Password

Identity

34 sections
2405 source tickets

Last synthesized: 2026-02-12 13:51 | Model: gpt-5-mini
Table of Contents

1. Expired or undelivered password / activation emails (OKTA, myCampus, Oasis, Microsoft 365)

436 tickets

2. Okta password requests blocked by deactivated/terminated or contingent-worker accounts and license expiry

68 tickets

3. Windows sign-in failures on new devices or after name change (PIN/password/fingerprint) with connection-related errors

98 tickets

4. macOS Keychain caused repeated password prompts for self-service apps (1Password)

3 tickets

5. Okta web access failures in browser preventing login or password reset

15 tickets

6. MyCampus access failures after Okta password change (separate service passwords)

67 tickets

7. macOS restart/login loop resolved by resetting the local account password in Recovery

39 tickets

8. Service-account temporary password delivered via Safe-Link (safe.app)

4 tickets

9. jamf Connect blocked by Okta 'password expired' state despite Okta web access

21 tickets

10. Administrator-initiated password reset for user unable to log in

1232 tickets

11. Third‑party app login failures when using institutional email instead of app username

86 tickets

12. Browser prompting for Windows/OS password to reveal saved credentials

1 tickets

13. Initial myCampus password creation rejected by password policy

5 tickets

14. Microsoft 365 A1 license prevents desktop Office editing after password reset on macOS

1 tickets

15. Windows accounts subject to frequent password expiration notices

3 tickets

16. Miro Enterprise login and password-reset failures due to server-side authentication error

10 tickets

17. New macOS device failed to authenticate to IU mail due to mistyped password

8 tickets

18. Okta authentication succeeded but downstream course/role entitlements missing for Infocenter access

3 tickets

19. Restrict Azure AD Self‑Service Password Reset (SSPR) scope to student group

1 tickets

20. iPhone repeatedly prompts for Apple ID password when Apple ID owner/credentials are unknown

7 tickets

21. 1Password sign-in blocked by missing Secret Key after device change

6 tickets

22. 1Password account recovery for forgotten master password

56 tickets

23. Chrome Password Manager flagged MyCampus test account as compromised due to common/weak password

1 tickets

24. Password reset requested with delivery to user-provided private email

201 tickets

25. Departmental application password resets handled via SharePoint access request form

21 tickets

26. macOS system updates blocked by lack of local admin rights (resolved via IU Self Service App Minion)

1 tickets

27. Forgot‑password email not delivered for Workday/Care; admin reset restored access

3 tickets

28. Intermittent Okta sign-in denials and forced password resets associated with travel or third‑party VPNs and risk‑based flags

1 tickets

29. Unable to change password immediately after initial Windows sign‑in due to permission denial

1 tickets

30. Application/service account password reset that required Global Admin and was delivered via Password Safe

1 tickets

31. Expired shared third‑party account (Turnitin) where local staff lacked reset rights

2 tickets

32. Intermittent on-site domain logon failures while remote logon succeeded

1 tickets

33. LAPS UI not available on Windows 11 multi-session Jump Servers; admin reset used

1 tickets

34. Migration of user credentials into enterprise 1Password vault

1 tickets

1. Expired or undelivered password / activation emails (OKTA, myCampus, Oasis, Microsoft 365)
95% confidence
Problem Pattern

One-time passwords, activation or verification messages (email/SMS) were missing, delayed, expired, consumed by scanners, truncated, redirected, or delivered to wrong or inaccessible addresses, producing errors such as “link expired”, “token expired”, “link already used”, “no reset email received”, blank pages, sign‑in loops, persistent MFA prompts, immediate account lockouts, or inability to complete initial registration. Affected systems included federated and local IdPs (Okta/EntraID/Azure AD), Microsoft 365/Office.com, Salesforce, Atlassian, applicant/registration portals and other SaaS apps. Time‑limited verification codes (for example messages from msonlineservicesteam@microsoftonline.com) sometimes expired in roughly five minutes, causing retries and rapid lockouts. Incidents sometimes coincided with device sign‑in or VPN/WLAN client problems or with accounts managed by separate support teams (for example student accounts).

Solution

Password creation, reset and activation flows were restored by correcting contact records, verifying outbound delivery and resending fresh one‑time tokens or performing authoritative resets at the IdP or application side. Technicians repaired mistyped, outdated, concatenated or malformed contact fields and, when institutional mailboxes were inaccessible, delivered resets using alternate external addresses (for example Gmail or iCloud) or via secure transfer so users could receive credentials. Expired, consumed or invalid tokens were replaced by resending fresh reset/activation links or by performing admin/system resets at the authoritative IdP (for example Okta or EntraID/Azure AD); administrators sometimes used admin resets or direct sends to bypass service‑side request limits or cooldowns. Tokens prefetched or consumed by email‑security scanners and link‑previewers were resolved by coordinating with mail/security teams and issuing fresh tokens or alternative delivery paths. Truncated, redirected or previewed links were fixed by extracting or regenerating full URLs and completing flows in supported contexts; clearing browser cache/cookies or using a private/incognito browser restored usable sessions in multiple incidents. Technicians observed Microsoft verification emails from msonlineservicesteam@microsoftonline.com and noted codes that expired in roughly five minutes; retries that generated immediate lockouts were addressed by issuing fresh MFA/verification flows and by administrative unlocks or IdP resets. Missing, archived, locked or unlicensed accounts were reconciled by provisioning, unarchiving, unlocking, restoring licenses or performing application‑side password resets so dashboards, add‑ins and embedded app tiles could reauthenticate. Application‑specific blocks, orphaned MFA artifacts, out‑of‑sync role/app assignments and corrupted application profiles were repaired by regranting app roles, repairing profiles, or reprovisioning at the application side. Notification‑provider delivery failures (for example SMS/email vendors) were corrected in provider settings and notifications retriggered. Incidents that coincided with local device sign‑in problems (for example inability to change a Windows sign‑in password or missing VPN/WLAN client UI) were treated as parallel endpoint issues and escalated to desktop teams; remediation in those cases included local profile repair, device reprovisioning or restoring/reinstalling network/VPN clients so devices accepted new credentials and SSO/app resets completed. For requests or applications managed outside the IT Service Portal, technicians routed or forwarded the requests to the appropriate support team or vendor portal; in one case a student account was outside employee IT support scope and the request was forwarded to Student Support (techsupport@iu.org), which resent the customer's login credentials. These actions restored delivery and usability of password, activation and verification messages and repaired related sign‑in, MFA and licensing access issues across production and sandbox environments.

Source Tickets (436)
2. Okta password requests blocked by deactivated/terminated or contingent-worker accounts and license expiry
95% confidence
Problem Pattern

Users could not authenticate to Okta or access SSO‑protected cloud and learning applications (for example Microsoft 365, Teams, Outlook, Salesforce, Pebble). Symptoms included failed sign‑ins or browser messages that the account was blocked; password‑reset flows failing or returning messages such as “this is not possible at the moment” or “Password reset is currently not permitted. Please contact support for assistance.”; missing or undelivered reset emails; blocked self‑service when the recovery address matched the sign‑in; and local workstation restrictions preventing app features. Problems commonly coincided with identities that were disabled/removed or marked deactivated/terminated, expired licenses or contracts, missing application‑level/course entitlements, or incomplete profile attributes (for example a missing manager/responsible) that prevented self‑service or password resets.

