Description Task type
Other
Description
What to look for in logs (MI + WIF/FIC)
What to request from customers (MSAL logs, env info, correlation IDs)
Key log markers to recognize:
MI: identity not assigned, endpoint unreachable, forbidden/unauthorized, invalid_request
WIF/FIC: issuer/subject/audience mismatch, wrong tenant/app, OIDC discovery issues
“Log reading” checklist for support
Common issues seen by engineering (MI + WIF/FIC)
MI: identity not assigned, wrong identity selected, IMDS blocked, network restrictions, wrong resource/audience, RBAC propagation delays
WIF/FIC: issuer mismatch, subject mismatch, audience mismatch, wrong tenant/app registration, missing/incorrect OIDC issuer setup, clock skew (if applicable)
Build a quick mapping: Symptom → Likely Cause → First 3 Checks
Known limitations / gotchas (support-facing)
Frequently misunderstood constraints
Edge cases where fallback behavior confuses customers
Escalation criteria: when to route to product/engineering
Solution
No response
Reactions are currently unavailable
You can’t perform that action at this time.
Task type
Other
Description
What to look for in logs (MI + WIF/FIC)
Common issues seen by engineering (MI + WIF/FIC)
Solution
No response