You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/azure/general/cannot-see-users-groups-list-iam.md
+6-24Lines changed: 6 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
---
2
2
title: Can't see list of users/groups to add permissions in IAM in Azure portal
3
3
description: Resolves an issue in which you can't see list of users or groups when adding permissions in Access Control (IAM) in the Azure portal.
4
-
ms.date: 08/14/2020
4
+
ms.date: 06/05/2025
5
5
ms.service: azure-common-issues-support
6
-
ms.custom: has-azure-ad-ps-ref
6
+
ms.custom: no-azure-ad-ps-ref
7
7
ms.author: genli
8
8
author: genlin
9
9
ms.reviewer:
@@ -37,31 +37,13 @@ To resolve this issue, use one of the following methods:
37
37
38
38
### Method 2: To allow only the one guest user or configure on a per user basis
39
39
40
-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../support/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
41
-
42
-
1. Open Windows PowerShell.
43
-
2. Run the following cmdlet:
44
-
45
-
```powershell
46
-
Import-Module AzureAd
47
-
```
48
-
49
-
Make sure that the Azure Active Directory PowerShell for Graph is installed. For more information, see [Azure Active Directory PowerShell for Graph](/powershell/azure/active-directory/install-adv2?view=azureadps-2.0&preserve-view=true).
50
-
51
-
3. As a global administrator of the directory where the guest user was added, connect to Azure AD PowerShell and the directory:
40
+
1. Make sure that the [Microsoft Graph PowerShell is installed](/powershell/microsoftgraph/installation).
41
+
1. Use the `Connect-MgGraph` command to sign in with the required scopes. For more information, see [Get started with the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
42
+
1. Run the [Update-MgUser](/powershell/module/microsoft.graph.users/update-mguser) cmdlet:
52
43
53
44
```powershell
54
-
Connect-AzureAD -TenantId 'Tenant_Directory_Id'
45
+
Update-MgUser -UserId '0ba17ca9-0000-0000-0000-a5e34bc4803b' -UserType Member
55
46
```
56
-
57
-
You can get the Tennat ID by looking at your Microsoft Entra ID Properties in the Azure portal.
58
-
59
-
4. Run the following cmdlet:
60
-
61
-
```powershell
62
-
Set-AzureADUser -ObjectId 'User_Object_Id' -UserType Member
63
-
```
64
-
65
47
You can get the users Object ID by looking at the Users Profile page within the Azure portal.
66
48
67
49
[!INCLUDE [Azure Help Support](../../includes/azure-help-support.md)]
@@ -246,9 +246,7 @@ Before attempting to delete a group in Microsoft Entra ID, ensure you have [dele
246
246
247
247
### Delete a group<aid="21"></a>
248
248
249
-
1. Groups can be deleted from the directory [using the Remove-AzureADGroup cmdlet in the Azure AD PowerShell module](/azure/active-directory/users-groups-roles/groups-settings-v2-cmdlets#delete-groups).
250
-
251
-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../support/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
249
+
1. Groups can be deleted from the directory [using the `Remove-MgGroup` cmdlet in the Microsoft Graph PowerShell](/powershell/module/microsoft.graph.groups/remove-mggroup).
252
250
253
251
1. Before attempting to delete a group in Microsoft Entra ID, ensure you have [deleted all assigned licenses to avoid errors](/azure/active-directory/users-groups-roles/licensing-group-advanced#deleting-a-group-with-an-assigned-license).
# Can't manage or remove objects that were synchronized through the Azure Active Directory Sync tool
10
10
@@ -34,24 +34,23 @@ This issue may occur if one or more of the following conditions are true:
34
34
35
35
You want to manage objects in Office 365, Azure, or Intune and you no longer want to use directory synchronization.
36
36
37
-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../support/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
38
-
39
-
1. If you're not running Windows 10, install the 64-bit version of the Microsoft Online Services Sign-in Assistant: [Microsoft Online Services Sign-in Assistant for IT Professionals RTW](https://download.microsoft.com/download/7/1/E/71EF1D05-A42C-4A1F-8162-96494B5E615C/msoidcli_32bit.msi).
