Entra External ID MFA "... we ran into an error" and AADSTSS500208 error

Reto Wagner 5 Reputation points
2024-10-03T13:25:55.0166667+00:00

Hi all,

We are currently doing a PoC for External ID. For the administration of the tenant I've set up a bunch of cloud-only admin accounts (type=member, NOT local accounts). These should be used for configuration of the tenant, user flows etc. I've created a Conditional Access Policy enforcing MFA for all users (my initial guest account is excluded for fallback scenario).

User's image

When now new cloud admins sign-in the first time they get prompted for MFA registration (which is intended). However, during the setup of MFA with Authenticator (QR Code & 6-digit code) they get a the generic error "We're sorry, we ran into a problem. Please click "Next" to try again." This happens for QR code scan but also for entering a code instead. First of all, fun thing is that they get prompted for Authenticator by default, which is officially not supported by External ID (only SMS / Email OTP). However, this method worked for my initial (workforce tenant) Guest Account, from which i created the External ID tenant initially from but not for newly created regular member accounts.

I've then tried to disable Authenticator and Software OATH as method (leaving SMS & Email OTP) in the authentication methods (which are by default enabled - but not supported officially?!) and tried to login with a newly created test user (Type = member / NOT local account) ******@xxxxciam.onmicrosoft.com and get the message "AADSTS500208: The domain is not a valid login domain for the account type":

User's image

I know that this error can happen for app registration with web apps (customer flow), but there we don't have the issue - this works as expected (with the correct ciamlogin.com endpoint). The issue is just for "admins" I'd like to manage as regular member users (NOT local account).

Meanwhile I got new admins working by sending out guest invites to admin users of our "connected" workforce tenant (the one from which the External ID tenant was originally created from). But even there i first had "We ran into a problem errors" - but after logout and sign-in again it worked.

User's image

The whole concept of the External ID tenant administration in combination with MFA methods seems to have failures in the MFA registration flows implementation. Why is it even possible to configure authentication methods that are not supported? And why does e.g. Authenticator work for Guest accounts but not for member accounts (non Local Account). Can you please assist me on these issues? I've also created a post in the Microsoft Identity Advisors in parallel.

This blocks a proper setup of further admins created as member users (non Local Accounts).

Thanks for your support.

Reto

Microsoft Authenticator
Microsoft Authenticator
A Microsoft app for iOS and Android devices that enables authentication with two-factor verification, phone sign-in, and code generation.
8,112 questions
Microsoft Entra External ID
Microsoft Entra External ID
A modern identity solution for securing access to customer, citizen and partner-facing apps and services. It is the converged platform of Azure AD External Identities B2B and B2C. Replaces Azure Active Directory External Identities.
3,045 questions
0 comments No comments
{count} vote

2 answers

Sort by: Most helpful
  1. Shweta Mathur 30,311 Reputation points Microsoft Employee
    2024-10-10T08:06:33.8533333+00:00

    Hi @Reto Wagner ,

    Thanks for reaching out and thanks for pointing this.

    I encountered a similar issue during my testing. When attempting to register MFA (Microsoft Authenticator) for a user account (Type = member, not local account) in Entra External ID, it appears that only the Global Administrator role can register the user, which isn't an ideal solution.

    I’ve raised this with the internal team to gather more insights on the matter and will revert you on this.

    As a temporary workaround, you could assign the Global Administrator role to register the user, then unassign it afterward. However, this is not a recommended approach.

    Why is it even possible to configure authentication methods that aren't supported?

    Customers can safeguard admin accounts with stronger MFA methods, all of which are fully supported and available for selection today.

    Hope this will help,

    Thanks,

    Shweta


  2. Baptiste VIALA 0 Reputation points
    2025-02-21T04:51:41.4033333+00:00

    Hello,

    This is still an issue.

    Login should at least fail with an actionable error code. MFA not working because of user not having Global Admin role assignment is bizarre behavior. Please fix

    Thank you

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.