Troubleshooting: Control 1.23 — Step-Up Authentication for AI Agent Operations
Last Updated: April 2026
This playbook indexes the most common failures observed when deploying step-up authentication for AI agent operations and maps each to the diagnostic surface and resolution. Use it during pilot, after promoting policies from report-only to enforcement, and during incident response.
Quick-Reference Issue Index
| # | Symptom | Likely cause | Section |
|---|---|---|---|
| 1 | Sensitive action proceeds with no step-up prompt | Action not requesting the authentication context | §1 |
| 2 | User cannot complete step-up | No phishing-resistant method enrolled | §2 |
| 3 | Excessive step-up prompts during normal work | Sign-in frequency too short for action profile | §3 |
| 4 | Service principal performs sensitive op with no step-up | SP not subject to interactive auth; no compensating control | §4 |
| 5 | Conditional Access policy locks out tenant after promotion | Break-glass exclusion missing or misconfigured | §5 |
| 6 | Step-up succeeds but downstream service still rejects action | Authentication context mapping incomplete on the resource | §6 |
| 7 | PIM activation does not satisfy step-up | PIM role setting does not require the right context | §7 |
| 8 | Sign-in risk policy never fires | Identity Protection licensing or risk evaluation not active | §8 |
| 9 | Custom Authentication Strength rejected unexpectedly | Method enrolled but not allowed by tenant authentication methods policy | §9 |
1. Sensitive action proceeds without step-up
Diagnostics:
- Entra → Monitoring → Sign-in logs for the user — open the relevant entry, Authentication Details tab. Check whether
Authentication contextis populated. - Conditional Access → Policies →
FSI-StepUp-c<N>-*→ Policy details — confirm State = On, not Report-only. - Conditional Access → What If — replay the user, app, and authentication context.
Resolution:
- Confirm the downstream service (Copilot Studio flow, custom connector, SharePoint site) is wired to request the context — see Portal Walkthrough Step 6.
- Confirm the policy is not in report-only mode.
- Confirm the user is not in any exclusion group other than the documented break-glass group.
- Confirm no other CA policy with a less restrictive grant (
Require MFAonly) is shadowing the step-up policy; CA evaluates all matching policies and the most restrictive grant wins, but aBlockin another policy can short-circuit evaluation.
2. User cannot complete step-up
Diagnostics:
- Sign-in log entry with
ResultType = 53003(Conditional Access blocked) and the Authentication Strength tab listing the unsatisfied methods. - Entra → Users → [user] → Authentication methods — confirm enrolled methods.
Resolution:
- Help the user enroll an allowed phishing-resistant method (FIDO2 security key, Windows Hello for Business, passkey in Microsoft Authenticator, certificate-based authentication). See Microsoft Learn: passwordless options.
- Confirm the tenant authentication methods policy permits the chosen method.
- If the user is on an unmanaged personal device for a Zone 3 action, the device requirement (
Compliant or hybrid-joined) will block them — direct them to a compliant device.
3. Excessive step-up prompts
Diagnostics:
- Count step-up prompts per user per day from sign-in logs.
- Review which contexts are being invoked most often and whether the action is correctly classified.
Resolution:
- Re-classify low-risk actions out of
c1/c2if they are firing during routine work. - Increase Sign-in frequency for
c5(Sensitive Query) up to 4 hours when business justifies it; do not relaxc1. - Confirm token caching at the client is not bypassed (e.g., InPrivate browsing forces re-authentication every session).
4. Service principal bypass
Symptoms: A service principal performs a sensitive operation (c1–c4) without any step-up evidence.
Why it happens: Service principals authenticate non-interactively. Conditional Access for users never applies to them.
Resolution:
- Identify the SP and the operation.
- Apply a Conditional Access for workload identities policy targeting the SP and requiring a managed location and / or a token-protection certificate. See Microsoft Learn: workload identity CA.
- For SP operations that touch the agent governance scope, route the operation through an approval workflow per Control 1.4.
- Replace long-lived client secrets with federated credentials or managed identities wherever possible.
5. Tenant lockout after promotion
Symptoms: After flipping a step-up policy from Report-only to On, large numbers of users (or all users) cannot complete sensitive actions.
Resolution:
- Use a break-glass account to sign in. Do not attempt remediation with a regular admin account that may itself be locked.
