There are several organizational-level policies and settings that could prevent end users from accessing a consented third-party application, even after admin consent has been granted. Here are some potential areas to investigate:
- User Consent Settings: The tenant administrator may have disabled user consent for applications. This means that even if admin consent is granted, users may still be blocked from accessing the application unless specific permissions are set up correctly.
- Conditional Access Policies: The client's IT team should verify if there are any Conditional Access policies that might restrict access to the application based on user location, device compliance, or other criteria. Policies that require multi-factor authentication (MFA) or block access from certain networks could also be factors.
- Azure AD Security Defaults: If security defaults are enabled, they may enforce certain security measures that could affect user access to applications. These defaults can include requiring MFA for all users, which might not be configured properly for the application.
- App Governance Settings: Microsoft Defender for Cloud Apps policies could potentially block user access if there are specific governance rules set that restrict access to third-party applications, even with admin consent.
- Enterprise Applications Configuration: The client should check the application's settings in the Microsoft Entra admin center to ensure that there are no restrictions on user assignments or that the application is not set to require user assignment for access.
- Permissions Review: Confirm that the permissions granted are appropriate and that no additional permissions are required for end users that were not included in the admin consent.
Given that this issue is isolated to a single client organization, it is likely a configuration issue within their tenant rather than a problem with the application itself. The IT team should thoroughly review these settings to identify any potential blocks to user authentication.
References: