You can't unlock your account because your organization is currently experiencing connectivity problems with self service password reset

Winston Tran 171 Reputation points
2023-01-08T22:17:33.117+00:00

Hi There,

Our users are intermittently seeing the attached screenshot when resetting their password.
We have on-prem AD synchronising to Azure AD and can confirm password writeback is enabled.

A few months ago we did attempt to disabled TLS 1.2 on the on-prem AD server through here https://learn.microsoft.com/en-us/troubleshoot/azure/active-directory/enable-support-tls-environment?tabs=azure-monitor and here https://learn.microsoft.com/en-us/troubleshoot/azure/active-directory/enable-support-tls-environment?tabs=azure-monitor
After running these steps it was working very consistently until recently.

I found this site (https://learn.microsoft.com/en-us/azure/active-directory/authentication/troubleshoot-sspr-writeback) but cannot figure out where I am supposed to see these errors or where the logs are supposed to appear. Event viewer? Somewhere in Azure?

Can I get some assistance on this please?

277233-screenshot-2023-01-09-090956.png

Microsoft Security | Microsoft Entra | Microsoft Entra ID
0 comments No comments
{count} votes

Accepted answer
  1. Thameur-BOURBITA 36,266 Reputation points Moderator
    2023-01-08T22:48:08.71+00:00

    Hi

    it seems a proxy or firewall issue that generated this error.

    You can follow the link below to check if required URL still reachable:

    troubleshoot-sspr-writeback

    Please don't forget to mark helpful reply as answer


2 additional answers

Sort by: Most helpful
  1. Givary-MSFT 35,626 Reputation points Microsoft Employee Moderator
    2023-01-09T05:51:49.507+00:00

    @Winston Tran Thank you for reaching out to us, add to the above steps

    1. Any changes have been made with respect to on-premise password policy or any changes made on the network layer.
    2. All password reset service events can be visible in the application event logs and any changes related to TLS can be seen in system logs, so reviewing Application/system logs at the time of issue can give more insights.
    3. Is the issue is intermittent? All users experience this issue?
    4. If you have Active/Staging AD Connect setup, try to change the staging ad connect server to primary and vice versa, verify if the issue persists.
    5. Version of Azure AD Connect?
    6. At the time of issue execute this command Start-NetworkConnectivityDiagnosisTools from the Azure AD Connect server (https://learn.microsoft.com/en-us/azure/active-directory/hybrid/reference-connect-adconnectivitytools)
    7. You can capture a network trace from the Azure AD Connect server at the time of issue to investigate further.

    If the above suggestions, doesn't help to isolate the issue, we can connect offline for deeper investigation.

    Please remember to "Accept Answer" if answer helped, so that others in the community facing similar issues can easily find the solution.


  2. Limitless Technology 44,781 Reputation points
    2023-01-10T08:37:12.233+00:00

    Hello,

    Yes, the errors would appear in Azure. To retrieve them you need to follow the next steps:

    1.Sign in to the Azure AD Connect server and start the Synchronization Service Manager by selecting Start > Synchronization Service.

    2.Under the Connectors tab, select the on-premises Active Directory Domain Services connector, and then select Properties.

    3.In the pop-up window, select Connect to Active Directory Forest and make note of the User name property. This property is the AD DS account used by Azure AD Connect to perform directory synchronization.

    4.For Azure AD Connect to perform password writeback, the AD DS account must have reset password permission. You check the permissions on this user account in the following steps.

    5.Sign in to an on-premises domain controller and start the Active Directory Users and Computers application.

    6.Select View and make sure the Advanced Features option is enabled.

    7.Look for the AD DS user account you want to verify. Right-click the account name and select Properties.

    8.In the pop-up window, go to the Security tab and select Advanced.

    9.In the Advanced Security Settings for Administrator pop-up window, go to the Effective Access tab.

    10.Choose Select a user, select the AD DS account used by Azure AD Connect, and then select View effective access.

    --If the reply is helpful, please Upvote and Accept as answer--

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.