- Set the offending
FSI-StepUp-*policy back to Report-only while you investigate. - Open Sign-in logs → Conditional Access → Report-only results for the prior 72 hours and confirm whether failures were present that should have blocked promotion.
- Confirm the break-glass exclusion group is still attached to the policy and contains the break-glass accounts.
- Re-bake for at least 72 hours before re-attempting promotion.
6. Downstream service still rejects
Symptoms: User completes step-up, sign-in log shows context satisfied, but the action still fails at the service.
Diagnostics:
- Inspect the downstream service's audit log (SharePoint, Purview, custom connector).
- Confirm the service's authentication context mapping was applied successfully.
Resolution:
- SharePoint sites: re-apply the authentication context under SharePoint admin center → Sites → [Site] → Authentication context. The mapping can take up to 30 minutes to propagate.
- Custom connectors: confirm the connector definition uses a Continuous Access Evaluation (CAE)-aware authentication library.
- Power Automate flows: confirm the connector inside the flow honours the requested context.
7. PIM activation does not satisfy step-up
Symptoms: A user activates a PIM-eligible role and the activation succeeds, but the next administrative action triggers an unexpected step-up prompt.
Resolution:
- Open PIM → Microsoft Entra roles → Roles → [role] → Role settings and confirm On activation, require Conditional Access authentication context is set to
c4(Configuration Change). - Confirm the same context is targeted by an active
FSI-StepUp-c4-ConfigChangepolicy. - Activation tokens are re-issued with the satisfied context — if the user is using a stale token (e.g., long-running PowerShell session), they must re-acquire a token after activation.
8. Sign-in risk policy never fires
Diagnostics:
- Entra → Identity Protection → Risky sign-ins — confirm the user appears with a non-zero risk level.
- Confirm the user has Entra ID P2 licensing.
Resolution:
- Confirm Identity Protection is enabled and risk evaluation is active for the tenant.
- Confirm
FSI-StepUp-SignInRisk-Mediumis in On state and includes the user. - Confirm no other CA policy is granting access at a higher precedence (e.g., a "trusted location" exception that suppresses risk evaluation).
9. Custom Authentication Strength rejected
Symptoms: A user enrolled in FIDO2 still receives an "authentication strength requirement not met" error when the custom FSI-Critical-Operations strength is required.
Resolution:
- Entra → Protection → Authentication methods → Policies — confirm the FIDO2 method is enabled and the user is in the included scope.
- Re-open the custom strength definition and confirm FIDO2 is selected with the correct AAGUID restrictions if any are configured.
- If the strength requires certificate-based authentication, confirm the certificate authority is registered under Entra → Protection → Authentication methods → Certificate-based authentication.
Escalation Path
- Entra Security Admin — Conditional Access policy configuration and Authentication Strengths
- Authentication Administrator — assist non-admin users with method enrollment
- Entra Privileged Role Admin — PIM role setting changes
- Entra Global Admin — break-glass operations and tenant authentication methods policy
- AI Administrator / Power Platform Admin — downstream service mapping (Copilot Studio, Power Automate, custom connectors)
- Microsoft Support — platform-side bugs (open ticket from the Entra admin center; reference the sign-in log Correlation ID)
Known Limitations
| Limitation | Impact | Workaround / Mitigation |
|---|---|---|
| Service principals are not subject to user Conditional Access | SPs can perform sensitive ops without step-up | Workload identity CA + approval workflow + managed identities |
| Not every downstream service supports authentication contexts | Some sensitive actions cannot be context-gated | Use app-level controls and connector governance (1.4) |
| Continuous Access Evaluation (CAE) is library-dependent | Some clients honour token revocation slower than expected | Pair short sign-in frequency with CAE-aware client libraries |
| FIDO2 hardware dependency | Some users do not have a security key | Permit Windows Hello for Business and passkey in the strength definition |
| Authentication context IDs are immutable | Cannot rename c1–c25 once published |
Reserve ID space and document the catalog before publishing |
| Identity Protection requires Entra ID P2 | Sign-in risk and user risk policies do not function on lower SKUs | License users in scope of Zone 3 with Entra ID P2 |
Back to Control 1.23 | Portal Walkthrough | PowerShell Setup | Verification Testing