Skip to content

Commit e5f8768

Browse files
authored
Merge pull request #208145 from MicrosoftGuyJFlo/ConditionalAccessSupport0822
[Azure AD] Conditional Access - Supportability 08-22
2 parents 70aaa3e + 47b3c16 commit e5f8768

File tree

4 files changed

+15
-8
lines changed

4 files changed

+15
-8
lines changed

articles/active-directory/conditional-access/howto-conditional-access-policy-risk-user.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 03/21/2022
9+
ms.date: 08/16/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -49,6 +49,8 @@ After confirming your settings using [report-only mode](howto-conditional-access
4949

5050
## Next steps
5151

52+
[Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
53+
5254
[Conditional Access common policies](concept-conditional-access-policy-common.md)
5355

5456
[Sign-in risk-based Conditional Access](howto-conditional-access-policy-risk.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-risk.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 03/21/2022
9+
ms.date: 08/16/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -53,6 +53,8 @@ After confirming your settings using [report-only mode](howto-conditional-access
5353

5454
## Next steps
5555

56+
[Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
57+
5658
[Conditional Access common policies](concept-conditional-access-policy-common.md)
5759

5860
[User risk-based Conditional Access](howto-conditional-access-policy-risk-user.md)

articles/active-directory/conditional-access/troubleshoot-conditional-access.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: troubleshooting
9-
ms.date: 07/06/2022
9+
ms.date: 08/16/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -70,7 +70,7 @@ To find out which Conditional Access policy or policies applied and why do the f
7070
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name** will show the policy configuration user interface for the selected policy for review and editing.
7171
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
7272

73-
### Policy details
73+
### Policy not working as intended
7474

7575
Selecting the ellipsis on the right side of the policy in a sign-in event brings up policy details. This option gives administrators additional information about why a policy was successfully applied or not.
7676

@@ -80,11 +80,11 @@ Selecting the ellipsis on the right side of the policy in a sign-in event brings
8080

8181
The left side provides details collected at sign-in and the right side provides details of whether those details satisfy the requirements of the applied Conditional Access policies. Conditional Access policies only apply when all conditions are satisfied or not configured.
8282

83-
If the information in the event isn't enough to understand the sign-in results, or adjust the policy to get desired results, the sign-in diagnostic tool can be used. The sign-in diagnostic can be found under **Basic info** > **Troubleshoot Event**. For more information about the sign-in diagnostic, see the article [What is the sign-in diagnostic in Azure AD](../reports-monitoring/overview-sign-in-diagnostics.md).
83+
If the information in the event isn't enough to understand the sign-in results, or adjust the policy to get desired results, the sign-in diagnostic tool can be used. The sign-in diagnostic can be found under **Basic info** > **Troubleshoot Event**. For more information about the sign-in diagnostic, see the article [What is the sign-in diagnostic in Azure AD](../reports-monitoring/overview-sign-in-diagnostics.md). You can also [use the What If tool to troubleshoot Conditional Access policies](what-if-tool.md).
8484

8585
If you need to submit a support incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information will allow Microsoft support to find the specific event you're concerned about.
8686

87-
### Conditional Access error codes
87+
### Common Conditional Access error codes
8888

8989
| Sign-in Error Code | Error String |
9090
| --- | --- |
@@ -94,11 +94,13 @@ If you need to submit a support incident, provide the request ID and time and da
9494
| 53003 | BlockedByConditionalAccess |
9595
| 53004 | ProofUpBlockedDueToRisk |
9696

97+
More information about error codes can be found in the article [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md). Error codes in the list appear with a prefix of `AADSTS` followed by the code seen in the browser, for example `AADSTS53002`.
98+
9799
## Service dependencies
98100

99101
In some specific scenarios, users are blocked because there are cloud apps with dependencies on resources that are blocked by Conditional Access policy.
100102

101-
To determine the service dependency, check the sign-ins log for the Application and Resource called by the sign-in. In the following screenshot, the application called is **Azure Portal** but the resource called is **Windows Azure Service Management API**. To target this scenario appropriately all the applications and resources should be similarly combined in Conditional Access policy.
103+
To determine the service dependency, check the sign-ins log for the application and resource called by the sign-in. In the following screenshot, the application called is **Azure Portal** but the resource called is **Windows Azure Service Management API**. To target this scenario appropriately all the applications and resources should be similarly combined in Conditional Access policy.
102104

103105
:::image type="content" source="media/troubleshoot-conditional-access/service-dependency-example-sign-in.png" alt-text="Screenshot that shows an example sign-in log showing an Application calling a Resource. This scenario is also known as a service dependency." lightbox="media/troubleshoot-conditional-access/service-dependency-example-sign-in.png":::
104106

@@ -111,5 +113,6 @@ If you're locked out of the Azure portal due to an incorrect setting in a Condit
111113

112114
## Next steps
113115

116+
- [Use the What If tool to troubleshoot Conditional Access policies](what-if-tool.md)
114117
- [Sign-in activity reports in the Azure Active Directory portal](../reports-monitoring/concept-sign-ins.md)
115118
- [Troubleshooting Conditional Access using the What If tool](troubleshoot-conditional-access-what-if.md)

articles/active-directory/conditional-access/what-if-tool.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 08/09/2022
9+
ms.date: 08/16/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo

0 commit comments

Comments
 (0)