Make sure to also try clearing your browser’s cookies and trying to sign in again.
5151

@@ -70,41 +70,32 @@ Access to My Apps can be blocked due to a problem with the user’s account. Fol
7070

7171
To check if a user’s account is present, follow these steps:
7272

73-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
74-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
75-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
76-
4. Select **Users and groups** in the navigation menu.
77-
5. Select **All users**.
78-
6. **Search** for the user you are interested in and **select the row** to select.
79-
7. Check the properties of the user object to be sure that they look as you expect and no data is missing.
73+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
74+
1. Browse to **Identity** > **Users** > **All users** >
75+
1. Search for the user you're interested in and **select the row** to view the details of the user.
76+
1. Check the properties of the user object to be sure that they look as you expect and no data is missing.
8077

8178
### Check a user’s account status
8279

8380
To check a user’s account status, follow these steps:
8481

85-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
86-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
87-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
88-
4. Select **Users and groups** in the navigation menu.
89-
5. Select **All users**.
90-
6. **Search** for the user you are interested in and **select the row** to select.
91-
7. Select **Profile**.
92-
8. Under **Settings** ensure that **Block sign in** is set to **No**.
82+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
83+
1. Browse to **Identity** > **Users** > **All users** >
84+
1. **Search** for the user you're interested in and **select the row** to select.
85+
1. Select **Profile**.
86+
1. Under **Settings** ensure that **Block sign in** is set to **No**.
9387

9488
### Reset a user’s password
9589

9690
To reset a user’s password, follow these steps:
9791

98-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
99-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
100-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
101-
4. Select **Users and groups** in the navigation menu.
102-
5. Select **All users**.
103-
6. **Search** for the user you are interested in and **select the row** to select.
104-
7. Select the **Reset password** button at the top of the user pane.
105-
8. Select the **Reset password** button on the **Reset password** pane that appears.
106-
9. Copy the **temporary password** or **enter a new password** for the user.
107-
10. Communicate this new password to the user, they be required to change this password during their next sign-in to Azure Active Directory.
92+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
93+
1. Browse to **Identity** > **Users** > **All users** >
94+
1. **Search** for the user you're interested in and **select the row** to select.
95+
1. Select the **Reset password** button at the top of the user pane.
96+
1. Select the **Reset password** button on the **Reset password** pane that appears.
97+
1. Copy the **temporary password** or **enter a new password** for the user.
98+
1. Communicate this new password to the user, they be required to change this password during their next sign-in to Azure Active Directory.
10899

109100
### Enable self-service password reset
110101

@@ -117,84 +108,68 @@ To enable self-service password reset, follow these deployment steps:
117108

118109
To check a user’s multi-factor authentication status, follow these steps:
119110

120-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
121-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
122-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
123-
4. Select **Users and groups** in the navigation menu.
124-
5. Select **All users**.
125-
6. Select the **Multi-Factor Authentication** button at the top of the pane.
126-
7. Once the **Multi-Factor Authentication Administration Portal** loads, ensure you are on the **Users** tab.
127-
8. Find the user in the list of users by searching, filtering, or sorting.
128-
9. Select the user from the list of users and **Enable**, **Disable**, or **Enforce** multi-factor authentication as desired.
111+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
112+
1. Browse to **Identity** > **Users** > **All users** >
113+
1. Select the **Per-user MFA** button at the top of the pane.
114+
1. Once the **Multi-Factor Authentication** administration portal loads, ensure you are on the **Users** tab.
115+
1. Find the user in the list of users by searching, filtering, or sorting.
116+
1. Select the user from the list of users and **Enable**, **Disable**, or **Enforce** multi-factor authentication as desired.
129117
>[!NOTE]
130118
>If a user is in an **Enforced** state, you may set them to **Disabled** temporarily to let them back into their account. Once they are back in, you can then change their state to **Enabled** again to require them to re-register their contact information during their next sign-in. Alternatively, you can follow the steps in the [Check a user’s authentication contact info](#check-a-users-authentication-contact-info) to verify or set this data for them.
131119
132120
### Check a user’s authentication contact info
133121

134122
To check a user’s authentication contact info used for Multi-factor authentication, Conditional Access, Identity Protection, and Password Reset, follow these steps:
135123

136-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
137-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
138-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
139-
4. Select **Users and groups** in the navigation menu.
140-
5. Select **All users**.
141-
6. **Search** for the user you are interested in and **select the row** to select.
142-
7. Select **Profile**.
143-
8. Scroll down to **Authentication contact info**.
144-
9. **Review** the data registered for the user and update as needed.
124+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
125+
1. Browse to **Identity** > **Users** > **All users** >
126+
1. **Search** for the user you're interested in and **select the row** to select.
127+
1. Select **Authentication method** under **Manage**.
128+
1. **Review** the data registered for the user and update as needed.
145129

