Error AtlasError Documentation and Resolution

Microsoft Entra sign-in failed because MFA is required

Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access '{resource}'.

Microsoft Entra ID interrupted the sign-in because the current authentication attempt does not satisfy a multi-factor authentication requirement. This is usually enforced by a Conditional Access policy, per-user MFA enforcement, or Security Defaults. The request must be retried interactively so the user can complete the MFA challenge.

AADSTS50076authentication
Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access '{resource}'.
  • A Conditional Access policy in the tenant requires MFA for the user, application, or network location involved in the sign-in attempt.
  • Per-user MFA enforcement is enabled for the account in the Microsoft Entra admin center.
  • Security Defaults are enabled on the tenant, which enforces MFA for all users.
  • The sign-in is being attempted non-interactively using the Resource Owner Password Credentials (ROPC) flow, which cannot satisfy an MFA challenge because there is no browser or UI to present one.
  • The user's sign-in location has changed since their last session, triggering a new MFA challenge from a Conditional Access location-based policy.
  • A service account or automated flow is attempting to authenticate using delegated permissions against a resource that is covered by a Conditional Access MFA policy.
  1. If the sign-in is interactive: retry the sign-in in a browser. Entra ID will redirect the user through the MFA challenge, and authentication will complete once the challenge is satisfied.
  2. If the sign-in is non-interactive (ROPC flow, automation, service account): the ROPC flow cannot handle MFA challenges. Switch to the authorization code flow or device code flow, which both support interactive MFA. For service-to-service scenarios, use a service principal with client credentials (certificate or client secret) and application permissions instead of delegated user credentials.
  3. If the error is from a service account that should not require MFA: in the Entra admin center, navigate to Protection > Conditional Access, open the relevant MFA policy, go to Users > Exclude, and add the service account. Use exclusions cautiously and only for accounts with other compensating controls.
  4. If per-user MFA is enforced and this is unintended: navigate to Microsoft Entra admin center > Users > Per-user MFA, select the user, and disable per-user MFA. Microsoft recommends using Conditional Access policies instead of per-user MFA.
  5. If Security Defaults are enabled and are the cause: navigate to Microsoft Entra admin center > Overview > Properties > Manage Security Defaults and set it to Disabled. Only do this if you have equivalent Conditional Access policies in place.
  6. Review the sign-in logs in Microsoft Entra admin center > Monitoring > Sign-in logs to identify which Conditional Access policy triggered the error and tailor the fix accordingly.
Microsoft Entra authentication and authorization error codes
AADSTS50076: MFA required by Conditional Access — causes and fixes | Error Atlas