Skip to content

Commit a093d07

Browse files
authored
Merge pull request #84224 from iainfoulds/patch-1
[AzureADDS] Add troubleshooting note for account lockout
2 parents 1159594 + d85181c commit a093d07

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory-domain-services/troubleshoot.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,9 @@ If one or more users in your Azure AD tenant are unable to sign in to the newly
143143
1. net stop 'Microsoft Azure AD Sync'
144144
2. net start 'Microsoft Azure AD Sync'
145145
* **Cloud-only accounts**: If the affected user account is a cloud-only user account, ensure that the user has changed their password after you enabled Azure AD Domain Services. This step causes the credential hashes required for Azure AD Domain Services to be generated.
146+
* **Verify the user account is active**: If a user's account is locked out, they can't sign in until their account is active again. Five invalid password attempts within 2 minutes on the managed domain cause a user account to be locked out for 30 minutes. After 30 minutes, the user account is automatically unlocked.
147+
* Invalid password attempts on the managed domain don't lock out the user account in Azure AD. The user account is locked out only within your Azure AD Domain Services managed domain. Check the user account status using the Active Directory Administrative Console (ADAC) for the Azure AD DS managed domain, not in Azure AD.
148+
* You can also [configure fine grained password policies that change the default lockout threshold and duration](https://docs.microsoft.com/azure/active-directory-domain-services/password-policy).
146149

147150
## There are one or more alerts on your managed domain
148151

0 commit comments

Comments
 (0)