146130
### Check a user’s group memberships
147131

148132
To check a user’s group memberships, follow these steps:
149133

150-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
151-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
152-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
153-
4. Select **Users and groups** in the navigation menu.
154-
5. Select **All users**.
155-
6. **Search** for the user you are interested in and **select the row** to select.
156-
7. Select **Groups** to see which groups the user is a member of.
134+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
135+
1. Browse to **Identity** > **Users** > **All users** >
136+
1. **Search** for the user you're interested in and **select the row** to select.
137+
1. Select **Groups** to see which groups the user is a member of.
157138

158139
### Check if a user has more than 999 app role assignments
159140

160141
If a user has more than 999 app role assignments, then they may not see all of their apps on My Apps.
161142

162-
This is because My Apps currently reads up to 999 app role assignments to determine the apps to which users are assigned. If a user is assigned to more than 999 apps, it is not possible to control which of those apps will show in the My Apps portal.
143+
This is because My Apps currently reads up to 999 app role assignments to determine the apps to which users are assigned. If a user is assigned to more than 999 apps, it isn't possible to control which of those apps show in the My Apps portal.
163144

164145
To check if a user has more than 999 app role assignments, follow these steps:
165146

166147
1. Install the [**Microsoft.Graph**](https://github.com/microsoftgraph/msgraph-sdk-powershell) PowerShell module.
167-
2. Run `Connect-MgGraph -Scopes "User.ReadBasic.All Application.Read.All"`.
168-
3. Run `(Get-MgUserAppRoleAssignment -UserId "<user-id>" -PageSize 999).Count` to determine the number of app role assignments the user currently has granted.
169-
4. If the result is 999, the user likely has more than 999 app roles assignments.
148+
2. Run `Connect-MgGraph -Scopes "User.ReadBasic.All Application.Read.All"`and sign in as at least a [User Administrator](../roles/permissions-reference.md#user-administrator)..
149+
1. Run `(Get-MgUserAppRoleAssignment -UserId "<user-id>" -PageSize 999).Count` to determine the number of app role assignments the user currently has granted.
150+
1. If the result is 999, the user likely has more than 999 app roles assignments.
170151

171152
### Check a user’s assigned licenses
172153

173154
To check a user’s assigned licenses, follow these steps:
174155

175-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
176-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
177-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
178-
4. Select **Users and groups** in the navigation menu.
179-
5. Select **All users**.
180-
6. **Search** for the user you are interested in and **select the row** to select.
181-
7. Select **Licenses** to see which licenses the user currently has assigned.
156+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
157+
1. Browse to **Identity** > **Users** > **All users** >
158+
1. **Search** for the user you're interested in and **select the row** to select.
159+
1. Select **Licenses** to see which licenses the user currently has assigned.
182160

183161
### Assign a user a license
184162

185163
To assign a license to a user, follow these steps:
186164

187-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator.**
188-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
189-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
190-
4. Select **Users and groups** in the navigation menu.
191-
5. Select **All users**.
192-
6. **Search** for the user you are interested in and **select the row** to select.
193-
7. Select **Licenses** to see which licenses the user currently has assigned.
194-
8. Select the **Assign** button.
195-
9. Select **one or more products** from the list of available products.
196-
10. **Optional** select the **assignment options** item to granularly assign products. Select **Ok**.
197-
11. Select the **Assign** button to assign these licenses to this user.
165+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
166+
1. Browse to **Identity** > **Users** > **All users** >
167+
1. **Search** for the user you're interested in and **select the row** to select.
168+
1. Select **Licenses** to see which licenses the user currently has assigned.
169+
1. Select the **Assignments** button.
170+
1. Select one or more licenses from the list of available products.
171+
1. Optional: Select **Review license options** to granularly assign products.
172+
1. Select **Save**.
198173

199174
## Troubleshooting deep links
200175

@@ -204,14 +179,10 @@ Deep links or User access URLs are links your users may use to access their pass
204179

205180
To check if you have the correct deep link, follow these steps:
206181

207-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator** or **Co-admin.**
208-
2. Open the **Azure Active Directory Extension** by selecting **All services** at the top of the main left-hand navigation menu.
209-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
210-
4. Select **Enterprise Applications** from the Azure Active Directory left-hand navigation menu.
211-
5. Select **All Applications** to view a list of all your applications.
212-
- If you do not see the application you want show up here, use the **Filter** control at the top of the **All Applications List** and set the **Show** option to **All Applications.**
213-
6. Select the application you want the check the deep link for.
214-
7. Find the label **User Access URL**. Your deep link should match this URL.
182+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
183+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
184+
1. Enter the name of the existing application in the search box, and then select the application from the search results.
185+
1. Find the label **User Access URL**. Your deep link should match this URL.
215186

216187
## Contact support
217188

0 commit comments

Comments
 (0)