Jan 10 2023 01:42 PM
We are using Azure AD Connect with Pass-Through Authentication enabled. We're having an issue where users are getting an error saying "The sign-in method you're trying to use isn't allowed" if they attempt to sign in to an Azure AD-joined device with an expired password.
This is listed as an "Unsupported scenario" at Azure AD Connect: Pass-through Authentication - Current limitations - Microsoft Entra | Microsoft Le..., but the article also says that enabling password hash synchronization is a workaround for all unsupported scenarios (except integration with AAD Connect Health), and I can confirm we do have PHS enabled.
Is this an error in the document, or should this be working? If it is an error in the document, is there another workaround for this issue?
Jan 15 2023 03:41 AM
Jan 16 2023 11:35 AM
Hi @PeterRising, and thanks for your response. The primary use case here is for newly created user accounts. When a new account is created, we set a temporary password and provide it to the user for them to use to sign in for the first time, but we want to ensure that the user does not continue to use that password.
I suppose we could either a.) not provide the end user with the temporary password and force them to use SSPR at first sign-in, or b.) leave the "User must change password" flag unset, provide the temporary password to the user, and enforce the password change through some other mechanism.
I'm interested to hear how other organizations are handling this.
Jan 17 2023 02:40 AM - edited Jan 17 2023 02:41 AM
Hi Ryan,
We are in the exact same scenario here. Both with Newly created and expired passwords.
Our current on prem devices obviously prompt up to update the password, we obviously assumed this would work in the same way. We started rolling out some devices on Azure AD only before moving everything.
We are currently implementing the Password Hash Sync to see whether this helps. Happy to feed back on how it went! It would be interesting to hear if you managed to get around this?
Jan 17 2023 02:45 AM
Jan 17 2023 12:29 PM
Hi @Dipl0,
Thanks for the pointer regarding the -ForcePasswordChangeAtLogOn setting; I did not have it enabled. However, after enabling it, setting the "User must change password" flag on a user, and initiating an AD Connect sync, I'm still seeing the same error.
I suspect that when @Jason Fritts added this known limitation to the article, he simply failed to update the paragraph following, and that PHS is not in fact a workaround for this issue.
I do have a case open with Microsoft Support, so we'll see what comes of that.
Jan 18 2023 12:42 AM
Jan 20 2023 01:42 PM
SolutionIn the absence of any feedback from Microsoft (either here or from the support technician I've been working with), I think it is safe to assume that the documentation is incorrect and there is no "direct" workaround for the issue.
However, this blog post by @BilalelHadd is an excellent summary of the Temporary Access Pass feature, which may be a suitable workaround depending on your requirements.
Jan 23 2023 01:31 AM
Jan 23 2023 01:25 PM
Jan 23 2023 02:27 PM
@Jeff Johnson Yes, I did see that note, and the password is being changed at the same time the flag is being set. Thanks for checking.
Feb 19 2023 05:29 AM