You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/connect/how-to-connect-syncservice-features.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,16 +27,16 @@ The synchronization feature of Microsoft Entra Connect has two components:
27
27
28
28
This topic explains how the following features of the **Microsoft Entra Connect Sync service** work and how you can configure them using PowerShell.
29
29
30
-
These settings are configured by the [Azure AD PowerShell module](/previous-versions/azure/jj151815(v=azure.100)). Download and install it separately from Microsoft Entra Connect. The cmdlets documented in this topic were introduced in the [2016 March release (build 9031.1)](https://social.technet.microsoft.com/wiki/contents/articles/28552.microsoft-azure-active-directory-powershell-module-version-release-history.aspx#Version_9031_1). If you do not have the cmdlets documented in this topic or they do not produce the same result, then make sure you run the latest version.
30
+
These settings are configured by the [Azure AD PowerShell module](/previous-versions/azure/jj151815(v=azure.100)). Download and install it separately from Microsoft Entra Connect. The cmdlets documented in this topic were introduced in the [2016 March release (build 9031.1)](https://social.technet.microsoft.com/wiki/contents/articles/28552.microsoft-azure-active-directory-powershell-module-version-release-history.aspx#Version_9031_1). If you don't have the cmdlets documented in this topic or they don't produce the same result, then make sure you run the latest version.
31
31
32
32
To see the configuration in your Microsoft Entra directory, run `Get-MsolDirSyncFeatures`.
Get-MgDirectoryOnPremisSynchronization | Select-Object -ExpandProperty Features | Format-List
39
+
Get-MgDirectoryOnPremiseSynchronization | Select-Object -ExpandProperty Features | Format-List
40
40
```
41
41
42
42
The output looks similar to `Get-MsolDirSyncFeatures`:
@@ -72,20 +72,20 @@ The following settings can be configured by `Set-MsolDirSyncFeature`:
72
72
|[EnableSoftMatchOnUpn](#userprincipalname-soft-match)|Allows objects to join on userPrincipalName in addition to primary SMTP address. |
73
73
|[SynchronizeUpnForManagedUsers](#synchronize-userprincipalname-updates)|Allows the sync engine to update the userPrincipalName attribute for managed/licensed (non-federated) users. |
74
74
75
-
After you have enabled a feature, it cannot be disabled again.
75
+
After you have enabled a feature, it can't be disabled again.
76
76
77
77
> [!NOTE]
78
78
> From August 24, 2016 the feature *Duplicate attribute resiliency* is enabled by default for new Microsoft Entra directories. This feature will also be rolled out and enabled on directories created before this date. You will receive an email notification when your directory is about to get this feature enabled.
79
79
>
80
80
>
81
81
82
-
The following settings are configured by Microsoft Entra Connect and cannot be modified by `Set-MsolDirSyncFeature`:
82
+
The following settings are configured by Microsoft Entra Connect and can't be modified by `Set-MsolDirSyncFeature`:
|[DuplicateProxyAddressResiliency<br/>DuplicateUPNResiliency](#duplicate-attribute-resiliency)|Allows an attribute to be quarantined when it is a duplicate of another object rather than failing the entire object during export. |
88
+
|[DuplicateProxyAddressResiliency<br/>DuplicateUPNResiliency](#duplicate-attribute-resiliency)|Allows an attribute to be quarantined when its a duplicate of another object rather than failing the entire object during export. |
89
89
| Password Hash Sync |[Implementing password hash synchronization with Microsoft Entra Connect Sync](how-to-connect-password-hash-synchronization.md)|
90
90
|Pass-through Authentication|[User sign-in with Microsoft Entra pass-through authentication](how-to-connect-pta.md)|
91
91
| UnifiedGroupWriteback |Group writeback|
@@ -99,27 +99,27 @@ Instead of failing to provision objects with duplicate UPNs / proxyAddresses, th
99
99
100
100
When this feature is enabled, soft-match is enabled for UPN in addition to the [primary SMTP address](https://support.microsoft.com/kb/2641663), which is always enabled. Soft-match is used to match existing cloud users in Microsoft Entra ID with on-premises users.
101
101
102
-
If you need to match on-premises AD accounts with existing accounts created in the cloud and you are not using Exchange Online, then this feature is useful. In this scenario, you generally don’t have a reason to set the SMTP attribute in the cloud.
102
+
If you need to match on-premises AD accounts with existing accounts created in the cloud and you aren't using Exchange Online, then this feature is useful. In this scenario, you generally don’t have a reason to set the SMTP attribute in the cloud.
103
103
104
104
This feature is on by default for newly created Microsoft Entra directories. You can see if this feature is enabled for you by running:
When this feature is enabled it will block the Soft Match feature. Customers are encouraged to enable this feature and keep it at enabled until Soft Matching is required again for their tenancy. This flag should be enabled again after any soft matching has completed and is no longer needed.
122
+
When this feature is enabled, it blocks the Soft Match feature. Customers are encouraged to enable this feature and keep it at enabled until Soft Matching is required again for their tenancy. This flag should be enabled again after any soft matching has completed and is no longer needed.
123
123
124
124
Example - to block soft matching in your tenant, run this cmdlet:
Historically, updates to the UserPrincipalName attribute using the sync service from on-premises has been blocked, unless both of these conditions were true:
133
133
134
134
* The user is managed (non-federated).
135
-
* The user has not been assigned a license.
135
+
* The user hasn't been assigned a license.
136
136
137
137
> [!NOTE]
138
138
> From March 2019, synchronizing UPN changes for federated user accounts is allowed.
@@ -146,12 +146,12 @@ This feature is on by default for newly created Microsoft Entra directories. You
0 commit comments