Share via

Entra External ID SSO issue: AADSTS700056 on repeat sign-in when ESTSAUTHPERSISTENT cookie exists

Yuliia Bashko 80 Reputation points
2026-04-06T15:20:14.66+00:00

Hello Support Team,

We are seeing a repeatable sign-in issue in our Entra External ID / MSAL browser flow.

Problem summary

A user can sign in successfully on the first attempt. After logout, the same user may fail on the next sign-in attempt with:

AADSTS700056: User account does not exist in organization

This happens only when the Entra SSO cookie ESTSAUTHPERSISTENT is still present in the browser.

When the browser cookies are cleared, the same user can sign in successfully again.

Environment

  • Authentication library: @azure/msal-browser 2.38.1
  • Redirect flow used
  • Custom login domain is used
  • Tenant/policy path in requests: .../***.onmicrosoft.com/oauth2/v2.0/...

Repro steps

  1. User signs in successfully.
  2. User logs out from the SPA using msalInstance.logoutRedirect(...).
  3. Browser still contains Entra SSO cookie ESTSAUTHPERSISTENT.
  4. User starts sign-in again in the same browser session.
  5. Sign-in fails with: AADSTS700056: User account does not exist in organization

Important observations

1. Clean browser cookies make the problem disappear

If we remove Entra cookies and retry, the same user is allowed in successfully.

2. prompt: "login" works

If we force login with:

prompt: "login"

the repeat sign-in succeeds.

3. prompt: "select_account" does not work reliably

If we use:

prompt: "select_account"

the issue still occurs.

This suggests the problem is related to SSO session reuse, not the user's actual eligibility.

4. The same user and same tenant are used

This is not a case where the user intentionally changes account or tenant between attempts.

Expected behavior

If the same user signs out and then signs in again, or signs into another app in the same tenant/browser session, Entra should not incorrectly resolve the user into a context that leads to:

AADSTS700056: User account does not exist in organization

especially when the same user can sign in successfully after clearing cookies or using prompt=login.
Our question

Can you confirm whether this is a known Entra External ID / SSO session reuse issue with persisted cookies such as ESTSAUTHPERSISTENT, especially when using:

  • custom login domain
  • multiple apps in the same tenant
  • prompt=select_account
  • MSAL browser redirect flow

We would also like guidance on:

  1. why prompt=select_account reuses an invalid identity/session context,
  2. why prompt=login consistently works,
  3. whether logoutsession returning postLogoutRedirectUriValid=0 is related,
  4. how to ensure server-side sign-out fully clears the Entra session for the intended account.

Thank you.

Our question

Can you confirm whether this is a known Entra External ID / SSO session reuse issue with persisted cookies such as ESTSAUTHPERSISTENT, especially when using:

  • custom login domain
  • multiple apps in the same tenant
  • prompt=select_account
  • MSAL browser redirect flow

We would also like guidance on:

  1. why prompt=select_account reuses an invalid identity/session context,
  2. why prompt=login consistently works,
  3. whether logoutsession returning postLogoutRedirectUriValid=0 is related,
  4. how to ensure server-side sign-out fully clears the Entra session for the intended account.

Thank you.

Microsoft Security | Microsoft Entra | Microsoft Entra External ID

1 answer

Sort by: Most helpful
  1. Yutaka_K_JP 1,655 Reputation points
    2026-04-07T08:25:42.4466667+00:00

    I think it’s just External ID stickin u to a stale ESTSAUTHPERSISTENT home‑realm hop, so the STS drops u in the wrong tenant. Try one clean prompt=login or wipe that cookie, and if it still loops check the end_session redirect chain.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.