How to Fix Sign-in Error Code AADSTS530032
Guest User Blocked Due to Risk in their Home Tenant
Your account is blocked. We’ve detected suspicious activity on your account. Sorry, the organization you are trying to access restricts at risk-users.
This error occurs when a risky B2B guest user tries to sign in to a Microsoft 365 tenant that enforces risk-based Conditional Access policies. During the sign-in process, the user’s risk status from their home tenant is evaluated, and since they are already flagged as risky, the external tenant blocked the login.
When Conditional Access identifies a user as risky and blocks their sign-in, admins can analyze the failure through the Microsoft Entra sign-in logs.
The unsuccessful attempt is recorded in both the user’s home tenant and the external tenant the user tried to access. This allows admins in both tenants to review and investigate the authentication failure.
License Requirement
Microsoft Entra ID P1 license
Role Requirement
Report Reader
Open the Sign-in events page in the Microsoft Entra admin center.
Apply the following filters to locate sign-ins related to risky guest users in Microsoft 365:
Sign-in error code: 530032
Username: Enter the guest user’s UPN.
Date: By default, this filter is set to show sign-in activity for the past 24 hours. You can also customize it to the past 7 days or 1 month as needed.
Conditional Access: Failure
Review failed sign-in details for the risky guest user. You can also customize fields and apply additional filters to refine the report and display only relevant sign-in events.
Admins can resolve this error by resetting the user’s password in their home tenant. This action moves the user from a risky state to a secure state.
Go to the Microsoft 365 admin center.
Then, navigate to the Users » Active Users.
Select the affected user and choose the Reset Password option.
Choose the Automatically create a password option to generate a temporary password.
You must also select the Require this user to change their password when they first sign-in option to ensure users change their passwords.
Provide the temporary credentials to the user by emailing them to their personal email account.
This process helps resolve the user’s risk and returns their credentials to a secure state. Additionally, when SSPR isn’t available or the user isn’t registered for it, this method helps restore secure access.
If the risky user account is compromised, promptly secure the Microsoft 365 account to mitigate potential risks or unauthorized activities.
First investigate the risk, and if the user is confirmed to be legitimate, you can dismiss the risk state to resolve the issue and restore the account’s normal status. To dismiss the risk state:
Go to the Microsoft Entra Admin Center.
Navigate to the ID Protection » Risky Users.
Select the affected user, click Dismiss user risk, and then choose Yes in the confirmation prompt to confirm.
This method doesn’t reset the existing password, so the user’s identity isn’t fully restored to a secure state. It’s recommended to contact the user, notify them of the detected risk, and advise them to change their password to strengthen account security.
If you're the resource tenant admin and suspect a misconfiguration in your Conditional Access (CA) policies, you can investigate using the Conditional Access What If tool. This tool helps identify which CA policies affected a specific sign-in in real-time.
Go to the Microsoft Entra Admin Center.
Navigate to Entra ID » Conditional Access » Policies » What If.
On the What If page, select the user or service principal you want to test. You can only test one user or service principal at a time.
Guest users are blocked if they trigger user risk-based CA policies that require a password reset, since they can’t reset passwords in the resource tenant.
Guest users don’t appear in the resource tenant’s risky user reports because risk evaluation occurs in their home tenant.
Resource tenant admins can’t dismiss or remediate risky B2B users as they don’t have access to the guest’s home tenant.
If your organization has Self-Service Password Reset (SSPR) enabled, you can reset your password by following these steps:
Go to the Microsoft 365 Password Reset Portal.
Enter your User Principal Name (UPN) and complete the captcha.
Follow the on-screen instructions to verify your identity and set a new password.
Once your password has been reset, try signing in again.
Resetting the password helps resolve any risks associated with your account and allows you to regain access to the external tenant. If the issue continues after these steps, contact your administrator for further assistance.
AdminDroid provides precise insights into guest user sign-ins, guest user activities, risk detection, risk assessments, and more to ensure clean and well-governed Microsoft 365 external access.
Gain highly detailed insights into M365 guest sign-ins with rich context such as sign-in time, user details, accessed apps, location, etc.
Get granular guest user reports, including activities, mailbox permission summaries, and more, for easy troubleshooting.
Reset user passwords directly from AdminDroid 365 to quickly address security issues and maintain compliance.
Use 360° Explorer to monitor a specific guest user, including licensing details, group memberships, Teams memberships, and more.
With intelligent insights on guest user behavior, external sharing, & risky sign-in attempts, AdminDroid helps you spot threats early.
We’re here to help! If these solutions don’t resolve your issue, share your concerns in the discussion forum, and we’ll assist to the best of our ability. However, if none of the solutions work, you may need to contact Microsoft Support for further assistance.