Here’s the comprehensive solution addressing all three focus areas:
1. Azure AD Conditional Access - Policy Refinement:
The root cause is your conditional access policy enforcing 4-hour re-authentication for all Power Platform services, including the notification delivery service. You need to create a tiered policy approach:
a) Identify the Power Platform service principals in Azure AD:
- Power Apps: 4be51a28-d7a9-4576-b5c8-9d72d8d5e5f0
- Power Automate: 7df0a125-d3be-4c96-aa54-591f83ff541c
- Power Platform Notification Service: check your tenant’s enterprise apps
b) Create a new conditional access policy specifically for mobile approval workflows:
- Name: “Power Apps Mobile - Approval Notifications”
- Users: Include approval groups
- Cloud apps: Select Power Apps and Power Automate
- Conditions: Device platforms = iOS and Android
- Grant: Require MFA on first sign-in, then allow 8-hour session
- Session: Sign-in frequency = 8 hours (not 4)
c) Exclude the notification service principal from strict re-authentication:
- In your main conditional access policy, add exclusion for service principals
- This allows the notification service to maintain persistent tokens
- Users still authenticate with MFA, but background services can push notifications
2. Mobile Notification Delivery - Service Configuration:
Optimize your Power Apps mobile notification configuration:
a) Verify notification connection settings in Power Apps:
- Navigate to your mobile app → Settings → Notifications
- Ensure “Push notifications” is enabled
- Verify the connection uses a service account, not individual user credentials
b) Configure Power Automate approval flow for optimal delivery:
- Use “Send push notification v2” action (supports better retry logic)
- Set priority to “High” for approval notifications
- Add recipient’s mobile device ID explicitly (don’t rely on user lookup)
- Enable “Require acknowledgment” to track delivery
c) Implement notification fallback strategy:
- If push notification fails, send email notification after 5 minutes
- Send SMS notification after 15 minutes (for critical approvals)
- Log all notification attempts to tracking table
d) Test notification delivery:
- Use Azure Application Insights to monitor notification service calls
- Check for 401 authentication errors in the logs
- Verify token refresh is succeeding for the service principal
3. Approval Workflow SLA - Compliance Assurance:
Ensure your approval workflows meet SLA requirements despite authentication constraints:
a) Implement SLA monitoring and escalation:
- Add parallel branch that waits 1 hour after approval request
- If no response, send escalation notification to approver’s manager
- If no response after 3 hours, send urgent notification via multiple channels
- Auto-approve low-value requests if SLA breach imminent (with audit log)
b) Optimize workflow for mobile approvers:
- Add “Quick Actions” in notification that allow approve/reject without opening app
- Use adaptive cards in notifications with embedded approve/reject buttons
- This reduces dependency on app authentication for simple approvals
c) Configure device compliance requirements appropriately:
- If requiring managed devices, ensure approvers’ phones are enrolled in Intune
- For BYOD scenarios, use app protection policies instead of full device compliance
- This reduces authentication friction while maintaining security
d) Monitor and report SLA performance:
- Create Power BI dashboard tracking notification delivery time
- Alert if average delivery time exceeds 5 minutes
- Track approval response time by approver (identify bottlenecks)
- Report SLA breach rate to stakeholders weekly
Immediate Actions:
- Contact your Azure AD admin to implement the tiered conditional access policy today
- Extend token lifetime for Power Apps mobile from 4 hours to 8 hours as interim fix
- Add email notification fallback to your approval flows (takes 30 minutes to implement)
- Test notification delivery after policy changes with a pilot approver group
Long-term Recommendations:
- Consider implementing Intune app protection policies for better security without notification impact
- Use Azure AD Privileged Identity Management for high-value approvals requiring stronger authentication
- Implement approval delegation feature so approvers can assign backups during unavailability
- Regular review of conditional access policies to ensure they don’t conflict with business processes
The key is balancing security requirements with operational needs. The 4-hour re-authentication policy is too strict for approval workflows with tight SLAs. Extending to 8 hours and excluding notification services from the strictest policies will restore notification delivery while maintaining security compliance.