Solution

Access was restored by correcting identity state, resolving entitlement and license issues, clearing obsolete authentication factors, re‑importing disabled identities into Okta and setting required profile attributes, and using platform resets when self‑service failed. Support actions that resolved incidents included reactivating or extending user accounts by updating termination/contingent‑worker dates and licence/contract end dates and recording extensions; importing disabled or omitted accounts into Okta and assigning the responsible/manager in the user profile before issuing reset emails; reactivating or escalating application‑specific accounts (for example Salesforce or course accounts) to the owning application teams when application entitlements blocked access; removing or updating legacy authentication factors that prevented 2‑factor enrollment and retriggering password‑reset or initial‑access flows; initiating Microsoft password resets when Microsoft identities had expired so reset/access emails were delivered and users could create new passwords and enroll 2FA; resending reset emails to known addresses and coordinating with internal teams for deactivated employee accounts while following verification practices for requests from personal email addresses; and triggering an Okta password reset when self‑service recovery was blocked (for example the recovery email matched the sign‑in) or an account appeared locked. A subset of incidents required handing off remediation to application owners for application‑level entitlement fixes, backend identity‑state updates followed by users retrying sign‑in, or workstation support to restore local admin or privacy settings (for example macOS Privacy & Security changes affecting Teams).

3. Windows sign-in failures on new devices or after name change (PIN/password/fingerprint) with connection-related errors
94% confidence
Problem Pattern

On Windows 10/11 corporate devices local sign‑in (password, PIN, or Windows Hello) rejected correct credentials or treated input as incorrect while cloud SSO (Okta/Microsoft) and web services continued to work. Failures commonly occurred on new or recently provisioned devices, after password expiration/UPN/name changes, after resume from sleep/lock, or during limited/offline network access. Sign‑in screens reported messages such as "The password is incorrect", "We could not verify your account", or "The configuration information could not be read from the domain controller"; showed a stale username or "New User"; blocked PIN/biometrics; prevented Ctrl+Alt+Del password changes (for example "computer not found"); repeatedly prompted for credentials; or produced a black screen when using Other user. VPN-at-sign-in and access to site-specific services (MyCampus, Teams, Outlook) sometimes failed until the device refreshed cached or domain credentials.

Solution

Support restored on‑device sign‑in by re‑establishing synchronization between affected devices and corporate identity services, refreshing cached credentials, or re‑provisioning devices. Observed successful remedies included: allowing vendor/Phase‑1 provisioning flows to fully complete (some new laptops required ~60+ minutes and SupportAssist to finish) and permitting that provisioning to finish before attempting local sign‑in. When devices were offline or had stale cached state, restoring network connectivity from the Windows sign‑in screen — using campus LAN/Wi‑Fi, the same VPN method used during initial provisioning, or a mobile hotspot — allowed the device to validate or refresh cached/domain credentials; in a few incidents temporarily disabling WLAN allowed cached/local sign‑ins to succeed. When the sign‑in UI showed an outdated username, signing via Other user, using Switch user, or signing once with an older username bypassed the stale state and allowed subsequent logins with the current UPN. Clicking the sign‑in screen "Reset password" control cleared cached credential state in multiple incidents so the same password then succeeded without a separate cloud reset. Okta and Microsoft password resets were accepted by affected devices once they regained connectivity, but SSPR via email was sometimes not available when users had no private email on file. Cases where Ctrl+Alt+Del password changes failed with domain‑controller errors resolved after network restoration and credential sync. Factor-related blocks were cleared by removing and re‑enrolling Windows Hello PIN/biometrics or by resetting Microsoft Authenticator; one team reported using a hardware security key to reduce recurrence. Devices that combined sign‑in failures with system instability recovered after updating or reinstalling device drivers, removing/reinstalling vendor driver‑management components (for example Dell Command), and forcing reboots. Transient Company Portal/Intune or gpupdate failures cleared once the device completed credential sync/provisioning; affected devices sometimes displayed an Intune/Hello credential flag (hellocredbroken). Exchange/Outlook and shared‑mailbox visibility problems that accompanied sign‑in or name‑change issues were resolved by removing and re‑adding mailbox entries to refresh visibility and send‑as permissions. New‑device fixes included enabling missing provisioning/sign‑in checkboxes and adding devices/users to required Azure AD/AD groups (examples: a "Win11" device group and an AD "wireless" group) which allowed sign‑in on otherwise‑blocked laptops. A reproducible Other user/lock‑screen black‑screen failure was escalated to Microsoft; in at least one Dell case a vendor‑side Microsoft update deployed by specialist teams resolved a device that repeatedly requested passwords and only accepted a new password after a full reboot. A browser cookie clear resolved an initial Teams access failure in one password‑reset case where cloud services were reachable but the local client was blocked by stale cookies.

4. macOS Keychain caused repeated password prompts for self-service apps (1Password)
70% confidence
Problem Pattern

On macOS, Self Service+/1Password repeatedly displayed a persistent macOS Keychain password prompt that the user could not satisfy (often requesting a keychain password the user did not set). The prompt blocked app authentication and password updates, and attempts to change the keychain entry sometimes produced a permission‑denied error. The issue typically affected only the reporting user and could occur despite successful authentication via other devices or methods (e.g., Okta Verify on a phone).

Solution

Support performed Keychain Access repairs and progressive keychain reset/repair measures (attempted in increasing invasiveness) and provided targeted keychain troubleshooting and reset instructions. After those Keychain Access fixes and the keychain reset, the persistent macOS Keychain password prompts stopped, permission‑denied errors when updating the keychain ceased, and affected apps (Self Service+, Okta integrations, 1Password) authenticated normally.

5. Okta web access failures in browser preventing login or password reset
91% confidence
Problem Pattern

Users were unable to sign into Okta and downstream SSO apps from desktop browsers using their regular password. Desktop browsers either failed silently or showed explicit errors such as 'Sign‑in not possible' (including localized variants) or a perpetual spinning wheel during Okta authorization; SAML/OAuth flows could not complete and Okta 'Forgot password' flows frequently did not send reset emails. Corrupted browser session state, switching between personal and corporate accounts in the same browser, or following an outdated/incorrect Okta sign‑in URL often coincided with these failures. Affected downstream symptoms included Atlassian logins failing, webmail drafts marked 'not sent' or stuck, save/overwrite failures in apps (e.g., TEAQ), and file‑upload rejections in SharePoint reporting 'file is too large' for otherwise acceptable files.

