web
You’re offline. This is a read only version of the page.
close
Skip to main content

Announcements

News and Announcements icon
Community site session details

Community site session details

Session Id :
Power Platform Community / Forums / Power Apps / Dataverse Plugin - Pow...
Power Apps
Unanswered

Dataverse Plugin - Power Platform Managed Identity ADSTS100033

(2) ShareShare
ReportReport
Posted on by 11
During some testing today we were suddenly getting intermittent errors (which is getting worse and worse) when calling IMangedIdentityService.AcquireToken in a dataverse plugin. Any way we can turn off Regional Cache?
Microsoft.Identity.Client.MsalServiceException: AADSTS100033: Regional Cache Auth Service token requests for flows that needs CA policy evaluation are forbidden
I have the same question (0)
  • Jon Unzueta Profile Picture
    1,834 Super User 2026 Season 1 on at

    You're encountering the error:

    AADSTS100033: Regional Cache Auth Service token requests for flows that need CA (Conditional Access) policy evaluation are forbidden
    

    This is a known issue when using Managed Identity in a Dataverse plugin (or other Azure services) with regional token acquisition enabled. Here's what’s going on and how to address it:


    🧠 What’s causing this?

    When using IMangedIdentityService.AcquireToken, the Microsoft Authentication Library (MSAL) may attempt to use a regional Azure AD endpoint to acquire tokens. However, regional endpoints currently do not support flows that require Conditional Access (CA) evaluation, which is why you're seeing this error.


     How to fix it: Disable Regional Token Acquisition

    You can disable the use of regional endpoints by not setting or removing the environment variable:

    AZURE_REGIONAL_AUTHORITY_NAME

    If this variable is set (e.g., to westeurope, eastus, etc.), MSAL will try to use the regional endpoint, which leads to the error when CA policies are involved.

    🔧 To disable it:

    • In your plugin or app configuration, ensure AZURE_REGIONAL_AUTHORITY_NAME is not set.
    • If you're using Azure Functions or App Services, check the Application Settings in the Azure Portal and remove this variable if present.

    🛠️ Additional Tips

    • If you're using DefaultAzureCredential or similar in .NET, it may automatically pick up this variable from the environment.
    • If you must use regional endpoints for performance or compliance reasons, you’ll need to avoid flows that require CA evaluation, which may not be feasible in most enterprise environments.

    📌 Summary

    • Error cause: Regional AAD endpoints don’t support CA policy evaluation.
    • Fix: Remove or avoid setting AZURE_REGIONAL_AUTHORITY_NAME.
    • Alternative: Use global AAD endpoints (default behavior when the variable is unset).

    Would you like help checking where this variable might be set in your environment or modifying your plugin code to avoid this behavior?

    🏷️ Tag me if you have any further questions or if the issue persists.
    ✅ Click "Accept as Solution" if my post helped resolve your issue—it helps others facing similar problems.
    ❤️ Give it a Like if you found the approach useful in any way.
     
  • CI-24070005-0 Profile Picture
    11 on at
    @Jon Unzueta This is dataverse plugin not a Azure Functions or App Services so we can't set this AZURE_REGIONAL_AUTHORITY_NAME hence the question!

Under review

Thank you for your reply! To ensure a great experience for everyone, your content is awaiting approval by our Community Managers. Please check back later.

Helpful resources

Quick Links

Introducing the 2026 Season 1 community Super Users

Congratulations to our 2026 Super Users!

Kudos to our 2025 Community Spotlight Honorees

Congratulations to our 2025 community superstars!

Congratulations to the March Top 10 Community Leaders!

These are the community rock stars!

Leaderboard > Power Apps

#1
11manish Profile Picture

11manish 536

#2
WarrenBelz Profile Picture

WarrenBelz 426 Most Valuable Professional

#3
Haque Profile Picture

Haque 305

Last 30 days Overall leaderboard