Effects on the Flow portal and embedded experiences
This section details some of the adverse effects that conditional access can have on users in your organization who use Flow to connect to Microsoft services relevant to a policy.
Effect 1: Failure on future runs
If you enable a conditional access policy after flows and connections are created, flows fail on future runs. Owners of the connections will see the following error message in the Flow portal when they investigate the failed runs:
AADSTS50076: Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access <service>.
When users view connections on the Flow portal, they see an error message that resembles the following:
To resolve this issue, users must sign in to the Flow portal under conditions that match the access policy of the service that they are trying to access (such as multi-factor, corporate network, and so on), and then repair or re-create the connection.
Effect 2: Automatic connection creation failure
If users don't sign in to Flow by using criteria that matches the policies, the automatic connection creation to first-party Microsoft services that are controlled by the conditional access policies fail. Users must manually create and authenticate the connections by using criteria that matches the conditional access policy of the service that they try to access. This behavior also applies to 1-click templates that are created from the Flow portal.
To resolve this issue, users must sign in to the Flow portal under conditions that match the access policy of the service they try to access (such as multi-factor, corporate network, and so on) before they create a template.
Effect 3: Users can't create a connection directly
If users don't sign in to Flow by using criteria that matches the policies, they can't create a connection directly, either through PowerApps or Flow. Users see the following error message when they try to create a connection:
AADSTS50076: Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access <service>.
To resolve this issue, users must sign in under conditions that match the access policy of the service that they are trying to access, and then re-create the connection.
Effect 4: People and email pickers on the Flow portal fail
If Exchange Online or SharePoint access is controlled by a conditional access policy, and if users don't sign in to Flow under the same policy, people and email pickers on the Flow portal fail. Users can't get complete results for groups in their organization when they perform the following queries (Office 365 groups will not be returned for these queries):
- Trying to share ownership or run-only permissions to a flow
- Selecting email addresses when building a flow in the designer
- Selecting people in the Flow Run panel when selecting inputs to a flow
Effect 5: Using flow features embedded in other Microsoft services
When a flow is embedded in Microsoft services such as SharePoint, PowerApps, Excel, and Teams, the flow users are also subject to conditional access and multi-factor policies based on how they authenticated to the host service. For example, if a user signs in to SharePoint by using single-factor authentication, but tries to create or use a flow that requires multi-factor access to Microsoft Graph, the user receives an error message.
Effect 6: Sharing flows by using SharePoint lists and libraries
When you try to share ownership or run-only permissions by using SharePoint lists and libraries, Flow cannot provide the display name of the lists. Instead, it displays the unique identifier of a list. The owner and run-only tiles on the Flow properties page for already-shared flows will be able to display the identifier, not the display name.
More importantly, users may also be unable to discover or run their flows from SharePoint. This is because, currently, the conditional access policy information is not passed between Power Automate and SharePoint to enable SharePoint to make an access decision.
Effect 7: Creation of SharePoint out-of-box flows
Related to Effect 6, the creation and execution of SharePoint out-of-box flows, such as the "Request Signoff" and "Page Approval" flows, can be blocked by conditional access policies. SharePoint documentation on conditional access policies indicates that these policies can cause access issues that affect both first-party and third-party apps.
This scenario applies both to the network location and to conditional access policies (such as "Disallow Unmanaged Devices"). Support for the creation of SharePoint out-of-box flows is currently in development. We will post more information in this article when this support becomes available.
In the interim, we advise users to create similar flows themselves, and manually share these flows with the desired users, or to disable conditional access policies if this functionality is required.