Solution

Access failures were traced primarily to corrupted browser/session state and incorrect sign‑in URLs, and were resolved by restoring a clean Okta session and, where necessary, resetting credentials. Clearing the browser session or using a private/Incognito/InPrivate window returned users to the Okta dashboard, restored downstream SSO access (including Atlassian/Jira/Confluence), and allowed 'Forgot password' reset emails to be delivered. In multiple incidents support-issued direct password‑reset links or IT‑triggered Okta password resets sent to the user's IU email were used to reset Okta (and related Microsoft) credentials and immediately restore browser access; in one macOS case signing into the browser once with the old password produced a change‑password popup that completed the reset. Separately, switching from outdated or incorrect sign‑in URLs (for IU environments, https://okta.iu.org/) to the current URL resolved sign‑in failures tied to wrong endpoints. Recurrent failures that reappeared after a successful password reset were traced to account/session conflicts from using personal and corporate accounts in the same browser profile; resolving browser session state (for example by clearing session/cache, using a private window, or using a separate browser/profile) prevented recurrence. Restoring Okta access also resolved related downstream anomalies such as email drafts stuck as 'not sent', TEAQ save/overwrite errors, and SharePoint upload failures that were observed while the browser/session was corrupted.

6. MyCampus access failures after Okta password change (separate service passwords)
94% confidence
Problem Pattern

After Okta password changes or local password-sync events, users experienced inconsistent authentication across institutional and external services: some services accepted an old password while rejecting a newly set one, or returned errors such as “credentials incorrect,” “email address does not exist,” “Login not possible,” or Jamf Connect “Password Expired., Status: 400.” Reported symptoms included account lockouts, inaccessible SSO tiles, stalled sign‑ins, altered or incomplete myCampus pages, and delayed access to Office/Microsoft services. Common triggers included off‑network password changes, cached credentials or password managers, delayed propagation between Okta/Azure AD and downstream services, out‑of‑sync account stores (including accounts still mapped to prior emails or handles), and loss of two‑factor authentication preventing self‑service resets.

Solution

Support first verified which user identifier each service required (student handle, institutional email, or service‑specific username) and which credential store the service validated; in several cases the root cause was an account mapping or migration mismatch (for example myCampus still mapped to a prior email), and reissuing a password reset for the correct handle resolved access. Okta-initiated password resets restored Okta dashboard and SSO access and often restored Microsoft/Outlook for newly provisioned devices; launching apps from the Okta dashboard or using app URLs with a session_hint re-established SSO sessions in many cases. When downstream services remained inaccessible, support either waited for password propagation (some Atlassian/Jira accounts regained access the next day) or re‑synchronized the downstream account; Atlassian issues were also resolved by selecting a password that met Atlassian’s complexity/policy and re‑synchronizing the account. Where SSO tiles or apps failed to redirect to a password‑set flow, administrators reset both the Okta account and the downstream service account so the service redirected and allowed a new password (Salesforce example). CARE‑specific accounts required triggering an EPOS reset and confirming the user completed the password set via EPOS so the change persisted. Jamf Connect failures were logged as unsuccessful password‑sync attempts returning “Password Expired., Status: 400.” Managed laptops that rejected newly set passwords while offline were resolved by issuing an administrator‑initiated Okta password reset link (Service Portal), delivering the new credentials, and then either forcing a local Windows password change (which triggered sync to Microsoft/Azure AD and Okta) or restoring network connectivity (for example VPN) and signing in with the new password to re‑establish Teams and email. When users lacked two‑factor authentication and could not use self‑service reset, support issued administrator reset links; after the user changed the Okta password, entering the new password into the Jamf authentication prompt re‑synchronized device credentials. Delayed or undelivered password‑reset emails were handled by verifying delivery paths, reissuing reset links, and sending reset information to users’ private email addresses; adding a secondary/private email in Workday prevented later delivery failures. Support identified cached credentials in password managers and on old devices (including 1Password); after users removed or updated saved credentials, seamless sign‑in was restored. Transient self‑service reset errors returning “password reset is not possible” were resolved by retrying the self‑service reset or completing a reissued reset link sent to a private email.

7. macOS restart/login loop resolved by resetting the local account password in Recovery
89% confidence
Problem Pattern

Local macOS sign‑in failed when the expected password was rejected despite the local account existing. Symptoms included login/restart or initial setup loops where a provisioned one‑time password no longer worked after restart, Recovery or FileVault unlock prompts at startup, network‑login screens without Wi‑Fi, or generic “no access” reports; repeated failed attempts sometimes produced account lockouts. Incidents often followed Jamf Connect syncs, Identity Provider password changes (Okta/Microsoft), or multiple incorrect attempts.

Solution

Technicians primarily restored access by resetting the local macOS account password in Recovery, which recreated a usable local credential and cleared account lockouts. Recovery resets used the device recovery key from Jamf or the Safe Portal, or a Safe Portal one‑time code sent to the user’s verified alternate email. In several cases technicians performed an IdP (Okta/Microsoft) password reset first and communicated the new password to the user’s private email before completing a Recovery reset. For newly provisioned Macs where the initial one‑time provisioning password appeared to stop working after restart, administrators noted that reissuing a provisioning OTP for MacBooks was not straightforward; instead, technicians sometimes emailed the user clear sign‑in instructions or sent a Safe Portal one‑time code to the user’s verified alternate email, after which the user completed sign‑in and setup. For first‑time IdP sign‑ins and FileVault unlocks technicians confirmed Wi‑Fi availability at the network login prompt and corrected the keyboard/input source when special characters had been entered incorrectly; after those checks users completed sign‑in. When domain‑qualified usernames were rejected, signing in with the short local username often succeeded. In recurring cases where a Recovery‑created password was accepted only briefly, technicians reconfirmed the reset and set a simpler password (avoiding complex special characters), which persisted. Some incidents resolved after a transient cached‑password lockout period of roughly one to a few hours without Recovery‑key use. After restoring local access technicians completed post‑access tasks such as granting admin privileges and assigning required software licenses (for example, Adobe Complete). Several resolves referenced the internal Confluence procedure for changing a local password in macOS Recovery.

8. Service-account temporary password delivered via Safe-Link (safe.app)
95% confidence
Problem Pattern

Users were unable to access service account credentials or service mailboxes: they reported failed logins (often with no specific error) or found passwords in password managers that did not match the account. Some requesters needed mailbox access to read messages or add the address as an Outlook contact but did not know the account creator or owner. Affected systems included service accounts used for automation/shared access and Exchange/Office 365 service mailboxes.

Solution

Support resolved these incidents by either providing a temporary credential after a password reset or by identifying the mailbox owner and directing the requester to that owner. When a password reset was required, support reset the service account password and delivered a temporary credential via safe.app’s ShowSecret one‑time Safe‑Link or provided the temporary password directly; recipients used the one‑time link or temporary password to sign in, were prompted to change the password at login, and then set a new permanent password. For Exchange/Office 365 service mailboxes, support also checked mailbox ownership and full‑access permissions and supplied the identified mailbox owner/contact (or notified them) when credential sharing was inappropriate or the requester only needed mailbox access.

