A cloud-based identity and access management service for securing user authentication and resource access
Hey there, it definitely looks like your firewall/proxy is blocking one (or more) of the REST calls that the Entra ID “Authentication methods” blade uses under the covers. Behind the scenes the portal calls Microsoft Graph and a handful of related endpoints to gather a user’s auth-method settings, so letting just graph.microsoft.com in isn’t always enough—and if you’ve only allowed that host, you can end up with a broken page.
Here’s what I’d try next:
- Open your browser’s DevTools (F12), go to the Network tab, then reload the Authentication methods blade.
- Look for any requests that end up in red (4xx/5xx or blocked).
- Note the exact hostname(s) and URL paths that are failing.
- Whitelist all of the following (at a minimum):
- https://graph.microsoft.com
- https://graph.windows.net
- https://login.microsoftonline.com (and login.microsoft.com)
- https://portal.azure.com
- https://management.azure.com
- *.msauth.net / *.msauthimages.net (used for AAD token flows and static assets)
- Clear your browser cache (or try a fresh InPrivate/Incognito tab once more), then reload.
- If the page still errors out, capture the blocked requests in your proxy logs or browser devtools and share the list of hostnames/methods that failed.
That process will tell you exactly which call is being blocked so you can add it to your allowlist. Once those endpoints are unblocked, the Authentication methods blade should load normally.
—————————————————————————————————
Follow-up questions in case you still see trouble:
- When you open F12 → Network, which specific hostnames/endpoints are failing? (post a screenshot if you can)
- Do you see any CORS errors or 401/403 codes in the console?
- Is this happening for all users in your tenant or just your account?
- Any chance you have Conditional Access policies that block Graph calls from unmanaged networks?
References:
- Common questions and solutions for Microsoft Entra configuration https://github.com/Azure/Service-Fabric-Troubleshooting-Guides/blob/master/Security/README.md#aad-configuration
- How to configure Microsoft Entra authentication for an existing cluster https://github.com/Azure/Service-Fabric-Troubleshooting-Guides/blob/master/Security/Configure%20Azure%20Active%20Directory%20Authentication%20for%20Existing%20Cluster.md
- Entra help and support https://ms.portal.azure.com/#view/Microsoft_Azure_Support/HelpPane.ReactView/...
Note: This content was drafted with the help of an AI system. Please verify the information before relying on it for decision-making.