40
-
1. Install the Microsoft Azure Active Directory module for Windows PowerShell:
41
-
42
-
1. Open an elevated Windows PowerShell command prompt (run Windows PowerShell as an administrator).
43
-
2. Run the `Install-Module MSOnline` command.
44
-
45
-
1. Disable directory synchronization by running the following command:
37
+
1. Make sure that [Microsoft Graph PowerShell is installed](/powershell/microsoftgraph/installation).
38
+
1. Use the `Connect-MgGraph` command to sign in with the required scopes such as `Organization.ReadWrite.All`. For more information, see [Get started with the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
39
+
1. Disable directory synchronization by running the [Update-MgOrganization](/powershell/module/microsoft.graph.identity.directorymanagement/update-mgorganization) command.
This command will return **True** or **False**. Continue to run this command periodically until it returns **False**, and then go to the next step.
@@ -60,7 +59,7 @@ You want to manage objects in Office 365, Azure, or Intune and you no longer wan
60
59
61
60
1. Try to update an object by using Windows PowerShell or by using the cloud service portal.
62
61
63
-
Step 4 may take a while to be completed. There's a process in the cloud service environment that computes attribute values. The process must be completed before the objects can be changed by using Windows PowerShell or by using thecloud service portal.
62
+
Step 3 may take a while to be completed. There's a process in the cloud service environment that computes attribute values. The process must be completed before the objects can be changed by using Windows PowerShell or by using thecloud service portal.
64
63
65
64
### You delete an object from an on-premises AD DS. However, the object isn't deleted from your cloud service subscription account
66
65
@@ -70,14 +69,20 @@ Force directory synchronization by using the steps on this article: [Start the S
70
69
- If all updates and deletions aren't synchronized to the cloud service, contact Support.
71
70
72
71
> [!NOTE]
73
-
> As an alternative resolution for this scenario, an object can be manually deleted in the cloud service. However, the object can't be updated in the cloud service. For more information about how to resolve this issue, see the following Microsoft Knowledge Base article: [Object deletions aren't synchronized to Microsoft Entra ID when using the Azure Active Directory Sync tool](https://support.microsoft.com/help/2709902).
72
+
> As an alternative resolution for this scenario, an object can be manually deleted in the cloud service. However, the object can't be updated in the cloud service. For more information about how to resolve this issue, see the following Microsoft Knowledge Base article: [Object deletions aren't synchronized to Microsoft Entra ID when using the Azure Active Directory Sync tool](https://support.microsoft.com/help/2709902).
74
73
75
74
## More information
76
75
77
-
To re-enable directory synchronization, run the following command:
76
+
To re-enable directory synchronization, run the following commands:
It's important to plan carefully when you re-enable directory synchronization. If you used the cloud service portal or Windows PowerShell to make any changes directly to the objects that were originally synchronized from on-premises AD DS, the changes will be overwritten by on-premises attributes and settings the first time that synchronization occurs after directory synchronization is re-enabled.
title: Object deletions aren't synchronized to Microsoft Entra ID when using the Azure AD Connect
2
+
title: Object deletions aren't synchronized to Microsoft Entra ID when using the Microsoft Entra ID Connect
3
3
description: Describes an issue in which a deleted on-premises Active Directory object isn't removed from Microsoft Entra ID when directory synchronization is used in Office 365, Azure, or Microsoft Intune.
# Object deletions aren't synchronized to Microsoft Entra ID when using the Azure AD Connect
9
+
# Object deletions aren't synchronized to Microsoft Entra ID when using the Microsoft Entra ID Connect
10
10
11
11
_Original product version:_ Cloud Services (Web roles/Worker roles), Microsoft Entra ID, Microsoft Intune, Azure Backup, Office 365 Identity Management
12
12
_Original KB number:_ 2709902
@@ -32,31 +32,22 @@ This issue may occur if one of the following conditions is true:
32
32
33
33
To fix this issue, follow these steps:
34
34
35
-
1.Ensure that the ADSyncTools module is installed for PowerShell. For more information, see [Microsoft Entra Connect: ADSyncTools PowerShell Reference](/azure/active-directory/hybrid/connect/reference-connect-adsynctools).
35
+
1.Make sure that the [Microsoft Graph PowerShell module](/powershell/microsoftgraph/installation) and [ADSyncTools PowerShell module](/azure/active-directory/hybrid/connect/reference-connect-adsynctools) are installed.
