Forum Discussion
Kiril
Nov 18, 2022Steel Contributor
Enable notifications from this app -> Something went wrong. Please try again later.
I am trying to enable notifications on the Microsoft Authenticator. When I authenticate in a browser on my PC, I receive a notification to enter a code displayed in the browser on my phone without en...
- Apr 25, 2024I was getting the same error code 500014, and not finding anything really to help. I tried something last night, and got it to work finally. I found two enterprise applications from the Azure portal that were disabled. What's strange is that neither of these applications are listed from the Entra portal under Enterprise Applications.
Anyway, here's how I got it to work. From the Azure portal https://portal.azure.com/, search for Azure Multi-Factor. I found two applications. Azure Multi-Factor Auth Client and Azure Multi-Factor Auth Connector. Both of these applications were disabled. I just enabled them, and it just started working. Hopefully this will be the solve for you.
Matthew Miles
Apr 25, 2024Copper Contributor
Kiril Did you ever get it figured out? I'm experiencing the same issue. If so, could you please describe how you solved it? Thank you
msreadr
Apr 25, 2024Copper Contributor
Matthew Miles same here. Until I enabled option 'Enable phone sign-in' MS Authenticator shows notifications, after enabling it no notifications.
'Enable notifications from this app to get notifications for passwordless phone sign-in' throws an error as described above.
The user is not locked or risky or something.
It does not matter if device is managed or not.
I think it has to do with the following log entry in AAD:
Authentication requirement: Multifactor authentication
Status: Failure
Continuous access evaluation: No
Sign-in error code: 500014
Failure reason:
The service principal for resource '{identifier}' is disabled. This indicate that a subscription within the tenant has lapsed, or that the administrator for this tenant has disabled the application, preventing tokens from being issued for it.
Additional Details: MFA completed in Azure AD