Microsoft 365 login loop

Last Updated: March 2026

A Microsoft 365 authentication loop is one of the more frustrating issues IT professionals encounter. Users enter their credentials, successfully authenticate, and then are immediately redirected back to the login screen again. This cycle repeats indefinitely, preventing access to services such as Outlook, SharePoint, Teams, or the Microsoft 365 portal.

In many environments the issue appears sporadically — working fine for some users while completely blocking others. Even worse, the problem can persist across different browsers and devices, making it difficult to isolate.

From real-world experience supporting enterprise environments, authentication loops usually stem from a token validation failure, conditional access misconfiguration, corrupted cached credentials, or browser session conflicts.

In this guide, we’ll break down:

  • The most common causes of Microsoft 365 login loops
  • How to quickly identify the root cause
  • Real-world troubleshooting steps used by IT administrators
  • Preventative measures to stop the issue from recurring

This guide is designed for IT administrators, system engineers, and support professionals who need a practical approach to diagnosing and resolving Microsoft 365 authentication issues.


Quick Fix Summary

If users are stuck in a Microsoft 365 login loop, try these quick fixes first:

  • Clear browser cookies and cached authentication tokens
  • Sign out of all Microsoft accounts in the browser
  • Disable or review Conditional Access policies
  • Remove stored Windows Credential Manager entries
  • Verify Azure AD session settings and token lifetimes

If the issue persists, continue with the troubleshooting steps below.


Step-by-Step Troubleshooting Guide

1. Clear Browser Cookies and Authentication Tokens

The most common cause of authentication loops is stale or corrupted authentication cookies.

Microsoft 365 relies heavily on browser-based authentication tokens. If these become invalid or expire incorrectly, the authentication service keeps redirecting the user to login.

Steps

  1. Open the affected browser.
  2. Navigate to browser settings.
  3. Clear:
    • Cookies
    • Cached files
    • Site data
  4. Close the browser completely.
  5. Reopen and attempt login again.

Real-World Tip

From experience, simply clearing cookies may not be enough. Users often have multiple Microsoft accounts cached in the same browser session, especially when switching between personal and corporate accounts.

In these cases, using a private browsing session can confirm whether the issue is cookie-related.


2. Test Using an InPrivate or Incognito Session

Before digging deeper, test authentication in a private browsing window.

This bypasses:

  • Existing cookies
  • Cached authentication tokens
  • Stored sessions

Steps

  • Chrome: Ctrl + Shift + N
  • Edge: Ctrl + Shift + N
  • Firefox: Ctrl + Shift + P

If authentication works in private mode, the problem is almost certainly browser cache or cookie related.


3. Check Azure AD Conditional Access Policies

Conditional Access policies are a frequent cause of authentication loops.

A misconfigured policy can cause:

  • Session validation failures
  • MFA enforcement loops
  • Device compliance failures

Where to Check

Navigate to:

Microsoft Entra Admin Center

Microsoft Entra ID
→ Security
→ Conditional Access

Look for Policies That:

  • Require device compliance
  • Require Hybrid Azure AD Join
  • Enforce location-based access rules
  • Require multiple MFA checks

Real-World Scenario

In one enterprise deployment, users were stuck in a login loop because a policy required Intune compliant devices, but the devices were not properly registered.

The login would succeed, but access tokens were immediately rejected, causing another authentication attempt.


4. Remove Stored Credentials from Windows Credential Manager

Windows can store outdated authentication tokens that interfere with Microsoft 365 authentication.

Steps

  1. Open Control Panel
  2. Navigate to:
Credential Manager
  1. Select Windows Credentials
  2. Remove entries related to:
  • Microsoft Office
  • Microsoft 365
  • Outlook
  • Azure AD

Restart the device and try logging in again.


5. Verify Azure AD Sign-In Logs

Azure AD sign-in logs are extremely useful when diagnosing authentication loops.

Location

Microsoft Entra Admin Center
→ Monitoring
→ Sign-in logs

Look For

  • Repeated login attempts
  • Conditional access failures
  • Token validation errors
  • Device compliance issues

Common Errors

Typical messages include:

  • “Device not compliant”
  • “Session token invalid”
  • “Conditional access policy blocked access”

These logs usually pinpoint the root cause within minutes.


6. Check Multi-Factor Authentication Configuration

Misconfigured MFA policies can cause authentication loops.

Examples include:

  • MFA required twice
  • Conflicting Conditional Access rules
  • Third-party MFA integrations failing

Troubleshooting Steps

  • Temporarily disable MFA for the user
  • Test authentication
  • Re-enable MFA after confirming login works

If the loop stops, the issue likely involves MFA enforcement policies.


7. Verify Device Registration Status

Some organizations enforce policies requiring devices to be:

  • Azure AD joined
  • Hybrid Azure AD joined
  • Intune compliant

If the device does not meet these requirements, authentication can succeed but access is denied, creating a loop.

Check Device Status

Run the following command on the affected computer:

dsregcmd /status

Look for:

AzureAdJoined : YES
DomainJoined : YES
DeviceAuthStatus : SUCCESS

If these values are incorrect, the device may need to be re-registered with Azure AD.


Additional Troubleshooting Tips

Test Another Browser

Sometimes browser extensions interfere with authentication.

Common offenders include:

  • Ad blockers
  • Privacy extensions
  • Script blockers

Testing with Microsoft Edge or Chrome without extensions can quickly identify the issue.


Check Time Synchronisation

Authentication tokens rely on accurate timestamps.

If the workstation clock is out by several minutes, authentication may fail repeatedly.

Run:

w32tm /resync

Flush DNS

Although rare, DNS resolution issues can also disrupt Microsoft authentication endpoints.

ipconfig /flushdns

FAQ

Why does Microsoft 365 keep asking me to sign in repeatedly?

This usually occurs when authentication tokens cannot be validated. The most common causes include corrupted cookies, conditional access policy conflicts, or device compliance failures.


Can Conditional Access policies cause login loops?

Yes. Incorrectly configured Conditional Access policies can repeatedly block session validation, forcing the user to authenticate again.


Does clearing browser cookies fix Microsoft 365 login loops?

In many cases yes. Microsoft authentication relies heavily on browser cookies and tokens. Clearing them often resolves the issue.


Can device compliance policies cause authentication loops?

Yes. If a policy requires the device to be Intune compliant or Azure AD joined, authentication may succeed but access tokens are rejected.


How do I check Microsoft 365 authentication errors?

Use Azure AD Sign-In Logs in the Microsoft Entra Admin Center. These logs provide detailed information about authentication failures and policy enforcement.


Conclusion

Microsoft 365 authentication loops are typically caused by session token failures, browser cache conflicts, conditional access misconfigurations, or device compliance issues. While the symptoms can appear complex, the root cause is usually identifiable through a structured troubleshooting process.

From real-world experience managing enterprise Microsoft 365 environments, the fastest way to isolate the problem is:

  1. Test with a private browser session
  2. Review Azure AD sign-in logs
  3. Check Conditional Access policies
  4. Validate device compliance status

By following these steps, most authentication loops can be resolved quickly without requiring major configuration changes.

This guide reflects the latest Microsoft Entra ID authentication behaviour and Microsoft 365 security policies as of 2026.

Leave a Reply

Your email address will not be published. Required fields are marked *