All Collections
Features & How-Tos
Troubleshooting Microsoft (Entra ID) login
Troubleshooting Microsoft (Entra ID) login

Instructions for troubleshooting login issues with Microsoft accounts (previously known as Azure AD/Office 365)

Updated over a week ago

Setting up Microsoft/Entra ID Single Sign On (SSO) with Viima is very straightforward and typically requires none to minimal input from your Microsoft 365 administrators. Please refer to Setting up Microsoft SSO with Viima for instructions on setting it up.

However, some organizations might have set Microsoft 365 to not allow external apps by default, or have additional IT policies in place preventing the intended use of the application.

So if your users are not allowed to log in to Viima with their Microsoft accounts, or are experiencing other related issues, it is highly likely that your current Azure Active Directory settings are the reason. We've outlined the most common causes for these issues below so that you can try to identify the source of the issue.

Most common causes

Here's a breakdown of the most common challenges you may come across:


The app is lacking admin consent

Depending on your IT policies, external applications might require an admin to grant access to them before users are able to start using them. You can check the status of your permissions and then fix the issue by following the steps below.

This issue might be shown in the form of this type of error showing when a user tries to log into Viima:

KB Office 365 Admin tip.png

TIP: A Microsoft 365 admin can grant admin consent for the rest of the organization to log into Viima simply by logging into Viima with their own Microsoft account. If this doesn't work, then please follow the steps below.

  1. Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab

  2. Choose "Viima" from the list of all applications (if you don't yet see Viima, click "New application" and search for Viima from the app gallery, then add it)

  3. Choose the "Permissions" tab

  4. Check if the app has an active "admin consent", such as the one in the screenshot below.

  5. If the application doesn't have the appropriate permissions, click here and proceed to authorize the app.

External applications are disabled and Viima has not been added as an enterprise application

If your organization has chosen to block access to external applications by default, you have to explicitly add Viima as an "enterprise application" in order to allow users to log in with their Office365/AzureAD accounts. You can do this by following the steps below:

  1. Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab

  2. Click "New application"

  3. Search for "Viima" from the App Gallery

  4. Choose Viima, then click "Add" from the pane that opens

You can then proceed to check the application properties to make sure your users are allowed to log in.

Application properties prevent logging in

The application settings for Viima in your Azure AD might prevent your users from logging in. You can fix the issue by following the steps below.

  1. Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab

  2. Choose "Viima" from the list of all applications (if you don't yet see Viima, click "New application" and search for Viima from the app gallery, then add it)

  3. Choose the "Properties" tab

  4. Make sure the settings allow your users to log in and that the app is visible for them, and also that user assignment is not required. Should you wish to require user assignment, you have to manually make sure each user is assigned to the application from the user's tab, otherwise they won't be able to access Viima.

Integrated (external) apps are disabled

In some cases, organizations have turned off access to external apps. This can prevent users from accessing Viima along with other external apps unless application settings are otherwise correctly configured. If it's ok for you to use integrated apps, this is easy to fix by following the steps below.

  1. From the "Settings" panel, open "Services & add-ins." Then click "Integrated Apps".

  2. Make sure that Integrated Apps are enabled. Remember to save your changes.

Entra ID Conditional access policies or firewall block access

Some Azure Active Directory plans allow organizations to create conditional access policies for their applications and users. These can be used, for example, to prevent access to an application from outside the corporate network, for users from certain user groups. Such policies can be useful, but if configured incorrectly, block access to Viima from some or all of your users.
​
If you're experiencing issues from some users and not from others, you might want to check if your conditional access policies or your corporate firewall have rules in place for preventing access to certain types of resources under some circumstances. To modify your Entra ID conditional access policies, follow the steps below:

  1. Go to the Azure Active Directory admin center and choose the "Enterprise applications" tab

  2. Choose "Viima" from the list of all applications (if you don't yet see Viima, click "New application" and search for Viima from the app gallery, then add it)

  3. Choose the "Conditional access" tab

  4. Adjust your conditional access policies to allow access to Viima.

If you've checked and/or fixed all of the above issues, you should now be able to authorize Viima to use Microsoft credentials and log in.

Should you still face challenges with the integration, please contact our support.

Did this answer your question?