
If your team is getting hammered with Microsoft 365 sign-in prompts in Outlook, Teams, OneDrive, Word/Excel, or even the browser—over and over again—you’re not alone. These loops don’t just annoy users; they kill productivity, interrupt meetings, and can even trigger risky “I’ll just approve it” behaviour.
This guide explains why the loop occurs, what users can safely try first, what IT should check next, and how to prevent it from recurring.
Quick definition: Most “nonstop sign-in prompts” are either (1) a session/token problem, (2) a cached credential/account conflict, or (3) a Conditional Access/session policy forcing reauthentication.
Microsoft 365 authentication is largely based on OAuth/OIDC sessions and tokens that get refreshed behind the scenes—until something breaks the chain (expired tokens, revoked sessions, policy changes, corrupted cookies, etc.). Microsoft documents how refresh tokens behave and why they may be renewed or invalidated. (Microsoft Learn)
When the chain breaks, apps fall back to:
“Sign in again.”
…and if the underlying cause remains, you get stuck in a loop.
If your org uses Microsoft Entra ID Conditional Access, settings like Sign-in frequency, persistent browser session, and related session controls can force more frequent reauthentication—and in misaligned configurations, it can feel like “never ending prompts.” Microsoft’s session controls overview explains Sign-in frequency and how it affects Microsoft 365 apps and web sessions. (Microsoft Learn)
Microsoft also warns that forcing users to sign in too often can backfire (users get conditioned to enter credentials into prompts without thinking). (Microsoft Learn)
A corrupted cookie jar, privacy extensions, or strict tracking prevention can repeatedly “forget” your session.
Using the same email for personal Microsoft accounts and work accounts—or mixing them in the same browser profile—often causes confusion, especially with account pickers.
Old entries in Windows Credential Manager, cached Office auth data, or a partially broken Windows work account connection can keep re-triggering prompts.
Some Outlook configurations can override normal auth behavior (and keep prompting).
If IT revokes sessions or refresh tokens due to a security event, password reset, device compliance change, or policy update, users will be forced to sign in again. Refresh token behavior is documented in Microsoft’s identity platform guidance. (Microsoft Learn)
These steps are designed to avoid breaking anything while eliminating the most common client-side causes.
Open an Incognito/InPrivate window
Sign into Microsoft 365 (portal/Outlook on the web)
If it works normally, your main browser profile likely has cookie/extension issues
Then in your normal browser:
Clear cookies/cache for Microsoft sign-in domains (or clear all cookies if acceptable)
Disable extensions temporarily (especially privacy/ad blockers and script blockers)
Re-test
Sign out of Microsoft 365 in the browser
Sign out of Teams/Outlook/OneDrive apps
Close apps completely (including system tray icons)
Restart the device
Sign back in only with the work account (avoid mixing accounts in the same session)
Update Office apps
Update your browser
Install OS updates
If you’re on Windows and stuck in a loop:
Remove stale Microsoft/Office entries from Credential Manager
Confirm the correct Work/School account is connected in Windows Accounts settings
Re-launch Teams/Outlook and sign in again

Two settings regularly cause re-auth spam:
Sign-in frequency (too short, applied too broadly, or conflicting with app behavior)
Session lifetime / session restrictions that don’t match device state or app modality
Microsoft’s guidance covers how Sign-in frequency works and how it interacts with Microsoft 365 apps and device identity. (Microsoft Learn)
Practical tip: If the loop affects only certain users, locations, device states (compliant vs noncompliant), or only browser vs desktop apps—start by mapping it to a Conditional Access policy scope.
On Windows, primary refresh tokens and modern auth components influence whether apps can silently reauthenticate. Microsoft’s session lifetime guidance discusses PRT refresh behavior and sign-in frequency interactions on Entra joined/hybrid devices. (Microsoft Learn)
If users started looping right after:
password reset
device compliance change
security incident response actions
policy rollout
…you may be seeing expected behavior (reauth required) amplified by client cache issues. Microsoft’s refresh token documentation is the best authoritative reference for how these tokens behave over time and under revocation. (Microsoft Learn)
If you’re supporting multiple endpoints or want repeatable diagnostics, Microsoft’s Support and Recovery Assistant (SaRA) (Enterprise version) is designed to automate a number of Microsoft 365 troubleshooting scenarios. (Microsoft Learn)
Use it when:
Outlook keeps prompting
Office activation seems stuck
Teams auth loops on a specific device
You need consistent troubleshooting across many users

Use separate browser profiles for work vs personal Microsoft accounts
Keep browsers/Office updated
Minimize extensions and avoid “aggressive privacy” add-ons on work profiles
Report repeated prompts early (don’t “approve” blindly)
Avoid setting Sign-in frequency too short for broad populations
Test Conditional Access policy changes with a pilot group
Align device compliance policies with the apps that users actually rely on
Use identity controls that reduce prompts without weakening security
Microsoft explicitly notes that over-frequent sign-ins can be counterproductive and explains the default approach and revocation triggers. (Microsoft Learn)
Repeated sign-in prompts often look like a simple annoyance, but the underlying fix usually touches identity, device posture, session controls, and endpoint configuration. That’s exactly where an MSP can remove the guesswork: identify the cause quickly and implement a stable, secure resolution.
Here are relevant CapitalTek resources you can link internally from this blog:
Microsoft 365 services: Microsoft 365 Setup and Implementation Services
Identity controls: Identity & Access Management
Ongoing support: Dedicated IT Support
Book help: Contact CapitalTek
Note on domain: capitaltek.ca redirects to capitaltek.com, so the internal links above use the live canonical pages on capitaltek.com. (CapitalTek)