9. jamf Connect blocked by Okta 'password expired' state despite Okta web access
92% confidence
Problem Pattern

Managed macOS authentication agents rejected valid cloud credentials or blocked sign‑in after cloud or directory password changes, producing persistent dialogs such as “Your Okta password does not match the password of your local account” or “Incorrect network username or password,” recurring authentication prompts (often ~15‑minute cadence), and missing biometric/fingerprint options. IdP token endpoints sometimes returned HTTP 400 responses (examples: Okta “Password has expired.”, OAuth sign‑on‑policy denials, Azure AD AADSTS50126). Affected components included macOS, Jamf Connect/Connector, Okta, Azure AD/Microsoft Online, and on‑premises Active Directory; symptoms commonly included local passwords becoming out of sync with IdP credentials and inability to access services tied to the IdP.

Solution

Three root causes and their observed resolutions explained the incidents. 1) On‑premises Active Directory expired‑password state: Accounts showed expired‑password attributes; after AD attributes were adjusted (for example enabling an account’s “Password never expires” flag) authentication agents accepted the account once directory state propagated (observed propagation time ~10 minutes). 2) Identity provider (IdP) password expiry or reset: Token endpoints that returned HTTP 400 responses (examples: Okta “Password has expired.”, OAuth sign‑on‑policy denials, Azure AD AADSTS50126) stopped denying authentication after the user completed the IdP web password change or reset. Where the Mac’s local account had become unsynchronized with the updated cloud password, access was restored when the local and cloud credential states were reconciled — examples observed included the user signing into macOS with the existing local password and then using the management/authentication client’s password‑sync or re‑authentication flow (Jamf Connect) to reconcile credentials, or support staff coordinating a simultaneous password change on the Mac and in Okta to align both accounts. When the cloud password was reset remotely, successful reconciliation required the Mac to reach corporate authentication infrastructure (on‑campus or via VPN) so new credentials could be synchronized. 3) Client session or authentication state errors: Stale or disconnected client sessions caused repeated prompts or credential rejections despite valid cloud passwords; re‑authenticating the user session via the client (for example Jamf Connect’s menu‑bar sign‑in) cleared the stale session and stopped recurring dialogs. A subset of these incidents produced token‑endpoint 400 sign‑on‑policy denials that were resolved either after completing the provider’s web password flow or after establishing a fresh client session. Additional operational notes observed across cases: Jamf Connector/Connect occasionally failed to synchronize a changed password, and remote support or remote‑session interventions sometimes left the Mac in an inconsistent state that was resolved by coordinating changes to both the IdP and the local account. Collectively, expired AD password flags, IdP password‑expiry or sign‑on‑policy denials, and stale client/session state explained the observed token errors, local password mismatches, missing biometric sign‑in, and recurring authentication prompts.

10. Administrator-initiated password reset for user unable to log in
95% confidence
Problem Pattern

Users were unable to sign in to Okta, Okta‑federated services (Microsoft 365, Teams, PowerApps), Windows/Windows365, VPN, network drives, exam/instructor portals, or Atlassian portals because self‑service password flows failed or accounts were expired/locked. Symptoms included reset‑link loops, provider rate limits, account‑lookup failures (e.g. “We couldn't find an account with this username”), persistent login or MFA loops, expired passwords, or silent authentication failures after an initial success. Affected identities included Okta cloud users, AD‑synced accounts, external/instructor/service accounts, and accounts missing recovery factors or having multiple/conflicting identities. Some Azure/Entra accounts showed the system message “password can only be changed by Global Admins,” preventing user‑initiated resets.

Solution

Support restored access primarily by performing administrator‑initiated password resets from the Okta Admin Console or by using each service’s native reset flow where integrations were absent. When self‑service flows failed (reset‑link loops, provider rate limits, account‑lookup errors, expired passwords or persistent login/MFA loops), staff issued admin resets or temporary credentials and triggered automated reset notifications to the account’s registered primary and any alternate addresses; resend/spam checks and temporary‑password expiries were recorded. For Azure/Entra accounts that displayed “password can only be changed by Global Admins,” requests were escalated to Global Admins who performed the reset. Missing accounts or mailboxes were imported or recreated in Okta and contact addresses updated before issuing reset links or one‑time credentials. Generated credentials for managed service accounts and LAPS‑managed local admin passwords were recorded in approved secrets storage (1Password, safe‑app) and delivered through those vaults or other documented secure channels (SafeLink for network drives, approved external addresses, or Teams when authorized).

When downstream integrations reported credential errors after a password change, staff coordinated updating stored service credentials and revalidating federations; federated applications were launched from the Okta dashboard to confirm federation, and app‑level signing or permission errors were escalated with captured correlation IDs and error details. Locked, disabled, or on‑prem AD accounts were unlocked and AD passwords reset directly while leaving Azure AD unchanged when appropriate. For problematic MFA states or missing recovery factors, staff cleared or reset MFA state and issued admin resets so users could reconfigure authentication, supplying temporary verification codes where required. For device sign‑in, users applied new credentials by signing into the device locally or over VPN so Windows sign‑in picked up updated credentials.

When stronger identity assurance was required or no alternate address existed, staff accepted forwarded external email evidence or performed live identity‑verification calls before handing credentials. License status (including A1 licenses) and expiries were checked and adjusted when requested. Recurring or intermittent failures were resolved by performing resets and opening follow‑up investigations with the user to identify causes such as credential caching, federation/sync issues, multiple/conflicting identities, device keychain mismatches, or stored credentials in downstream integrations. Microsoft PowerApps/Microsoft PWA issues were handled by sending tenant‑specific password‑reset emails or demonstrating manual password creation when automatic generators produced non‑standard strings, escalating to specialists when manual passwords still failed.

Source Tickets (1232)
11. Third‑party app login failures when using institutional email instead of app username
95% confidence
Problem Pattern

Users could not sign in to third‑party applications because the identifier entered or authentication route did not match the application’s expected username format or identity provider. Symptoms included explicit “username or password incorrect” errors, login loops returning users to the sign‑in prompt after a password change, inability to start password recovery when the app‑specific username was unknown, missing or rejected reset emails, and access failures from using test/non‑production URLs. Common triggers were using an institutional email instead of an app‑specific/local username (including .ext variants), launching via the wrong SSO/identity provider or portal, multiple institutional accounts, vendor provisioning or activation delays, and vendor‑managed external accounts.

