MFA In External ID Blocking the users Who are Logged through Google IDP and External Identities

santhosh santhosh 0 Reputation points
2025-11-03T12:59:45.8433333+00:00

Hi , I have Been Using Google Loggin in the User Flow Apparently There is a Issue I have faced Which came After I Implemented the Conditional Access the actual issue I couldn't Login With Google in the User Flow when conditional access is enabled But If I Disable the Conditional Access I could able to Login with Google

Azure App Configuration
Azure App Configuration
An Azure service that provides hosted, universal storage for Azure app configurations.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Praveen Chivarla 2,005 Reputation points Microsoft External Staff Moderator
    2025-11-12T09:42:20.68+00:00

    Hi Santhosh,

    Thank you for posting your query on Microsoft Q&A.

    If users are unable to sign in with Google after you've enabled Multi-Factor Authentication (MFA) in your Conditional Access policies, it’s a known issue in Microsoft Entra ID. This can happen when MFA isn’t properly set up to trust Google, or if the Conditional Access policies are too restrictive for external users.

    Pease follow the steps below to fix the issue:

    1. Set Up MFA Trust for Google Users

    • Go to Microsoft Entra admin center > External Identities > Cross-tenant access settings.
    • Make sure that both inbound and outbound MFA trust is enabled. This ensures that Google users who have already completed MFA won’t be blocked or prompted to do MFA again when signing in.
    • This step helps Google users authenticate smoothly even when MFA is required.

    2. Review Your Conditional Access Policies

    • Double-check that your Conditional Access policies apply to the correct users, including external Google users.
    • You may want to temporarily relax some restrictions like device compliance and session controls for external users to avoid accidental blocks.
    • Also, ensure that the MFA requirement in your policies is set up correctly for external authentication.

    3. Use a Combined Sign-Up and Sign-In Flow

    • Instead of using separate sign-in and sign-up flows, set up a combined user flow (SignUpSignIn). This will help users who don’t have an account yet sign up easily while trying to log in.
    • Note: Microsoft Entra doesn't automatically switch a Google sign-in attempt to sign-up if the user isn’t registered yet, so users will need to manually sign up if they’re new.

    4. Enable Self-Service Sign-Up for New Google Users

    • To make it easier for new Google users, enable self-service sign-up by going to External Identities > External collaboration settings.
    • This will allow new users to register themselves, helping them avoid errors when trying to sign in for the first time.

    5. Check the Sign-In Logs

    • Go to Microsoft Entra admin center > Monitoring & health > Sign-in logs.
    • Review the logs to find specific errors related to MFA or Conditional Access policies. This will help you understand what’s blocking the sign-in and allow you to troubleshoot more effectively.

    Additional Resources:

    I hope this information is helpful. Please feel free to reach out if you have any further questions. If the answer is helpful, please click "Accept Answer" and kindly Upvote it.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.