Control 1.11: Conditional Access and Phishing-Resistant MFA - Troubleshooting
This playbook provides troubleshooting guidance for Control 1.11.
Common Issues
Issue: Users Blocked by CA Policy Unexpectedly
Symptoms: Legitimate users cannot access Power Platform or Copilot Studio
Solutions:
- Open failed sign-in > Conditional Access tab > capture failure reason
- Use What if with same user/app/device/location to reproduce
- Validate group targeting and exclusions
- Confirm client app type and device state match policy
- Verify Named Locations and IP range updates
Issue: Break-Glass Account Blocked or Challenged
Symptoms: Emergency access account cannot sign in during incident
Solutions:
- Confirm account is excluded from all CA policies
- Check Sign-in logs for CA details
- Validate account not subject to auth method restrictions
- Ensure account not blocked by other controls
- After incident: rotate credentials and document root cause
- Run What if to confirm exclusions still apply
Issue: Phishing-Resistant MFA Not Working
Symptoms: Users cannot complete phishing-resistant MFA with FIDO2 keys
Solutions:
- Verify FIDO2 method is enabled in Authentication methods
- Check user has registered a FIDO2 key
- Confirm browser supports WebAuthn
- Verify authentication strength policy includes FIDO2
- Test with different FIDO2 key to rule out hardware
- Review sign-in log Authentication Details
Issue: Authentication Strength Not Enforced
Symptoms: Users authenticate with weaker methods than intended
Solutions:
- Validate CA policy grant control is set to correct Authentication Strength
- Ensure user is in-scope (group, app, exclusions)
- Review sign-in Applied Conditional Access Policies
- Check user's registered methods vs strength policy
- Move from Report-only to On in staged rollout
- Verify Authentication Strength Id matches intended policy
Issue: Agent ID Not Showing Agents
Symptoms: Agent ID dashboard shows zero agents despite active agents
Solutions:
- Verify tenant is enrolled in Agent ID preview
- Check agents are using service principals
- Confirm agents have made recent auth attempts
- Wait for data synchronization (24-48 hours)
- Verify permissions to view Agent ID
Issue: Report-Only Policy Not Logging
Symptoms: CA policy in report-only mode not showing in logs
Solutions:
- Verify policy is in "enabledForReportingButNotEnforced" state
- Check users are within policy scope
- Review Sign-in logs > Applied Conditional Access Policies
- Confirm policy conditions are being met
- Wait for log ingestion (up to 2 hours)
Issue: CA Policy Not Applying to Agent Creators
Symptoms: Users can create agents without meeting CA requirements
Solutions:
- Verify policy targets correct applications (Power Platform apps)
- Check if user is in exclusion group
- Confirm policy state is Enabled (not report-only)
- Review if trusted location is bypassing policy
- Check for conflicting policies
- Validate sign-in event shows target app matches policy
Issue: Named Location Not Recognized
Symptoms: Users at corporate office still challenged as untrusted
Solutions:
- Verify IP ranges are correctly configured
- Check for IPv6 addresses if IPv6 enabled
- Confirm location is marked as trusted
- Review if user is behind proxy/VPN
- Test from known IP address
Escalation Path
If issues persist:
- First tier: Identity Administrator - CA and MFA configuration
- Second tier: Entra Security Admin - authentication policies
- Third tier: Entra Administrator - platform-level issues
- Fourth tier: Microsoft Support - service issues
Updated: January 2026 | Version: v1.2