Solution

Incidents were resolved by ensuring the account identifier and authentication path matched each application’s expected username format and identity provider and by correcting inconsistent stored account records. Technicians restored or corrected stored login names (for example re‑adding stripped @iu.org domains, fixing punctuation differences such as dot vs hyphen, and applying external markers like “.ext” to the local part) and signed users in with the application‑specific/local username when appropriate (for example firstname.lastname, an app short username, or username.ext). When applications shared an authoritative credential store, technicians confirmed the canonical source (for example myCampus and CARE shared the same password database) and performed resets at the authoritative system rather than duplicating resets. Login‑loop cases where a password change still returned users to the login prompt were resolved by confirming the correct SSO instance or vendor portal and by performing provider‑specific resets when CARE/EPOS or other services used a different identity flow than myCampus. Password‑reset failures caused by rate limits or time‑locks were resolved by allowing lock expiry or by performing administrator/provider resets and supplying temporary first‑login passwords when available. Missing or rejected reset emails were investigated by confirming the authoritative provider and contact address and by resending from that system. Failures from saved or autofilled credentials were resolved by locating, restoring, or creating correct entries in enterprise password managers (for example 1Password), clearing or updating saved browser credentials, and disabling browser autofill when it supplied outdated identifiers. Post‑login stale UI content was cleared by removing browser cache and cookies or performing a hard refresh. Support investigated vendor provisioning and activation windows and provisioned or reactivated accounts when appropriate; live assisted troubleshooting (for example via Microsoft Teams) was used to gather screenshots and determine account existence. For accounts not managed by internal IT, support confirmed ownership and referred users to the responsible vendor or campus office (for example advising contact with the vendor’s service desk or with the exam office for PebblePad at pruefungsamt-fernstudium@iu.org) and closed the ticket after the user confirmed external support resolved the issue. Ambiguous login UIs were removed or clarified. Student or study‑portal cases were routed to the Study‑Support‑Team, vendor or product‑owner integration issues were escalated to the people‑products team, and inconsistent canonical identifiers were escalated to specialist teams to correct authoritative usernames and confirm successful sign‑in.

12. Browser prompting for Windows/OS password to reveal saved credentials
90% confidence
Problem Pattern

User reported a browser prompt requesting a password when attempting to view stored passwords in the browser. The prompt lacked error codes and the user did not know which password to provide; the issue involved saved-passwords in the browser on a Windows notebook with Okta-based sign-in.

Solution

The support team explained that the browser's prompt was a built-in security measure that requires the user's local Windows account password to display stored credentials. The user supplied their normal Windows/Notebook login password (which matched their Okta password on devices where sign-in used Okta) and was then able to view the saved passwords.

Source Tickets (1)
13. Initial myCampus password creation rejected by password policy
90% confidence
Problem Pattern

Users were unable to create or change passwords due to service password policies across systems. Symptoms included rejected or failed password-creation or reset submissions in myCampus (sometimes silent failures or an explicit 'please contact the Helpdesk' message), loss of previously saved password prefill during reset flows, and Salesforce password-change failures returning 'You cannot reuse this old password' when the submitted new password matched the current password. Failures affected initial registration, employee resets, and blocked authentication or delivery of reset emails.

Solution

Access failures were resolved either by users completing the self-service 'Forgot password'/password-reset flow or by support generating and sending a manual password-reset email. In some myCampus cases support reviewed and corrected user attributes in the account record before issuing the reset. A recurring symptom in the myCampus flow was loss of previously saved password prefill, which required users to create a new password. After receiving a reset email, users created passwords that met the myCampus service policy (minimum 8 characters, at least one uppercase letter, one lowercase letter, one digit, and one special character) and access was restored. In a Salesforce case support confirmed the error message meant the submitted new password matched the existing password (password-reuse blocked) and advised the user to choose a different new password; no system-side fix was required and some users elected to continue using the assigned password.

14. Microsoft 365 A1 license prevents desktop Office editing after password reset on macOS
90% confidence
Problem Pattern

User-reset Office/Microsoft 365 password allowed sign-in on macOS, but Office desktop apps on an iMac showed an error that editing was not allowed (documents were view-only and editable only in the browser). The user could sign in but could not edit documents on the desktop; mobile editing was impractical.

Solution

Support reset the user's Microsoft 365 password and delivered the reset details to the user's alternate (private) email; the user was then able to sign in. Editing remained disabled on the iMac because the account was assigned an A1 (web-only) license that does not include full desktop Office editing. Support explained the A1 license limitation and advised that a license with desktop Office rights would be required to enable editing in the macOS Office apps.

Source Tickets (1)
15. Windows accounts subject to frequent password expiration notices
95% confidence
Problem Pattern

Users received recurring password-expiration warnings or forced password-change prompts on an approximately three-month rotation. Notices originated from multiple authentication systems (IU Windows accounts, Microsoft platform accounts, and Okta) and in some incidents caused authentication failures such as VPN connection denials; users were often unsure which account triggered the prompts.

Solution

Multiple incidents of recurring password-expiration prompts were traced to different authentication systems and resolved by clearing expiration flags or changing platform password-expiration policies. For IU Windows accounts, an administrator cleared the password-expiration flag on affected accounts (noted 2024-04-22) and the organization-wide Windows password policy was changed to mark accounts as 'password never expires' on 2024-06-19, which stopped the Windows expiration notices. Separate incidents where notifications originated from Microsoft platform accounts were resolved when users changed the associated Microsoft account passwords. In incidents that caused VPN authentication failures, support identified Okta password expiration as the cause; the Okta policy was changed on 2024-06-19 to remove mandatory periodic password expiration for non-administrative users, after which forced three-month password changes and related VPN denials ceased. Support also observed that IU Windows account passwords were rotating on roughly a three-month cycle, which matched some reported timing of prompts.

Source Tickets (3)
16. Miro Enterprise login and password-reset failures due to server-side authentication error
72% confidence
Problem Pattern

Users were suddenly unable to sign in or create passwords on enterprise web apps and applicant portals that relied on central authentication or backend integrations. Symptoms included immediate 'Bad Request' or other server-error pages at login or during 'Forgot password' flows, explicit authorization errors such as 'There has been an error authorising your LIBF account. Please contact customerservices@libf.ac.uk', rejected passwords at sign-in, and self-service reset pages that blocked with messages requiring IT intervention. Affected systems included Miro Enterprise, Atlassian/Jira, Keycloak- or Salesforce-connected portals, Azure AD B2C / OpenID Connect flows, Okta SSO, and other external SaaS integrations.

Solution

Incidents were resolved by repairing or restoring server-side authentication services and fixing faulty integrations between web frontends and backend identity or customer-maintenance systems. Transient provider outages cleared when the external provider restored service and users regained access. Configuration- or integration-related failures were fixed when specialist teams corrected authentication/service configuration or integration code and deployed changes to production. Several incidents traced to backend data-handling or database errors (for example Oracle ORA-01400: cannot insert NULL into WEB_USER_DETAIL_HISTORY.USER_ID during MyLIBF login) and were resolved by repairing the integration and ensuring required fields were populated. Support restored access in some cases by issuing functioning password-reset links or by directing users to SSO entry points (for example Okta) that bypassed broken manual-reset flows. For Miro password-reset blocks the support team recommended signing in via SSO or providing live assistance as a workaround. For LIBF/Azure AD B2C OpenID Connect errors helpdesk checks included account verification and advising a password reset; helpdesk sometimes requested a full screenshot including the browser URL for further diagnosis, and some tickets remained unresolved when users did not respond.

