Forum Discussion
Surface Hub 2 - Problem with Microsoft Teams
This issue is now confirmed as resolved. Your issue might be related to something else like conditional access, account configuration, network and so on. I suggest opening a case if you are still having issues
Thank you
Cezar
It looks like the Teams for SurfaceHub app does not support modern authentication. Mine has stopped working again. I had originally excluded the account from MFA whilst setting up my Surface Hub but now that I've enabled MFA on the account it is not working again. Seems to work again once I exclude the account and restart the surface hub.
We are contractually obliged by Microsoft to have all of our tenant accounts protected by MFA so we are completely stuck now. We can use the browser based version of Teams as a workaround but this not a great experience for the users to have to do this.
These two threads explain the situation so it seems Microsoft is aware of this but still has no solution.
https://www.microsoftpartnercommunity.com/t5/Multi-Factor-Authentication-MFA/The-new-MFA-for-Partners-requirements-what-will-that-do-to-our/td-p/11161/page/2
https://www.microsoftpartnercommunity.com/t5/Multi-Factor-Authentication-MFA/Microsoft-Surface-Hub-and-MFA-Security-Defaults/td-p/14714
- cezarcretuDec 06, 2021
Microsoft
Hello Guzm0Apex,
This isn't an issue with the app itself but a sign-in issue which could be caused by different reasons. Make sure the device is fully updated and if you still have this issue, check the sign-in logs in Azure AD for any Conditional Access policies blocking the sign-in.
If you still have issues, please open a support case
Thank you,
Cezar
- Guzm0ApexDec 06, 2021Copper Contributor
Hey Cezar
I’m just checking in its been over a year since I see people have started to have this issue were teams don’t load.
any updates or fixes I haven’t found any myself we are still able to use teams on the web but once we start teams from the app it says “something went wrong” and closes and try’s to re-open but fails every time after that ive even factory reset it and still comes up with the same issue.
It has all the windows updates .
thank you .
- Steve HernouDec 12, 2020Iron ContributorHi Tim, when I face something similar I check the AzureAD sign in log details for that account. It will tell you which conditional access policy you're hitting and you can go from there.
Cheers - timpailthorpeDec 12, 2020Copper Contributor
Hi cezarcretu ,
I have a related but different issue.
I am trialling a new Hub 2S. I have created a resource account. It works, but I am prompted for MFA for the resource account for every login. This is despite the policy excluding the IP address and the account itself.
Any ideas?
Tim.
- Steve HernouNov 09, 2020Iron Contributor
alankinane485 , I think it's also fixed in the latest big update of Windows 10 Team Edition (the native version running on Hubs) that was scheduled to be released in October but not 100% sure it's rolled out everywhere yet.
With us being back in lockdown I have not been in the office for over a month 🙂
- alankinane485Nov 09, 2020Copper Contributor
NaraeB As far as I know the issue is still there. However, you can now install Windows 10 Enterprise on the Surface 2s which is what I have done and this OS has no issue.
https://docs.microsoft.com/en-us/surface-hub/surface-hub-2s-migrate-os
- NaraeBNov 08, 2020Copper ContributorIs this issue still on-going?
- Steve HernouMar 04, 2020Iron Contributor
cezarcretu are there any updates on this topic?
We setup a CA policy last year to block basic auth for EXO/SPO for the 'Other clients' category (so older Office clients, POP, SMTP, IMAP,etc..) and even though the Surface Hub device accounts are subject to this CA, they are all still working.
On the other hand, when I look in the sign-in logs I see lots of failures from those accounts to Office 365 Exchange Online using 'other clients' but also a lot of successful logins using Exchange ActiveSync (user agent BAV2ROPC).
What is the current Microsoft recommendation for Surface Hub and MTR devices? Exclude them from all CA policies which block anything that does basic auth?
- cezarcretuJan 28, 2020
Microsoft
Tristan Griffiths , you are absolutely right and we are aware of the pain this causes. Currently the Surface Hub OS is not able to handle modern authentication but we are working hard on this. There is currently no ETA but this will be fixed soon.
Thank you,
Cezar
- Tristan GriffithsJan 27, 2020Brass Contributor
cezarcretu We see now the partner requirements changed somewhat. Don't know when. The way I read it now is MFA for all cloud services, from any device, at any location, no exceptions. So we're now stuck with Surface Hubs and Microsoft Teams Room systems. App passwords work for SfBO and EXO on an MTR, but not Teams.
I'm not the only one seeing the irony of Microsoft forcing partners to use modern authentication and recommending app vendors switch to the graph, while simultaneously not following their own recommendations?
Hell, even ConnectWise Manage has been updated to the graph and modern authentication (did ours over the long weekend). - cezarcretuJan 20, 2020
Microsoft
Hello alankinane485
As I said, excluding the account based on location would still be an exclusion. Unfortunately at this point I don't have a solution for you. However, this limitation is known and under review by the Surface Hub team. Hopefully we will have a solution sortly
Thank you,
Cezar
- Tristan GriffithsJan 19, 2020Brass Contributor
alankinane485 does achieve the same thing as CA trusted site bypass but with the ability to use app passwords. Haven't seen (or haven't read clearly enough... more likely) that trusted sites cannot be bypassed for regular users under the partner rule change? Got a link?
We shouldn't have to wait too much longer for Microsoft to pull their finger out and release modern auth for Surface Hubs and MTRs.
- alankinane485Jan 16, 2020Copper Contributor
Tristan Griffiths Thanks for that. This will work I'm sure but I don't see how this gets around the MFA requirement. Can you explain your thoughts on this?
My understanding is that we are not allowed to exclude or bypass any accounts from MFA without exception - although perhaps Microsoft will clarify this in future. This method just uses the O365 MFA trusted IP address to bypass this CA excluded account. Is this any different to just using conditional access to bypass based on location for this user? It just seems like a different method for achieving the same thing to me.
cezarcretu We still have a conditional access policy that will be enforced for any users who are not excluded so only this account is affected. The issue remains the Microsoft contractual obligation for MFA enforcement for all users.
- cezarcretuJan 16, 2020
Microsoft
Hello Tristan Griffiths,
The problem with this method is that it will apply to all devices behind that public IP
Thanks
Cezar
- Tristan GriffithsJan 15, 2020Brass Contributor
alankinane485 Exclude device account from Conditional Access policies. Add corporate IP address to "old" MFA trust list. Set device account MFA to Enabled. Enrol device account to MFA on sign in from another PC so that the account changes to "Enforced".
Unless we're totally thinking about this the wrong way, we believe this fulfils the "MFA for all" even if MFA is bypassed for your corporate IP. Could also use an app password with "old" MFA but we haven't found this to be required.
- cezarcretuJan 15, 2020
Microsoft
Hello alankinane485,
It's true, MFA is not supported on the Surface Hub as it will require a human to approve the authentication. Unfortunately I don;t have a solution for you at this point if you are required to have MFA enabled to all accounts. However, this is already under our radar and PG is looking for a solution. No ETA at this point
Thank you,
Cezar