FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login

    User Account Not Linked to IDP

    Scheduled Pinned Locked Moved Unsolved
    Q&A
    2
    4
    427
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      thomas.wojeck
      last edited by

      Hello,

      My application uses the API to create user accounts and link the account to the registered IDP. I've noticed an issue where I have user accounts being created properly in fusion auth, but the account is not being linked to the Active Directory account. When the user tries logging on, they get an error from Microsoft statin that the user needs admin approval.

      Do you know what this means? Is there a step we have to do at the Azure AD level?

      Thanks,

      Tom Wojeck

      danD 1 Reply Last reply Reply Quote 1
      • danD
        dan @thomas.wojeck
        last edited by

        @thomas-wojeck When using the API to create an account and a link, the linking in FusionAuth only occurs within FusionAuth, not within the remote Azure AD.

        The easiest way to have the Azure AD account set up correctly is to use an OIDC identity provider and have the user log in to Azure AD first, and then have an account created in FusionAuth.

        If that won't work, then you need to make sure that the link data in FusionAuth matches the account data in Azure AD, including the identityProviderUserId and the token (as documented here: https://fusionauth.io/docs/apis/identity-providers/links#request ). I think that will work, but you'd need to test it.

        --
        FusionAuth - Auth for devs, built by devs.
        https://fusionauth.io

        T 1 Reply Last reply Reply Quote 0
        • T
          thomas.wojeck @dan
          last edited by

          @dan Thanks for your quick reply. Part of my confusion might be that I don't fully understand the sequence of events when the linking occurs. I can attest to this:

          • We are using Azure AD's OIDC identity provider.

          • The user in question already has an active AD account that they've logged into for years.

          • This process has worked in the past and now mysteriously doesn't work.

          I'm wondering if something has changed on the Azure side that is preventing communication between Azure AD and FA.

          danD 1 Reply Last reply Reply Quote 0
          • danD
            dan @thomas.wojeck
            last edited by

            @thomas-wojeck

            Have you turned on the debug logs and looked in the event log? That's what I'd start doing to troubleshoot.

            More here: https://fusionauth.io/docs/operate/troubleshooting/troubleshooting#enabling-debugging

            --
            FusionAuth - Auth for devs, built by devs.
            https://fusionauth.io

            1 Reply Last reply Reply Quote 0
            • First post
              Last post