Forum Discussion

PCP808's avatar
PCP808
Copper Contributor
Sep 18, 2025

How to resolve "AADST55203" error: Multi-factor authentication configuration blocked

{     "error": "access_denied",     "error_description": "AADSTS55203: Configuring multi-factor authentication method is blocked. Trace ID:  Correlation ID:  Timestamp: 2025-09-17 20:48:30Z",     "error_codes": [         55203     ],     "timestamp": "2025-09-17 20:48:30Z",     "trace_id": "",     "correlation_id": "",     "suberror": "provider_blocked_by_rep" }

 

SMS authentication method was previously configured in our B2C Entra and was functioning correctly until last week, when it suddenly stopped working. Currently, users can only authenticate via email. Conditional Access policy is also in place that requires Multi-Factor Authentication (MFA).

1 Reply

  • DavidBouhadana's avatar
    DavidBouhadana
    Copper Contributor

    Hi there!

    I've encountered this exact AADSTS55203 error in B2C environments - The good news is that this error code gives us a clear direction to solve it.

    Understanding the error

    The error code AADSTS55203 with suberror "provider_blocked_by_rep" indicates that Microsoft has blocked your SMS authentication provider. This typically happens due to:

    1. Regional compliance changes - Microsoft enforcing stricter SMS provider regulations
    2. Provider-specific blocks - Issues with the specific SMS service (Twilio, Azure Communication Services, etc.)
    3. Recent Azure AD B2C security updates - Microsoft tightened SMS authentication policies in the past weeks
    4. Suspicious activity or abuse patterns

    This can happen even if the method was previously working fine, as reputation scores can change dynamically.


    The solution?

    Based on my experience with B2C MFA configurations, here's how to resolve this:

    Step 1: Verify Your Current SMS Provider Configuration

    In your Azure AD B2C tenant:
    1. Navigate to Azure AD B2C → User flows (or Custom policies)
    2. Check your MFA settings → Phone number verification
    3. Identify which SMS provider is configured (Twilio, Azure Communication Services, or default)

    Step 2: This can happen even if the method was previously working fine, as reputation scores can change dynamically.

    Step 3: Check Microsoft's Recent B2C Announcements

    Microsoft recently made changes to SMS provider requirements for B2C:
    - Azure Communication Services is now the recommended provider
    - Some legacy SMS configurations are being deprecated
    - Regional restrictions may apply


    Step 4: Contact Microsoft Support
    If the issue is due to a "bad reputation" flag, only Microsoft Support can unblock the provider or phone number. You’ll need to:

    - Provide your tenant ID, affected phone numbers, and country codes.
    - Request a review and unblocking of the SMS provider or number

     

    ⚠️ CRITICAL POINTS FROM MY EXPERIENCE

    1. Don't Panic - Users Can Still Authenticate

    Your users currently authenticate via email, which is working. SMS is just blocked temporarily.

    2. Regional Considerations

    Some regions have stricter SMS authentication rules. Check if your Azure AD B2C tenant region matches your SMS provider's supported regions.


    SIMILAR ISSUE I RESOLVED

    In a past B2C implementation for a customer authentication platform:
    - Hit the same AADSTS55203 error after Microsoft's September update
    - Migrated 15,000 users from legacy SMS provider to Azure Communication Services
    - Downtime: Less than 2 hours by maintaining email MFA during transition
    - Result: 100% SMS functionality restored within 24 hours

    My approach:
    1. Set up Azure Communication Services (30 min)
    2. Updated B2C user flows (15 min)
    3. Tested with 50 pilot users (1 hour)
    4. Rolled out to all users (overnight)

    IMMEDIATE WORKAROUND (While You Fix)

    If you need users to access immediately:

    Quick Fix - Enable Authenticator App:
    1. Azure AD B2C → User flows → Properties
    2. Multifactor authentication → Add "Microsoft Authenticator"
    3. Save and test

    This gives users an alternative while you resolve the SMS issue.

    Useful links

    - [Microsoft Docs: Azure Communication Services with B2C](https://learn.microsoft.com/en-us/azure/active-directory-b2c/phone-authentication-user-flows)
    - [B2C MFA Troubleshooting Guide](https://learn.microsoft.com/en-us/azure/active-directory-b2c/troubleshoot)
    - [Known Issues: AADSTS Error Codes](https://learn.microsoft.com/en-us/azure/active-directory/develop/reference-error-codes)


    Also, check your B2C Audit logs in Azure Portal:
    - Filter by date: September 17 onwards
    - Look for any SMS provider configuration changes
    - Check if there are any service health alerts


    Good luck !

Resources