Showing results for 
Search instead for 
Did you mean: 
Regular Visitor

MFA and Invalid Connection in Flow



I have a tenant in which MFA has been activated for all users. I have created a user to run all my flows, but the flows breaks after a while and the only message i see is "Invalid connection". I assume this is because of MFA. Are there anyway to handle this or do i have to disable MFA for that specific user ?


Accepted Solutions

This solution should work for customers that use Microsoft Flow and service accounts for running the flow:


I still need feedback from Microsoft around a solution that will work for end-users.


/Peter Selch Dahl

View solution in original post

Community Support
Community Support

Hi @Bjarke,


I’m afraid that it might be caused by MFA authentication.

Please suggest your user try to refresh their connections to see if it will work.

There is a similar issue on this thread, Staff @TravisB has some suggestion on it. Please check it for more details:

Best regards,
Mabel Mao

Community Support Team _ Mabel Mao
If this post helps, then please consider Accept it as the solution to help the other members find it more quickly.

This solution should work for customers that use Microsoft Flow and service accounts for running the flow:


I still need feedback from Microsoft around a solution that will work for end-users.


/Peter Selch Dahl

Peter's answer was the fix we needed to bypass Azure Conditional Access(MFA) in order to keep Flows running. In case anyone needs the Flow IPs formatted for MFA exceptions, here is the US list formatted and sorted. This is for the Logic App Service IP List from Peter's Flow Limits and Configuration link.



- Dan

Smiley Very Happy Great to hear that it resolved your issue. I know that Microsoft is aware of the issue and that this solution is not the best in the world. I gets the job done for now 🙂

Only works if you have Azure AD premium though, otherwise you can't add a policy.

Another solution would be to support app passwords?

Hi all,


Is this issue still current? If so, do we know if Microsoft is planning to solve this issue?


Thanks in advance for any insights.






Hi Peter - thanks for this post. Are you aware of any negative security consequences that could arise from bypassing MFA in this fashion?

I'd take a guess that generally speaking it's never good practice to "bypass" security. So this is not a great workaround. Understandable if absolutely required to continue using Flows that are running key business processes/applications etc.

Hi Lucas - I would say the problem is still current unless you pay up for the expanded Azure rights so allow conditional access.

I reduced the issue on my end by increasing the reprompt issue from 2 days to the maximum allowed. Not an ideal sitation by any means.

Yes. This is in no way best practice from a security point of view. The workaround would allow potential hackers to execute code or task using Microsoft Flow without requiring to prove their identity using two factor authentication. I would also recommend using this solution as a last resort. I hope that Microsoft will find a solution for this issue. Many other Microsoft services are also strungling with delegated credentials / doing stuff on behalf of users as most of these require passive authentication flows. 



Thank you!


It helped me to solve my problem!


Addresses for EU:



Just a quick follow up, is this issue resolved with Microsoft?

What is the solution?

Helpful resources

Microsoft 365 Conference – December 6-8, 2022

Microsoft 365 Conference – December 6-8, 2022

Join us in Las Vegas to experience community, incredible learning opportunities, and connections that will help grow skills, know-how, and more.

Difinity Conference 2022

Difinity Conference 2022

Register today for two amazing days of learning, featuring intensive learning sessions across multiple tracks, led by engaging and dynamic experts.

European SharePoint Conference

European SharePoint Conference

The European SharePoint Conference returns live and in-person November 28-December 1 with 4 Microsoft Keynotes, 9 Tutorials, and 120 Sessions.

Users online (1,778)