17. New macOS device failed to authenticate to IU mail due to mistyped password
91% confidence
Problem Pattern

Users were unable to sign in to institutional web or integrated services from a specific device or browser while the same credentials worked on other devices. Sign-in attempts produced generic failures such as “wrong username/password entered” with no specific error codes; some environments initially showed no log activity and later recorded failed login attempts. Affected clients included macOS devices (Apple Mail via Okta, web logins in Chrome on MacBook), Redmine via LDAP/myCampus binding, and Microsoft accounts on notebooks. Local input issues (for example a changed keyboard layout, active caps lock, or other input-method state) were implicated in some device‑specific failures.

Solution

Support verified that affected services and integrations were functioning and that the same credentials authenticated successfully from other devices. Logs were reviewed; some environments showed no initial activity then recorded failed login attempts. Failures were primarily traced to credential mismatches: many users had mistyped or supplied an out‑of‑date password and access was restored once the correct password was entered. Several accounts required a password reset (for example a reset link delivered to the user’s private email); after the reset those devices and accounts authenticated normally. In at least one case the problem was isolated to a MacBook using Chrome and support noted the device’s keyboard layout or input state (for example a changed layout causing different symbol positions or active caps lock) as a likely contributor, though that ticket lacked a documented confirmation of the specific fix. No client, LDAP binding, or service configuration changes were required to resolve these incidents.

18. Okta authentication succeeded but downstream course/role entitlements missing for Infocenter access
90% confidence
Problem Pattern

Users reported successful Okta SSO authentication (including after a password reset) but received access-denied or no booking/course information when opening Infocenter/myCampus. Symptoms included a STUDY_INFO_NO_ACCESS error (sometimes with JSON id/ac5Id details in Edge/IE) or generic “access denied” in other browsers. Affected systems included Okta SSO, myCampus/Infocenter, and the course-management system (LCC)/course booking services.

Solution

Okta authentication was confirmed to be functioning (password resets and SSO logins succeeded). Investigation found that missing course or lecturer role assignments in the course-management system (LCC) — surfaced as missing booking information or the STUDY_INFO_NO_ACCESS error (Edge/IE sometimes showed JSON id/ac5Id details while other browsers showed a generic “access denied”) — caused the Infocenter/myCampus listings to be empty. Restoring the user’s course/booking assignments or lecturer roles in the course-management system (LCC / myCampus booking data) restored Infocenter visibility. Instances where password-reset emails were not received were incidental when the user later authenticated successfully; no Okta configuration changes were required.

19. Restrict Azure AD Self‑Service Password Reset (SSPR) scope to student group
95% confidence
Problem Pattern

Self‑Service Password Reset (SSPR) was enabled tenant‑wide in Azure AD (scope set to "All"), so employees had SSPR availability even though the service should have been limited to students. Affected systems included Azure AD Password Reset settings in the Azure Portal; no error messages were shown.

Solution

The Azure AD Password Reset properties were changed from scope = "All" to scope = "Specific group" and the Students group was selected using the Azure Portal Password Reset blade (https://portal.azure.com/#view/Microsoft_AAD_IAM/PasswordResetMenuBlade/~/Properties). The change was approved by Boehlk, Oliver and Akmal, Asif and implemented by Hirschfeld, Maximilian on 2025-08-20. After the change, SSPR remained enabled for Students only.

Source Tickets (1)
20. iPhone repeatedly prompts for Apple ID password when Apple ID owner/credentials are unknown
90% confidence
Problem Pattern

Managed iPhones and MacBooks repeatedly prompted for iCloud/Apple ID sign-in or displayed an Apple ID lock for an Apple ID whose owner or password was unknown to the device user. Affected users reported blocked App Store downloads/updates, apps refusing to open, inability to change system settings (for example date/time), loss of iCloud functionality, or inability to sign in to macOS because the Apple ID was locked. Account-recovery via iforgot.apple.com sometimes showed recovery contact information belonging to third parties, displayed Apple-assigned temporary emails (…@temporary.appleaccount.com), or provided no usable recovery address. Enterprise password resets (for example via Okta) did not always clear Apple ID locks on devices.

Solution

Support located the Apple ID/email displayed on the device and attempted account-recovery through iforgot.apple.com, verifying any recovery phone numbers and recovery emails that Apple reported. In multiple cases recovery failed because Apple showed incorrect or third-party recovery contacts, required confirmation to an Apple-assigned temporary email (…@temporary.appleaccount.com), or there was no preconfigured Apple ID email available; support verified messages referencing temporary.appleaccount.com as legitimate where necessary. For MacBook incidents where the Apple ID was locked, enterprise password resets (for example via Okta) did not restore device access; those cases required Apple’s Mac login account-recovery flow and retrieval/use of the personal Recovery Key to unlock the Apple account. IT confirmed it could not access or reset Apple IDs owned by third parties. Incidents were resolved when users located the Apple ID password in internal documentation or obtained it from the person who created the Apple ID and signed in; where the account owner or password could not be obtained, the device user created and used a new Apple ID/iCloud account on the device. Tickets were closed after successful sign-in or after 14 days with no response.

21. 1Password sign-in blocked by missing Secret Key after device change
90% confidence
Problem Pattern

Users were unable to sign in to their 1Password account because the account required the Secret Key which they did not have (commonly after a device change) and they did not have the emergency kit. Sign-in and vault-unlock attempts failed and account-recovery attempts could produce errors or fail to complete, leaving access unavailable until support or admin intervention.

Solution

Support resolved these incidents by initiating and completing the 1Password account recovery process on the user's behalf. Support sent the 1Password recovery email flow to the user's recovery address; in some cases the initial recovery email produced an error and support resent the recovery email. The user completed the recovery steps provided in the recovery email, after which support confirmed the account recovery and restored access to the 1Password account.

22. 1Password account recovery for forgotten master password
94% confidence
Problem Pattern

Users were unable to sign in to or unlock 1Password after forgetting or losing their master password, losing a stored master password in the macOS Keychain (for example after Group Policy changes or a local account password reset), being unable to use SSO/Okta credentials, or experiencing MFA/biometric unlock failures. Symptoms included inability to unlock vaults, sign-in errors on new devices, web change-password flows that completed email confirmation but redirected to a recovery/help page (or indicated contact admin), inaccessible UI elements required for self-service recovery, and confusion from multiple associated email addresses.

Solution

Support resolved account-access issues by initiating the account-type–appropriate recovery or reset flow and completing any required administrative confirmations. For Okta/SSO-managed accounts support coordinated with Okta administrators to reset passwords or accounts and sent reset messages to the account’s registered addresses; during verification support checked whether MFA (including biometric factors) was configured and performed explicit MFA resets only when required. For standalone 1Password accounts support initiated the 1Password account-recovery workflow which generated recovery emails; when the web recovery flow required administrator confirmation support finalized the recovery so the user could set a new master password. Support initiated recoveries on users’ behalf when self-service UI elements (for example the People/sidebar) were inaccessible, when users reported sign-in errors after resetting a master password (including on new laptops), or when web change-password flows completed email confirmation but redirected to a help/recovery page or instructed the user to contact an administrator. Support documented that possession of an Emergency Kit did not permit vault unlock without the correct master password, that multiple associated email addresses sometimes required separate resets or recovery messages, and that deletion of a stored master password (for example a macOS Keychain removed after Group Policy or local account password changes) caused users to lose access and require IT-assisted recovery. All communications and recovery confirmations were routed via the account’s registered email and occurred alongside Okta/SSO verification as applicable.

