Mar 12 2024 05:14 AM
Hello,
We have a conditional access policy in place where a specific group can only access Microsoft 365 (deny all apps, except Office 365). The moment a user clicks on Security Info in My Account, the user is blocked by this policy. I cant find a way to exclude the app "My Signins" (AppId 19db86c3-b2b9-44cc-b339-36da233a3be2).
Since MFA is forced for this group, they can't change their authenticator app registration. Is there a solution for this?
Initial MFA setup works by the way.
Mar 13 2024 08:38 AM
@stuffie I am getting this exact same issue as of a few days ago. Worked fine for a year before this, guessing MS have broken something.
Mar 26 2024 06:55 AM
Mar 26 2024 07:58 AM
Apr 30 2024 10:01 AM
@stuffie we encounter the exact same issue and we cannot exclude the app from the policy. Have you found a solution?
Jun 11 2024 07:06 AM
Jun 11 2024 03:15 PM
SolutionHello @JosvanderVaart,
we have a ca-policy in place in which all cloud apps are in scope. If the user accesses from a non-compliant device the policy blocks the access.
A few cloud apps must be able to be accessed from non-compliant devices and they get excluded from the policy. Those cloud apps also require MFA to access them.
Until this point all good. The problem is that a user accessing from an unmanaged device (he does not have a managed device) he cannot access the security-information page to activate MFA because the policy gets triggered and he gets blocked.
In the logs the policy gets triggered for a "ghost"-app called "My Sign-in". This app cannot be found and cannot be excluded from the policy.
We have an open case with MS-Support on that and they confirmed this is a known issue and that currently there is no solution. On top many organizations seem to struggle with that, there is an open design request but no confirmed plans for a change.
Really annoying and has cost us lots of time troubleshooting it already.
Jun 12 2024 12:44 AM
@stuffie If you look at the Conditonal Access tab, you can see exactly which CA policy is causing this behavior, can you take a screenshot of this?
Jun 12 2024 01:46 AM
Jul 10 2024 06:56 AM
Aug 27 2024 04:06 AM
Jun 11 2024 03:15 PM
SolutionHello @JosvanderVaart,
we have a ca-policy in place in which all cloud apps are in scope. If the user accesses from a non-compliant device the policy blocks the access.
A few cloud apps must be able to be accessed from non-compliant devices and they get excluded from the policy. Those cloud apps also require MFA to access them.
Until this point all good. The problem is that a user accessing from an unmanaged device (he does not have a managed device) he cannot access the security-information page to activate MFA because the policy gets triggered and he gets blocked.
In the logs the policy gets triggered for a "ghost"-app called "My Sign-in". This app cannot be found and cannot be excluded from the policy.
We have an open case with MS-Support on that and they confirmed this is a known issue and that currently there is no solution. On top many organizations seem to struggle with that, there is an open design request but no confirmed plans for a change.
Really annoying and has cost us lots of time troubleshooting it already.