Forum Discussion
Service Trust Portal no longer support Microsoft Account (MSA) access
Dear all,
We need to access certain documents (i.e., SOC 2 or ISO 27xxx) on the https://servicetrust.microsoft.com/DocumentPage/d013b518-c1fe-462c-8124-de901f3b68dc.
To download documents you need to be signed in first.
However, when I click on "sign in" (using the same email/account as for our azure account) I get the error message "Service Trust Portal no longer support Microsoft Account (MSA) access." (see screenshot below).
It seems that I am not the only one since other users had similar issues but they also could not find a solution (or at least it was not mentioned in their post):
I have been trying this now since more than a week and also created a support ticket (which has not been assigned to a support agent yet). It is quite cumbersome and I hope some of you could have an idea since getting these documents is quite crucial for us.
7 Replies
- crdzobaCopper Contributor
Inconceivable that this is still a problem. Unfortunately md504's steps did not solve the problem for me. We need access to these documents!
- md504Copper Contributor
I can't believe there's still no direction on this issue
1 - Login to Azure
2 - Navigate to Microsoft Entra ID > Enterprise Applications
3 - Change ---> Application Type filter to ---> MICROSOFT APPLICATIONS ---> click APPLY
4 - Search for "Microsoft Service Trust"
5 - Click it
6 - Go to Manage --> Properties
7 - Click YES for "Enabled for users to sign-in"
8 - Click SAVE
9 - Try again to sign in and access the files- CleGuy216Copper Contributor
You must be some type of wizard because this answer was no where else on the internet.
- iftikharkhanCopper ContributorLooks like your service principal for service trust is disabled by your resource tenant.
run the PS command to enable it: https://learn.microsoft.com/en-us/powershell/module/azuread/set-azureadserviceprincipal?view=azureadps-2.0#example-1-disable-the-account-of-a-service-principal
Get-AzureADServicePrincipal
Find the service trust object ID and enable it
Set-AzureADServicePrincipal -ObjectId <objectID>-AccountEnabled $true
if you check the sign in logs, you will see failure and reason would be the app is disabled.
https://learn.microsoft.com/en-us/troubleshoot/azure/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled - PeterForsterIron Contributor
- Saad042Copper ContributorI am facing the same issue, even though I am already signed into my azure account