Skip to content

Commit 1e59ba7

Browse files
authored
Update howto-sspr-writeback.md
Issue when you configure SSPR using AAD Connect and try to update the password for a new user.
1 parent cffaf33 commit 1e59ba7

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/active-directory/authentication/howto-sspr-writeback.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ To use password writeback, you must have one of the following licenses assigned
5656
> Standalone Office 365 licensing plans *don't support "Self-Service Password Reset/Change/Unlock with on-premises writeback"* and require that you have one of the preceding plans for this functionality to work.
5757
>
5858
59-
## Active Directory permissions
59+
## Active Directory permissions and the on premises Password complexity policies.
6060

6161
The account specified in the Azure AD Connect utility must have the following items set if you want to be in scope for SSPR:
6262

@@ -96,6 +96,8 @@ To set up the appropriate permissions for password writeback to occur, complete
9696
* **Write pwdLastSet**
9797
9. Select **Apply/OK** to apply the changes and exit any open dialog boxes.
9898

99+
Since the Source of authority is on-premises, the password complexity policies will apply from the same connected data source. Make sure you have changed the existing Group policies for "Minimum Password Length". Since this is set to 1 (which translates to - password should be atleast a day old before it can be updated), make sure it is set to 0. These can located in gpmc.msc under "Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies". Make sure you run 'gpupdate /force' for this change to take effect.
100+
99101
## Next steps
100102

101103
[What is password writeback?](concept-sspr-writeback.md)

0 commit comments

Comments
 (0)