This issue is related to Microsoft Entra ID (formerly Azure Active Directory) — account object/token-state corruption suspected.
Hi team,
We are facing an issue with ~8 accounts where users keep getting signed out from Microsoft 365 apps (Teams, Outlook, OneDrive, etc.) on all devices (Windows, iOS, and even InPrivate browser sessions).
Symptoms:
- Error codes:
50133 / 50173 (session not valid due to password change / revoked grant expired).
Even after successful MFA authentication, sessions get terminated shortly after.
Occurs on both compliant corporate devices (Intune-managed) and personal devices.
Troubleshooting done:
Revoked refresh tokens via PowerShell (Revoke-AzureADUserAllRefreshToken).
Disabled and re-enabled MFA methods.
Wiped and re-registered authenticator app.
Cleared cached credentials (Windows Credential Manager, Teams cache, etc.).
Tested on brand-new devices → same issue persists.
Conditional Access reviewed: policies not blocking, MFA strength satisfied.
Observation:
The problem seems linked to account object / token-state corruption in Entra ID.
Affected accounts cannot maintain a stable session, while unaffected accounts in the same tenant work fine.
Workaround: using Microsoft Edge InPrivate window allows temporary access, but apps (Teams/Outlook) still force sign-out later.
Request:
Is this a known issue with Entra ID / token refresh?
What is the recommended escalation path if account object corruption is suspected?
Should we request Microsoft Support to perform a backend reset/reseed of the affected users’ security keys/tokens?
Thanks in advance for any guidance.Hi team,
We are facing an issue with ~8 accounts where users keep getting signed out from Microsoft 365 apps (Teams, Outlook, OneDrive, etc.) on all devices (Windows, iOS, and even InPrivate browser sessions).
Symptoms:
Error codes: 50133 / 50173 (session not valid due to password change / revoked grant expired).
Even after successful MFA authentication, sessions get terminated shortly after.
Occurs on both compliant corporate devices (Intune-managed) and personal devices.
Troubleshooting done:
Revoked refresh tokens via PowerShell (Revoke-AzureADUserAllRefreshToken).
Disabled and re-enabled MFA methods.
Wiped and re-registered authenticator app.
Cleared cached credentials (Windows Credential Manager, Teams cache, etc.).
Tested on brand-new devices → same issue persists.
Conditional Access reviewed: policies not blocking, MFA strength satisfied.
Observation:
The problem seems linked to account object / token-state corruption in Entra ID.
Affected accounts cannot maintain a stable session, while unaffected accounts in the same tenant work fine.
Workaround: using Microsoft Edge InPrivate window allows temporary access, but apps (Teams/Outlook) still force sign-out later.
Request:
Is this a known issue with Entra ID / token refresh?
What is the recommended escalation path if account object corruption is suspected?
Should we request Microsoft Support to perform a backend reset/reseed of the affected users’ security keys/tokens?
Thanks in advance for any guidance.