Accessing Microsoft Teams using organizational or personal credentials
Hi @Thomas Buczkowski (Cloud),
Good day, and I appreciate the way you clearly presented your concern.
From your description, you shared that one specific user who is already signed in to your organization’s Microsoft Teams is prompted to sign in again when joining an external organization’s Teams meeting, and the sign in attempt fails.
This type of behavior can occur when the authentication tokens or cached credentials stored on your device become outdated or misaligned with your active session. As this issue appears to be isolated to your account rather than affecting the wider organization, it is most likely related to a user-specific configuration on the device itself. In some cases, a conflict between stored sign-in data and the external tenant's authentication request can cause the process to loop or fail entirely.
To address this, please follow the steps below in order and test after completing each one to confirm whether the issue has been resolved.
1/ Clear the Microsoft teams application & credentials cache
Clearing the Teams cache removes outdated temporary files that may be interfering with the sign-in process.
In Windows Credential Manager:
- Open Credential Manager > Windows Credentials
- Remove any entries referencing msteams, microsoftteams, or office
Clear Teams app cache:
- Fully quit Teams
- On Microsoft:
- Press Windows + R, then type:
%userprofile%\appdata\local\Packages\MSTeams_8wekyb3d8bbwe\LocalCache\Microsoft\MSTeams - On Mac: Press Command + Q, type:
rm -rf ~/Library/Group Containers/[UBF8T346G9.com.microsoft]teams
rm -rf ~/Library/Containers/com.microsoft.teams2
- Delete the contents of: Cache, blob_storage, databases, GPUCache, IndexedDB, Local Storage, tmp
- Relaunch Teams and sign in fresh
- Reference: Clear the Teams client cache - Microsoft Teams | Microsoft Learn
2/ Check for token/account conflicts
Even if no additional accounts appear in the Teams UI, there may be stale tokens elsewhere:
- Open Windows Settings > Accounts > Access work or school to check for duplicate or ghost entries and remove any that shouldn't be there
- Check AAD tokens via dsregcmd /status in Command Prompt and look at the SSO State and Tenant Details sections for anomalies
- If the device shows as both Workplace Joined and Azure AD Joined, that can cause auth loops
- Reference: Why am I having trouble signing in to Microsoft Teams? - Microsoft Support
3/ Test by joining via the Teams web application
- As a next step, please open a new InPrivate or Incognito window in your browser and navigate to teams.microsoft.com.
- Sign in using your work account and attempt to join the external meeting from there.
- If this works successfully, it confirms that the issue is specific to the desktop application and that clearing the cache as outlined in Step 1 should address it going forward.
4/ Run the Microsoft teams sign-in diagnostic
- If the steps above do not resolve the issue, Microsoft provides a built-in diagnostic tool that can automatically check for account-level sign-in problems and suggest a course of action.
- Please go through this link, as running the diagnostic requires access to the Microsoft 365 Admin Center.
- Reference: Fix Teams sign-in errors - Microsoft Teams | Microsoft Learn
Since the problem is user-specific and not device-wide:
- In Entra ID (Azure AD) > Sign-in logs, filter by that user and look for failed sign-in attempts with error codes. This will tell you if Conditional Access is blocking them
- Check if the user is in any CA policies that others aren't (e.g., MFA requirements, compliant device policies, location restrictions)
- Also check External Access / Guest Access settings though these typically apply org-wide, confirm the user isn't excluded from any permission groups that allow federated access
5/ Teams external access policy
Verify the user hasn't been inadvertently assigned a custom Teams policy:
Connect to Teams PowerShell module Connect-MicrosoftTeams
Check what policy is assigned to the affected user
Get-CsOnlineUser -Identity ******@yourdomain.com | Select ExternalAccessPolicy, TeamsUpgradePolicy
Compare the output against a working user. If the affected user has a different or custom policy assigned, that's your issue.
I hope the information I shared earlier was somewhat helpful in addressing your issue. If you have any further questions or updates, please don’t hesitate to share. I’m always happy to assist further if needed.
Thank you for your patience and your understanding. I look forward to continuing the conversation.
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have any extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.