Skip to content

Commit 1022d57

Browse files
Merge pull request #248875 from billmath/fixes6
updating
2 parents 8ec4c1d + 5f9599f commit 1022d57

File tree

1 file changed

+17
-1
lines changed

1 file changed

+17
-1
lines changed

articles/active-directory/hybrid/cloud-sync/how-to-install.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,23 @@ To update an existing agent to use the Group Managed Service Account created dur
4545
>[!IMPORTANT]
4646
> After you've installed the agent, you must configure and enable it before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
4747
48-
## Enable password writeback in Azure AD Connect cloud sync
48+
49+
50+
## Enable password writeback in cloud sync
51+
52+
You can enable password writeback in SSPR directly in the portal or through PowerShell.
53+
54+
### Enable password writeback in the portal
55+
To use *password writeback* and enable the self-service password reset (SSPR) service to detect the cloud sync agent, using the portal, complete the following steps:
56+
57+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global Administrator account.
58+
2. Search for and select **Azure Active Directory**, select **Password reset**, then choose **On-premises integration**.
59+
3. Check the option for **Enable password write back for synced users** .
60+
4. (optional) If Azure AD Connect provisioning agents are detected, you can additionally check the option for **Write back passwords with Azure AD Connect cloud sync**.
61+
5. Check the option for **Allow users to unlock accounts without resetting their password** to *Yes*.
62+
6. When ready, select **Save**.
63+
64+
### Using PowerShell
4965

5066
To use *password writeback* and enable the self-service password reset (SSPR) service to detect the cloud sync agent, use the `Set-AADCloudSyncPasswordWritebackConfiguration` cmdlet and the tenant’s global administrator credentials:
5167

0 commit comments

Comments
 (0)