Home
%3CLINGO-SUB%20id%3D%22lingo-sub-301760%22%20slang%3D%22en-US%22%3ESupport%20Tip%20%E2%80%93%20Getting%20a%20%E2%80%9CCompany%20Portal%20Temporarily%20Unavailable%E2%80%9D%20Error%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-301760%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EBy%20Jack%20Poehlman%20%7C%20Service%20Engineer%20on%20the%20Enterprise%20Mobility%20and%20Customer%20Experience%20Engineering%20Team%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99ve%20heard%20from%20a%20few%20customers%20that%20they%20received%20a%20company%20portal%20temporarily%20unavailable%20error.%20As%20shared%20in%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FIntune-Customer-Success%2FMeeting-Apple-s-New-Requirements-for-Application-Transport%2Fba-p%2F279944%22%20target%3D%22_blank%22%3Ethis%20blog%20post%3C%2FA%3E%3C%2FSPAN%3E%2C%20and%20through%20several%20Office%20Message%20Center%20posts%2C%20Apple%20is%20moving%20to%20require%20Application%20Transport%20Security%20enablement%20for%20apps%20in%20the%20App%20store.%20ATS%20requires%20TLS%201.2%20with%20Forward%20Secrecy%20Ciphers%20therefore%20the%20iOS%20Company%20Portal%20now%20has%20ATS%20enabled.%20We%20have%20also%20been%20communicating%20across%20multiple%20Microsoft%20services%20about%20the%20move%20to%20TLS%201.2%20as%20that%20protocol%20will%20provide%20best-in-class%20encryption%2C%20ensure%20our%20service%20is%20more%20secure%20by%20default%2C%20and%20align%20with%20other%20Microsoft%20services%20such%20as%20Microsoft%20Office%20365.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20post%2C%20we%E2%80%99ll%20walk%20through%20what%20you%20might%20experience%20if%20you%E2%80%99re%20still%20using%20TLS%201.0%2C%20TLS%201.1%2C%20or%20weak%20ciphers%2C%20and%20also%20point%20to%20the%20troubleshooting%20you%20can%20do%20to%20determine%20if%20you%20are%20impacted%20by%20the%20Apple%20ATS%20change.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1%20%E2%80%93%20First%2C%20when%20you%20launch%20the%20company%20portal%20in%20every%20day%20experiences%2C%20you%E2%80%99ll%20see%20the%20following%20screen%20where%20you%E2%80%99ll%20select%20%E2%80%9CSign%20in%E2%80%9D%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20185px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F62750iA4BD5E0013EEB9FD%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%221%20-%20CP%20Launch.PNG%22%20title%3D%221%20-%20CP%20Launch.PNG%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2%20%E2%80%93%20Then%2C%20as%20shown%20in%20the%20second%20screen%20shot%20below%2C%20you%20enter%20login%20and%20password.%20In%20this%20case%2C%20I%20entered%26nbsp%3B%3CSPAN%3E%3CA%20href%3D%22mailto%3Aiwuser%40Contoso.com%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eiwuser%40Contoso.com%3C%2FA%3E%3C%2FSPAN%3E.%20If%20the%20user%20is%20on%20a%20federated%20domain%2C%20this%20screen%20will%20be%20forwarded%20to%20the%20Federation%20Server%E2%80%99s%20login%20page%20after%20selecting%20%E2%80%9CNext.%E2%80%9D%20For%20context%20and%20comparison%2C%20on%20Cloud%20managed%20domains%2C%20this%20will%20progress%20to%20%E2%80%9CEnter%20Password%E2%80%9D%20and%20the%20Microsoft%20logo%20will%20remain%20as%20the%20sign-in%20library%20(ADAL)%20is%20still%20on%20the%20Azure%20AD%20Login%20site.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20185px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F62751iF2BD27AAA6D4FC81%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%222%20-%20User%20entry.PNG%22%20title%3D%222%20-%20User%20entry.PNG%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E3%20%E2%80%93%20Now%2C%20this%20is%20where%20you%20may%20have%20seen%20a%20failure.%20After%20entering%20credentials%20and%20selecting%20%E2%80%9CNext%E2%80%9D%20as%20shown%20in%20the%20above%20screen%20shot%2C%20you%20see%20the%20%E2%80%9CCompany%20Portal%20Temporarily%20Unavailable%E2%80%9D%20and%20%E2%80%9CThe%20Company%20Portal%20app%20encountered%20a%20problem.%20If%20the%20problem%20persists%2C%20contact%20your%20system%20administrator%E2%80%9D.%20Below%20you%20can%20see%20a%20screen%20shot%20of%20that%20error.%20An%20end%20user%20could%20hit%20this%20message%20due%20to%20multiple%20reasons.%20For%20example%2C%20it%20could%20be%20due%20to%20intermittent%20network%20issues%2C%20it%20may%20have%20displayed%20because%20a%20user%20was%20not%20Intune%20licensed%2C%20or%20it%20may%20be%20because%20there%E2%80%99s%20a%20problem%20in%20the%20end-to-end%20workflow.%26nbsp%3BThe%20message%20is%20displayed%20when%20sign%20in%20failure%20is%20a%20primary%20cause.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20185px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F62752iE3E59839A56A279C%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%223%20-%20Failure.PNG%22%20title%3D%223%20-%20Failure.