36
36
1. Run the following ADSync command to force directory synchronization:
37
37
```powershell
38
38
Start-ADSyncSyncCycle -PolicyType Initial
39
39
```
40
-
1. If sync is working correctly but the Active Directory object deletion is still not propagated to Microsoft Entra ID, manually remove the orphaned object. To do so, use one of the following cmdlets in Azure Active Directory module for Windows PowerShell:
40
+
1. If sync is working correctly but the Active Directory object deletion is still not propagated to Microsoft Entra ID, manually remove the orphaned object. To do so, use one of the following Microsoft Graph PowerShell cmdlets:
41
41
42
-
```powershell
43
-
Remove-MsolContact
44
-
```
45
-
46
-
```powershell
47
-
Remove-MsolGroup
48
-
```
49
-
50
-
```powershell
51
-
Remove-MsolUser
52
-
```
53
-
54
-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../support/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
For example, to manually remove orphaned user ID `[email protected]` that was originally created by using directory synchronization, you would run the following cmdlet:
Copy file name to clipboardExpand all lines: support/entra/entra-id/user-prov-sync/password-writeback-error-code-sspr-009.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Microsoft Entra Administrators can't reset their own password from cloud
3
3
description: "Troubleshoot error SSPR_009: You can't reset your own password because password reset isn't turned on for your organization."
4
-
ms.date: 02/11/2022
4
+
ms.date: 06/05/2025
5
5
ms.reviewer: jarrettr, nualex, v-leedennis
6
6
ms.service: entra-id
7
-
ms.custom: sap:User Sign-in or password Problems, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
7
+
ms.custom: sap:User Sign-in or password Problems, no-azure-ad-ps-ref, azure-ad-ref-level-one-done
8
8
keywords:
9
9
#Customer intent: As a user with a Microsoft Entra Administrator role, I want to avoid SSPR_009 errors so that I can reset my own password from the cloud.
10
10
---
@@ -33,10 +33,16 @@ The old SSPR-A implementation is used when a Microsoft Entra account has an admi
33
33
34
34
## Solution
35
35
36
-
Enable SSPR-A on the tenant by running the [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings) PowerShell cmdlet, as follows:
36
+
Enable SSPR-A on the tenant by running the [Update-MgPolicyAuthorizationPolicy](/powershell/module/microsoft.graph.identity.signins/update-mgpolicyauthorizationpolicy) Microsoft Graph PowerShell cmdlet, as follows:
# Password Hash Sync is automatically enabled during Microsoft Entra Connect Pass-through Authentication
10
10
@@ -74,11 +74,8 @@ Optionally, if you want to clear password hashes that are already synchronized t
74
74
2. Select the **Customize synchronization options** task.
75
75
3. On the **Optional features** page, clear the **Password writeback** feature check box.
76
76
4. Complete the wizard.
77
-
2. Use the [Set-MsolUserPassword](/powershell/module/msonline/set-msoluserpassword?view=azureadps-1.0&preserve-view=true) cmdlet to set random passwords on all affected users. You have to run this cmdlet five times for each user because Microsoft Entra ID stores the last four password hashes in the password hash history.
78
-
79
-
[!INCLUDE [Azure AD PowerShell deprecation note](~/../support/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
80
-
81
-
>[!NOTE]
82
-
> The Set-MsolUserPassword cmdlet does not work if the user is using a federated domain. To clear password hashes for the user in the federated domain, you must change the UPN of the user to a non-federated domain, and then run the cmdlet to set the random password. After that, revert the UPN of the user to the original state.
77
+
2. Use the [Reset-MgUserAuthenticationMethodPassword](/powershell/module/microsoft.graph.identity.signins/reset-mguserauthenticationmethodpassword) cmdlet to set random passwords on all affected users. You have to run this cmdlet five times for each user because Microsoft Entra ID stores the last four password hashes in the password hash history.
83
78
79
+
>[!NOTE]
80
+
>If the cmdlet doesn't work for a federated domain user, you may need to temporarily change the UPN of the user to a non-federated domain, and then run the cmdlet to set the random password. After that, revert the UPN of the user to the original state.
84
81
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
0 commit comments