Skip to content

Commit 86cf0b9

Browse files
authored
[AzureADDS] Fixes MicrosoftDocs/azure-docs#33408
1 parent 44e1d5f commit 86cf0b9

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory-domain-services/troubleshoot.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,9 @@ If one or more users in your Azure AD tenant are unable to sign in to the newly
143143
1. net stop 'Microsoft Azure AD Sync'
144144
2. net start 'Microsoft Azure AD Sync'
145145
* **Cloud-only accounts**: If the affected user account is a cloud-only user account, ensure that the user has changed their password after you enabled Azure AD Domain Services. This step causes the credential hashes required for Azure AD Domain Services to be generated.
146+
* **Verify the user account is active** If a user's account is locked out, they can't sign in until their account is active again. Five invalid password attempts within 2 minutes on the managed domain cause a user account to be locked out for 30 minutes. After 30 minutes, the user account is automatically unlocked.
147+
* Invalid password attempts on the managed domain don't lock out the user account in Azure AD. The user account is locked out only within your Azure AD Domain Services managed domain. Check the user account status using the Active Directory Administrative Console (ADAC) for the Azure AD DS managed domain, not in Azure AD.
148+
* You can configure fine grained password policies that change the default lockout threshold and duration - https://docs.microsoft.com/en-us/azure/active-directory-domain-services/password-policy
146149

147150
## There are one or more alerts on your managed domain
148151

0 commit comments

Comments
 (0)