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20see%20if%20the%20error%20your%20end%20users%20are%20getting%20is%20related%20to%20the%20Apple%20ATS%20change%2C%20there%20are%26nbsp%3Bseveral%20free%20sites%20and%20services%20that%20will%20test%20SSL%20connections%20against%20a%20URL.%26nbsp%3BOne%20example%20of%20such%20a%20site%20is%3A%20%26nbsp%3B%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.ssllabs.com%252Fssltest%252F%26amp%3Bdata%3D04%257C01%257Ccacamp%2540microsoft.com%257Cb97282a8ef0d485caab308d660b0995f%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C636802709044338392%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C-1%26amp%3Bsdata%3DoHIXS%252FLIW%252FSFhvCrolGXknImvnPKg4tQgMSmDm%252FnHPc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.ssllabs.com%2Fssltest%2F%3C%2FA%3E%3C%2FSPAN%3E.%20We%20use%20it%20in%20this%20example%20as%20it%20provides%20a%20comprehensive%20report.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20the%20continuing%20example%20below%2C%20we%E2%80%99ve%20caused%20the%20failure%20against%20our%20ADFS%20server%20by%20disabling%20TLS%201.2%20and%201.1%20to%20mimic%20not%20having%20ATS%20TLS%201.2%20or%20higher%20for%20Apple.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20state%2C%20after%20going%20to%20the%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.ssllabs.com%2Fssltest%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Essllabs%20website%3C%2FA%3E%3C%2FSPAN%3E%2C%20our%20ADFS%20server%20scores%20a%20%E2%80%9CC%E2%80%9D%20rating.%20Looking%20at%20the%20details%2C%20you%20can%20see%20that%20Apple%20ATS%209%20was%20%E2%80%9Cnot%20simulated%E2%80%9D%20due%20to%20the%20protocol%20mismatch%20%2F%20lack%20of%20TLS%201.2%20support%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F62753iFA9D15C0F55F630B%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%224-tls.png%22%20title%3D%224-tls.png%22%20%2F%3E%3C%2FSPAN%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAt%20this%20point%20in%20time%2C%20a%20%E2%80%9CC%E2%80%9D%20rating%20is%20not%20actually%20a%20passing%20rating.%20If%20you%E2%80%99ve%20got%20a%20network%20admin%2C%20this%20is%20a%20good%20time%20to%20bring%20them%20in%20for%20resolution%2C%20but%20if%20not%2C%20there%20is%20a%20wide%20variety%20of%20documentation%20out%20there%20including%20a%20collection%20of%20whitepapers%20on%20the%20docs%20site%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fsecurity%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3C%2FSPAN%3E%2C%20including%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fsecurity%2Fsolving-tls1-problem%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ESolving%20the%20TLS%201.0%20problem%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EContinuing%20with%20this%20example%2C%20in%20looking%20at%20the%20details%20the%20Cipher%20Suites%2C%20you%20can%20dive%20into%20whether%20any%20traffic%20can%20get%20through%20using%20TLS%201.2.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20looking%20at%20the%20details%2C%20the%20ADFS%20service%20with%20the%20network%20inspection%20device%20enabled%2C%20did%20not%20have%20support%20any%20of%20these%20TLS%201.2%20packets.%26nbsp%3B%20In%20a%20network%20packet%20capture%2C%20looking%20at%20the%20SSL%20communications%2C%20we%20could%20see%20the%20following%20error%20when%20trying%20to%20send%20a%20Client%20Hello%20offering%20the%20cipher%20list%20above.%26nbsp%3B%20The%20federation%20service%20URL%E2%80%99s%20response%20was%20not%20the%20expected%20Server%20hello%2C%20instead%20it%20was%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETLSv1.2%20Record%20Layer%3A%20Alert%20(Level%3A%20Fatal%2C%20Description%3A%20Handshake%20Failure)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Content%20Type%3A%20Alert%20(21)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Version%3A%20TLS%201.2%20(0x0303)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Length%3A%202%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Alert%20Message%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Level%3A%20Fatal%20(2)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Description%3A%20Handshake%20Failure%20(40)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMoving%20our%20ADFS%20server%20back%20to%20enable%20TLS%201.2%20then%20resolved%20the%20problem.%20Hopefully%20this%20helps%20to%20troubleshoot%20this%20error%20specific%20to%20iOS%20enrollment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-301760%22%20slang%3D%22en-US%22%3E%3CP%3EIf%20you%20started%20getting%20the%20error%20%22Company%20Portal%20Temporarily%20Unavailable%22%20on%20iOS%20it%20could%20be%20due%20to%20the%20move%20to%20require%20ATS.%20Read%20this%20post%20for%20how%20to%20troubleshoot%20this%20error.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-301760%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EIntune%20Customer%20Success%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EiOS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESupport%20Tip%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

