Skip to content

Commit 3a562ea

Browse files
authored
Update how-to-connect-password-hash-synchronization.md
1 parent 23911d6 commit 3a562ea

File tree

1 file changed

+2
-6
lines changed

1 file changed

+2
-6
lines changed

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -118,13 +118,9 @@ It is typical to force a user to change their password during their first logon,
118118

119119
The temporary password functionality helps to ensure that the transfer of ownership of the credential is completed on first use, to minimize the duration of time in which more than one individual has knowledge of that credential.
120120

121-
To support temporary passwords in Azure AD for synchronized users, you can enable the *ForcePasswordResetOnLogonFeature* feature, by running the following command on your Azure AD Connect server, replacing <AAD Connector Name> with the connector name specific to your environment:
121+
To support temporary passwords in Azure AD for synchronized users, you can enable the *ForcePasswordResetOnLogonFeature* feature, by running the following command on your Azure AD Connect server:
122122

123-
`Set-ADSyncAADCompanyFeature -ConnectorName "<AAD Connector name>" -ForcePasswordResetOnLogonFeature $true`
124-
125-
You can use the following command to determine the connector name:
126-
127-
`(Get-ADSyncConnector | where{$_.ListName -eq "Windows Azure Active Directory (Microsoft)"}).Name`
123+
`Set-ADSyncAADCompanyFeature  -ForcePasswordResetOnLogonFeature $true`
128124

129125
Caveat: Forcing a user to change their password on next logon requires a password change at the same time. AD Connect will not pick up the force password change flag by itself, it is supplemental to the detected password change that occurs during password hash sync.
130126

0 commit comments

Comments
 (0)