Microsoft’s Weekend Token Tango: When Refresh Became Regress!

Microsoft confirms Entra account lockouts were due to mistakenly logged refresh tokens, not compromised credentials. Impacted users thought it was linked to a new app rollout, but it was an internal error. Microsoft fixed the logging issue and is investigating further. Meanwhile, affected users can restore access by confirming them as safe in Microsoft Entra.

Pro Dashboard

Hot Take:

Looks like Microsoft’s Entra refresh tokens took a wrong turn into the Twilight Zone, causing a weekend lockout drama. Who knew that a little token logging mix-up could trigger an unexpected episode of “Locked Out and Confused”? It’s a reminder that even the tech titans are just one typo away from a comedy of errors. Let’s hope they find the refresh button on their refresh tokens!

Key Points:

  • Microsoft Entra account lockouts were due to mistakenly logged user refresh tokens.
  • Organizations initially blamed a new application, “MACE Credential Revocation,” for the lockouts.
  • The real issue stemmed from logging actual tokens instead of just their metadata.
  • Microsoft has corrected the logging issue and is working on restoring account access.
  • A Post Incident Review (PIR) will be shared with affected customers after the investigation.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?