23. Chrome Password Manager flagged MyCampus test account as compromised due to common/weak password
90% confidence
Problem Pattern

Users saw Chrome Password Manager display a "compromised password" warning when signing into MyCampus/Learning Hub test accounts. The browser flagged no error codes beyond the compromised-password alert and blocked or warned on credentials that used common or simple passwords. Affected systems included Chrome Password Manager, MyCampus, and Learning Hub; the issue was reported for test account usernames using predictable passwords.

Solution

Investigators confirmed the Chrome warning was caused by the account password appearing in breached-password databases; the test password "Welcome01!" matched entries commonly marked as compromised. The problem was resolved by changing the test account password to a stronger, unique password and by advising use of institutional guidance on creating complex passwords. The Chrome compromised-password warning was therefore expected behavior from the browser's password manager rather than an authentication or service-side error.

Source Tickets (1)
24. Password reset requested with delivery to user-provided private email
95% confidence
Problem Pattern

Users across roles were unable to sign in to institutional services (Okta/Azure AD SSO, Microsoft 365, IU Mail, MyCampus, Windows sign‑in, VPN, Workday and linked apps) because passwords were forgotten, expired, locked, missing, or accounts were inactive. Many affected accounts used private/external recovery or contact emails (gmail, yahoo, icloud, etc.), causing password‑set/reset messages or verification links to be delivered off‑site, blocked, or not received, and contact emails sometimes mismatched institutional records. Reported symptoms included failed logins and account lockouts, Windows desktop sign‑in failures while mobile clients remained signed in, unexpected MFA prompts or inability to complete MFA after device loss/theft, client errors such as “Anmelden nicht möglich,” reset links not arriving or bouncing, and mail bounces when private senders were blocked.

Solution

Support restored access by initiating password resets and dispatching password‑set/reset links through institutional identity systems (commonly Okta and Azure AD/Microsoft 365), sending messages to the contact address on the user profile (institutional and/or user‑provided private addresses) and, when necessary, to both. Technicians checked account activity and audit logs to confirm password‑set events and last interactive logins when users reported reset‑link failures and advised users when logs showed successful resets but sign‑in still failed (for example when the new password was not saved or entered). When reset messages were not received or addresses were stale, staff corrected incorrect contact addresses (including legacy entries), re‑triggered or resent reset messages (occasionally repeatedly), and reenabled or restored self‑service “forgot password” where applicable. Additional actions included issuing Okta tokens/password‑set links, generating temporary/initial credentials for new hires (noting provisioning sometimes sent password‑set emails to private addresses on start dates), importing accounts into Okta, contacting users at their private addresses to assist with resets, and completing resets on behalf of users in time‑sensitive situations. Support recorded delivery evidence or explicit user confirmation before closing tickets and noted occasional duplicate messages or inadvertent resets while correcting contact information. Operational context observed in tickets included Okta automation and termination‑date behavior that affected when reset emails were routed to external addresses, conditional‑access and corporate‑network requirements (for example VPN) that needed to be satisfied during a reset, and client‑specific problems where some mail or client apps refused the new credentials (for example Outlook and Apple Mail errors). In cases involving applicants or students, requests that were misrouted to the employee portal were redirected or closed after staff advised the requester to contact IU Student Support (techsupport@iu.org) because those accounts and recovery flows were managed by student support; staff noted instances where phone loss/theft prevented MFA completion and required alternate student‑support handling. These combined actions restored access to Okta, Office 365 (Outlook, Teams), Windows laptop sign‑in, VPN, Workday, IU Mail, Outlook mobile/desktop and linked third‑party services; MyCampus sometimes used a separate credential store and was not affected by Okta password resets.

Source Tickets (201)
25. Departmental application password resets handled via SharePoint access request form
91% confidence
Problem Pattern

Users were unable to sign in to departmental or third‑party applications: symptoms included valid credentials being rejected with no Okta/application error details, account lockouts or “password locked” statuses, password‑reset or password‑creation emails not being received, and immediate post‑change sign‑in failures. Some applications used separate or unsynchronized credentials across production/staging environments or invitation‑based accounts without usable passwords; SSO‑protected services (for example Workday) sometimes required distinct API/service credentials that did not match the Okta SSO password. Confusion also arose when background/service accounts had no interactive credentials.

Solution

Support first determined whether each affected application and environment (production, staging/test, or third‑party) was administered by central IT or by a departmental/third‑party owner. When ownership lay outside central IT, users were referred to the application’s documented access/password request channel (for example a SharePoint access/password form, the IU Meldeportal, or the application owner’s Jira/Atlassian service desk) and to the listed application owner; such tickets were closed as wrong department when appropriate. When central IT located the user account in an external system and had credential‑reset capability (examples included CARE systems, academyFIVE/Campus Management, and Atlassian), staff performed password resets or account updates, provided new credentials or reset links, and confirmed successful sign‑in. For invitation‑based third‑party SaaS accounts, support advised a password reset when an invited user lacked usable credentials and, where admin access allowed, offered account deletion and re‑invitation to recreate usable credentials; follow‑up indicated this resolved the reported access issues. For multi‑environment applications, staging/test environments often used separate accounts or experienced delayed synchronization; sign‑in failures to a staging environment were resolved by obtaining environment‑specific credentials from the application owner or by resetting the account in that environment when central IT had access. Brief propagation delays (approximately five minutes) explained some immediate post‑change failures. Support clarified cases where an application was implemented as a background/service system: some user roles did not have interactive accounts and were expected to use a user‑facing portal (for example myCampus), so users were referred accordingly. Support noted that several academic/exam tools (Examity, Turnitin, PebblePad, Atlas, Bongo) were managed exclusively by the Prüfungsamt and referred users to pruefungsamt-fernstudium@iu.org for account/password assistance; PebblePad password‑reset/email delivery issues were handled by the Prüfungsamt. TEAQ/Sitefusion account lock/unlock requests were directed to TEAQ support at cfe-teaq@iu.org. For Workday, sign‑in often used Okta SSO while Workday API or standalone Workday credentials were separate from the Okta password; support did not perform Workday API credential resets and instead advised contacting the Workday interface/support team (WCC) at wd-support@iu.org or the listed Workday contact for API/Workday credential requests. Where SharePoint pages listed a responsible person for an application, support referred users to that contact (for example the Index SharePoint entry listed Luca Robel).