By Jack Poehlman | Service Engineer on the Enterprise Mobility and Customer Experience Engineering Team

 

We’ve heard from a few customers that they received a company portal temporarily unavailable error. As shared in this blog post, and through several Office Message Center posts, Apple is moving to require Application Transport Security enablement for apps in the App store. ATS requires TLS 1.2 with Forward Secrecy Ciphers therefore the iOS Company Portal now has ATS enabled. We have also been communicating across multiple Microsoft services about the move to TLS 1.2 as that protocol will provide best-in-class encryption, ensure our service is more secure by default, and align with other Microsoft services such as Microsoft Office 365.

 

In this post, we’ll walk through what you might experience if you’re still using TLS 1.0, TLS 1.1, or weak ciphers, and also point to the troubleshooting you can do to determine if you are impacted by the Apple ATS change.

 

1 – First, when you launch the company portal in every day experiences, you’ll see the following screen where you’ll select “Sign in”:

1 - CP Launch.PNG 

 

2 – Then, as shown in the second screen shot below, you enter login and password. In this case, I entered iwuser@Contoso.com. If the user is on a federated domain, this screen will be forwarded to the Federation Server’s login page after selecting “Next.” For context and comparison, on Cloud managed domains, this will progress to “Enter Password” and the Microsoft logo will remain as the sign-in library (ADAL) is still on the Azure AD Login site.

2 - User entry.PNG 

 

3 – Now, this is where you may have seen a failure. After entering credentials and selecting “Next” as shown in the above screen shot, you see the “Company Portal Temporarily Unavailable” and “The Company Portal app encountered a problem. If the problem persists, contact your system administrator”. Below you can see a screen shot of that error. An end user could hit this message due to multiple reasons. For example, it could be due to intermittent network issues, it may have displayed because a user was not Intune licensed, or it may be because there’s a problem in the end-to-end workflow. The message is displayed when sign in failure is a primary cause.

 3 - Failure.PNG

 

To see if the error your end users are getting is related to the Apple ATS change, there are several free sites and services that will test SSL connections against a URL. One example of such a site is:  https://www.ssllabs.com/ssltest/. We use it in this example as it provides a comprehensive report.

 

In the continuing example below, we’ve caused the failure against our ADFS server by disabling TLS 1.2 and 1.1 to mimic not having ATS TLS 1.2 or higher for Apple. 

 

In this state, after going to the ssllabs website, our ADFS server scores a “C” rating. Looking at the details, you can see that Apple ATS 9 was “not simulated” due to the protocol mismatch / lack of TLS 1.2 support:

4-tls.png 

 

At this point in time, a “C” rating is not actually a passing rating. If you’ve got a network admin, this is a good time to bring them in for resolution, but if not, there is a wide variety of documentation out there including a collection of whitepapers on the docs site here, including Solving the TLS 1.0 problem.

 

Continuing with this example, in looking at the details the Cipher Suites, you can dive into whether any traffic can get through using TLS 1.2.

 

In looking at the details, the ADFS service with the network inspection device enabled, did not have support any of these TLS 1.2 packets.  In a network packet capture, looking at the SSL communications, we could see the following error when trying to send a Client Hello offering the cipher list above.  The federation service URL’s response was not the expected Server hello, instead it was:

 

TLSv1.2 Record Layer: Alert (Level: Fatal, Description: Handshake Failure)

    Content Type: Alert (21)

    Version: TLS 1.2 (0x0303)

    Length: 2

    Alert Message

        Level: Fatal (2)

        Description: Handshake Failure (40)

 

Moving our ADFS server back to enable TLS 1.2 then resolved the problem. Hopefully this helps to troubleshoot this error specific to iOS enrollment.