Comments on: Teams Processing Causes Problems for Disabled Azure AD User Accounts https://practical365.com/disable-azure-ad-accounts-teams/ Practical Office 365 News, Tips, and Tutorials Sat, 15 Apr 2023 19:37:11 +0000 hourly 1 https://wordpress.org/?v=6.3.2 By: Tony Redmond https://practical365.com/disable-azure-ad-accounts-teams/#comment-246528 Tue, 08 Nov 2022 15:31:32 +0000 https://practical365.com/?p=51206#comment-246528 In reply to Andy.

Report the problem to Microsoft. The more formal reports that go in via support, the quicker engineering will fix the issue.

]]>
By: Andy https://practical365.com/disable-azure-ad-accounts-teams/#comment-246527 Tue, 08 Nov 2022 15:28:07 +0000 https://practical365.com/?p=51206#comment-246527 18 months later and this still seems to be an issue with something not catching up to the status change properly.

]]>
By: Eric Weintraub https://practical365.com/disable-azure-ad-accounts-teams/#comment-234446 Wed, 28 Apr 2021 11:17:49 +0000 https://practical365.com/?p=51206#comment-234446 Solid write up Tony, these kind of reverse engineering explorations are key to being effective as a modern Microsoft IT Administrator these days. Its a shame these processes arent better documented by Microsoft directly. IT Admins can manage just about anything but being an IT Admin in modern times is like tight rope walking blindfolded. Put another way, they shouldn’t call it the cloud, they should call it the “fog”.

]]>
By: Tony Redmond https://practical365.com/disable-azure-ad-accounts-teams/#comment-234427 Tue, 27 Apr 2021 11:07:02 +0000 https://practical365.com/?p=51206#comment-234427 In reply to Quinten365.

Good point!

]]>
By: Quinten365 https://practical365.com/disable-azure-ad-accounts-teams/#comment-234424 Tue, 27 Apr 2021 08:39:16 +0000 https://practical365.com/?p=51206#comment-234424 This reminds me of an additional annoyance.
I use custom app policies for distributing Teams Apps to a set of users to test and fiddle with them before they get deployed to all users.

When a user is assigned this custom policy, and then this user is disabled, the user can no longer be found in the Teams admin center, yet the policy is still assigned to that user.
This makes it so that you are unable to delete that custom / temporary policy until the user is enabled.
Then the user is visible in Teams admin and an be removed from the policy whereafter you can remove the policy.

not major blocking or anything, just something annoying I stumbled uppon once.

]]>
By: Tony Redmond https://practical365.com/disable-azure-ad-accounts-teams/#comment-234353 Wed, 21 Apr 2021 13:45:27 +0000 https://practical365.com/?p=51206#comment-234353 In reply to McSmartypants.

Good suggestion. One issue is that if an account is then unblocked, the user will be forced to change their password. Not a biggie.

]]>
By: McSmartypants https://practical365.com/disable-azure-ad-accounts-teams/#comment-234351 Wed, 21 Apr 2021 13:24:09 +0000 https://practical365.com/?p=51206#comment-234351 Quick’n’dirty workaround: set users password to a random string and tick “User cannot change password”? This will leave the account open, block sign-ins and leave everything else intact.

]]>
By: Andreas https://practical365.com/disable-azure-ad-accounts-teams/#comment-234349 Wed, 21 Apr 2021 13:07:03 +0000 https://practical365.com/?p=51206#comment-234349 Oh, that’s a big yikes!

]]>