Forum Discussion
stuffie
Mar 12, 2024Copper Contributor
Security Info blocked by conditional access
Hello,
We have a conditional access policy in place where a specific group can only access Microsoft 365 (deny all apps, except Office 365). The moment a user clicks on Security Info in My Account, the user is blocked by this policy. I cant find a way to exclude the app "My Signins" (AppId 19db86c3-b2b9-44cc-b339-36da233a3be2).
Since MFA is forced for this group, they can't change their authenticator app registration. Is there a solution for this?
Initial MFA setup works by the way.
UPDATE jan 23, 2025: I contacted Microsoft support and this was their answer (in short):
"
MySignin is a very sensitive resource that is not available in the picker and cannot be excluded in the conditional access policy. Also, the application is calling Microsoft Graph.
I understand that this is not the information you are looking to hear at this time, I would have loved to help but the application cannot be excluded from the policy.
"
- dhobbsCopper Contributor
Yes, this has been a problem. Thanks for the update.
- FFCopper Contributor
+2 Exactly the same issue ! Please MS, do something !
- gbs916Copper Contributor+1 Exactly the same issue ! Please MS, do something !
- coolioCopper ContributorWe are facing the same issue, "My Signins" (AppId 19db86c3-b2b9-44cc-b339-36da233a3be2) not addressable in Conditional Access. Extremly annoying, as this is blocking some internal IAM processes. MS please do something about it and make the Cloud App visible and addressable!
- JosvanderVaartIron ContributorIf this is a conditional access policy that stops this, you can very well see this reflected in the sign-in logs. Can you look at this and share the information with us?
- stuffieCopper Contributor
JosvanderVaart Sure:
- JosvanderVaartIron Contributor
stuffie If you look at the Conditonal Access tab, you can see exactly which CA policy is causing this behavior, can you take a screenshot of this?
- allesglarCopper Contributor
Hello JosvanderVaart,
we have a ca-policy in place in which all cloud apps are in scope. If the user accesses from a non-compliant device the policy blocks the access.
A few cloud apps must be able to be accessed from non-compliant devices and they get excluded from the policy. Those cloud apps also require MFA to access them.
Until this point all good. The problem is that a user accessing from an unmanaged device (he does not have a managed device) he cannot access the security-information page to activate MFA because the policy gets triggered and he gets blocked.
In the logs the policy gets triggered for a "ghost"-app called "My Sign-in". This app cannot be found and cannot be excluded from the policy.
We have an open case with MS-Support on that and they confirmed this is a known issue and that currently there is no solution. On top many organizations seem to struggle with that, there is an open design request but no confirmed plans for a change.
Really annoying and has cost us lots of time troubleshooting it already.
- stuffieCopper ContributorNope, problem still exists.
- Danm05Copper ContributorHey, did you ever find a way around this? Experiencing the same issue on our side too
- stuffieCopper ContributorNope, problem still exists. Users cannot access Security Info.
Error:
"You don't have access to this
Your sign-in was successful but you don't have permission to access this resource."
- chris_u667gfCopper Contributor
stuffie I am getting this exact same issue as of a few days ago. Worked fine for a year before this, guessing MS have broken something.