26. macOS system updates blocked by lack of local admin rights (resolved via IU Self Service App Minion)
90% confidence
Problem Pattern

User requested a macOS account password reset because they believed they could not run system updates. The user reported no explicit error messages but lacked the elevated/local admin privileges required to install system updates on the Mac (IU Self Service App/Minion involved).

Solution

The problem was resolved by using the IU Self Service App (the "yellow Minion") to grant temporary local administrator privileges. The user authenticated with their normal account password when prompted by the Minion and then installed the system updates; the Minion reported the updates succeeded.

Source Tickets (1)
27. Forgot‑password email not delivered for Workday/Care; admin reset restored access
80% confidence
Problem Pattern

Users could not sign in to Care and sometimes connected systems (Workday, Salesforce) after password changes or when using the 'Forgot password' flow. Symptoms included reset emails not being generated or delivered, and reset attempts failing during processing (errors after submitting a new password). Affected accounts commonly used the user's IU email address as the Care username, causing sign-ins with other identifiers to fail.

Solution

Support confirmed affected Care accounts commonly used the user's IU email address as the account username and retried sign-in with the user; in some cases instructing the user to sign in with their IU email and their new password restored access. Multiple incidents involved failures in the Care self-service reset flow: the system either did not generate or deliver reset emails, or returned an error during processing after the user submitted a new password. Technicians performed administrative password resets and, where applicable, created accounts and provided the correct IU-email username; those administrative resets restored access to Care and to connected systems such as Workday and Salesforce. Administrators noted Care's self-service reset was unreliable for some users and recommended using alternate IU password-reset channels (myCampus or EPOS) when available.

Source Tickets (3)
28. Intermittent Okta sign-in denials and forced password resets associated with travel or third‑party VPNs and risk‑based flags
60% confidence
Problem Pattern

User accounts intermittently failed to authenticate to Okta when signing in from different geographic locations or while using third‑party VPNs. Symptoms included repeated “invalid credential” events in Okta logs, Microsoft Identity marking the account as "risky," forced password-reset prompts or failed password changes (rejected by password policy), and subsequent loss of access to downstream services (myCampus, virtual classroom). Users suspected geoblocking, but Okta logs showed no explicit geoblock or account‑block events.

Solution

Support investigated Okta and Sentinel logs, confirmed repeated invalid‑credential sign‑ins from varying IPs consistent with travel and third‑party VPN use, and verified Microsoft Identity had classified the account as "risky." Okta logs did not show geoblock or an Okta account block entry; a later attempted password change failed because the new password did not meet the institution's password policy. No single configuration change or definitive root‑cause was identified and no confirmed fix was applied in this ticket. Support documented remediation options for downstream teams, including administratively resetting the account password and clearing the Microsoft risk state, coordinating with security to review Conditional Access/risk policies and known IP allowlists, and working with the user to reduce use of third‑party VPNs during authentication windows. These investigation findings and suggested mitigations were recorded for follow up by the identity/security team.

Source Tickets (1)
29. Unable to change password immediately after initial Windows sign‑in due to permission denial
90% confidence
Problem Pattern

User attempted to change their password immediately after the initial Windows sign‑in but received a permission denied error when using Windows Settings. The failure occurred on a managed Windows device during the first log‑in sequence and the user reported being unable to locate the correct procedure to complete the initial password change. No error codes beyond a permissions denial were recorded.

Solution

The technician directed the user to the institution's onboarding documentation that described the prescribed procedure for changing the password after first log‑in. After the user followed the onboarding steps referenced in Microsoft Teams, the password change completed successfully and the permission denied symptom did not recur.

Source Tickets (1)
30. Application/service account password reset that required Global Admin and was delivered via Password Safe
90% confidence
Problem Pattern

A service/application account (.PWA) could not be self‑reset by the user because the self‑service flow required Global Admin privileges or another elevated role. The user reported unable to perform the password reset; no specific error codes were provided and normal user-level reset options were unavailable.

Solution

Support generated a new password for the affected .PWA account and stored/delivered the credential through the organisation's Password Safe so the user could reclaim access. The action restored access without modifying application configuration or requiring further tenant changes.

Source Tickets (1)
31. Expired shared third‑party account (Turnitin) where local staff lacked reset rights
85% confidence
Problem Pattern

Shared institutional Turnitin accounts were inaccessible due to expired or changed passwords causing login failures. Self-service password reset attempts failed because the mailbox for the shared account was not accessible or password‑reset emails did not arrive or were not visible in service systems (e.g., Salesforce). Local support lacked administrative access to Turnitin account management and could not perform technical resets. Affected systems included Turnitin and institutional mailboxes used by examination offices, impacting thesis and examination workflows.

Solution

Support confirmed they did not have administrative access to Turnitin account management for shared institutional accounts (examples included turnitin-cs@iubh.de and pruefungsamt-fernstudium@iu.org) and therefore did not perform any technical password resets. In the reported cases, self-service password reset attempts could not be completed because the shared mailbox was not accessible and no password‑reset emails were received or visible in Salesforce. Requesters were referred to the central examinations office (zpa-dualesstudium@iu.org) or the original account owner who had created the Turnitin account; no internal credential changes were made by IT.

Source Tickets (2)
32. Intermittent on-site domain logon failures while remote logon succeeded
60% confidence
Problem Pattern

A user’s corporate domain password worked when signing in from home but intermittently failed on the office network with the error message 'Password is not valid' after logout/restart. Temporary passwords sometimes allowed sign‑in only to fail again on subsequent logouts; the failure occurred repeatedly and primarily on the office network.

Solution

Support provided temporary passwords to the user's private email; the user was able to sign in sporadically with those temporary credentials but the problem recurred after subsequent logouts. Support advised connecting via VPN and changing the corporate password as troubleshooting measures; no permanent resolution was documented in the ticket.

Source Tickets (1)
33. LAPS UI not available on Windows 11 multi-session Jump Servers; admin reset used
90% confidence
Problem Pattern

Request to enable Local Administrator Password Solution (LAPS) UI on a Jump Server running Windows 11 multi-session failed because LAPS features were unavailable. The requester also needed a user account password reset for an account on that server. Affected systems included the Jump Server, Windows 11 multi-session, and LAPS management tools; the user reported inability to use LAPS and required immediate credential access.

Solution

The user's account password was reset by an administrator to restore access. Enabling the LAPS UI on that Jump Server was not completed because Microsoft LAPS is not supported on Windows 11 multi-session; the requester was informed and no configuration changes to enable LAPS were possible.

Source Tickets (1)
34. Migration of user credentials into enterprise 1Password vault
90% confidence
Problem Pattern

User requested credentials be moved into the organization's 1Password password manager for central storage and compliance. No error messages or authentication failures were reported; the task was a manual transfer of existing passwords into the corporate vault. Systems noted: 1Password and Atlassian documentation/Jira Service Desk for migration guidance.

Solution

Credentials were migrated into the company's 1Password vault following the organization's documented procedure. Password entries were created/stored in 1Password and the migration was performed in line with the internal documentation and knowledge article (links recorded in the ticket). The request was completed and the ticket was closed.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X