Forum Discussion

konstantinrink's avatar
konstantinrink
Copper Contributor
Mar 11, 2024

Service Trust Portal no longer support Microsoft Account (MSA) access

Dear all,

 

We need to access certain documents (i.e., SOC 2 or ISO 27xxx) on the https://servicetrust.microsoft.com/DocumentPage/d013b518-c1fe-462c-8124-de901f3b68dc.

To download documents you need to be signed in first.

 

However, when I click on "sign in" (using the same email/account as for our azure account) I get the error message "Service Trust Portal no longer support Microsoft Account (MSA) access." (see screenshot below).

 

It seems that I am not the only one since other users had similar issues but they also could not find a solution (or at least it was not mentioned in their post):

I have been trying this now since more than a week and also created a support ticket (which has not been assigned to a support agent yet). It is quite cumbersome and I hope some of you could have an idea since getting these documents is quite crucial for us

 

 

 

 

7 Replies

  • crdzoba's avatar
    crdzoba
    Copper Contributor

    Inconceivable that this is still a problem. Unfortunately md504's steps did not solve the problem for me. We need access to these documents!

  • md504's avatar
    md504
    Copper Contributor

    I can't believe there's still no direction on this issue

    1 - Login to Azure
    2 - Navigate to Microsoft Entra ID > Enterprise Applications
    3 - Change ---> Application Type filter to ---> MICROSOFT APPLICATIONS ---> click APPLY
    4 - Search for "Microsoft Service Trust"
    5 - Click it
    6 - Go to Manage --> Properties
    7 - Click YES for "Enabled for users to sign-in"
    8 - Click SAVE
    9 - Try again to sign in and access the files

    • CleGuy216's avatar
      CleGuy216
      Copper Contributor

      You must be some type of wizard because this answer was no where else on the internet.

  • iftikharkhan's avatar
    iftikharkhan
    Copper Contributor
    Looks like your service principal for service trust is disabled by your resource tenant.



    run the PS command to enable it: https://learn.microsoft.com/en-us/powershell/module/azuread/set-azureadserviceprincipal?view=azureadps-2.0#example-1-disable-the-account-of-a-service-principal



    Get-AzureADServicePrincipal



    Find the service trust object ID and enable it



    Set-AzureADServicePrincipal -ObjectId <objectID>-AccountEnabled $true



    if you check the sign in logs, you will see failure and reason would be the app is disabled. 



    https://learn.microsoft.com/en-us/troubleshoot/azure/entra/entra-id/app-integration/error-code-aadsts7000112-application-is-disabled
  • Saad042's avatar
    Saad042
    Copper Contributor
    I am facing the same issue, even though I am already signed into my azure account

Resources