You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: On-premises password writeback integration with Azure AD SSPR - Azure Active Directory
3
-
description: Get cloud passwords written back to on-premises AD infrastructure
2
+
title: On-premises password writeback with self-service password reset - Azure Active Directory
3
+
description: Learn how password change or reset events in Azure Active Directory can be written back to an on-premises directory environment
4
4
5
5
services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 05/06/2019
9
+
ms.date: 04/14/2020
10
10
11
11
ms.author: iainfou
12
12
author: iainfoulds
13
13
manager: daveba
14
-
ms.reviewer: sahenry
14
+
ms.reviewer: rhicock
15
15
ms.collection: M365-identity-device-management
16
16
---
17
-
# What is password writeback?
17
+
# How does self-service password reset writeback work in Azure Active Directory?
18
18
19
-
Having a cloud-based password reset utility is great but most companies still have an on-premises directory where their users exist. How does Microsoft support keeping traditional on-premises Active Directory (AD) in sync with password changes in the cloud? Password writeback is a feature enabled with [Azure AD Connect](../hybrid/whatis-hybrid-identity.md) that allows password changes in the cloud to be written back to an existing on-premises directory in real time.
19
+
Azure Active Directory (Azure AD) self-service password reset (SSPR) lets users reset their passwords in the cloud, but most companies also have an on-premises Active Directory Domain Services (AD DS) environment where their users exist. Password writeback is a feature enabled with [Azure AD Connect](../hybrid/whatis-hybrid-identity.md) that allows password changes in the cloud to be written back to an existing on-premises directory in real time. In this configuration, as users change or reset their passwords using SSPR in the cloud, the updated passwords also written back to the on-premises AD DS environment
20
20
21
-
Password writeback is supported in environments that use:
21
+
Password writeback is supported in environments that use the following hybrid identity models:
> Password writeback will stop working for customers who are using Azure AD Connect versions 1.0.8641.0 and older when the [Azure Access Control service (ACS) is retired on November 7th, 2018](../azuread-dev/active-directory-acs-migration.md). Azure AD Connect versions 1.0.8641.0 and older will no longer allow password writeback at that time because they depend on ACS for that functionality.
29
-
>
30
-
> To avoid a disruption in service, upgrade from a previous version of Azure AD Connect to a newer version, see the article [Azure AD Connect: Upgrade from a previous version to the latest](../hybrid/how-to-upgrade-previous-version.md)
31
-
>
32
-
33
-
Password writeback provides:
27
+
Password writeback provides the following features:
34
28
35
-
***Enforcement of on-premises Active Directory password policies**: When a user resets their password, it is checked to ensure it meets your on-premises Active Directory policy before committing it to that directory. This review includes checking the history, complexity, age, password filters, and any other password restrictions that you have defined in local Active Directory.
36
-
***Zero-delay feedback**: Password writeback is a synchronous operation. Your users are notified immediately if their password did not meet the policy or could not be reset or changed for any reason.
37
-
***Supports password changes from the access panel and Office 365**: When federated or password hash synchronized users come to change their expired or non-expired passwords, those passwords are written back to your local Active Directory environment.
38
-
***Supports password writeback when an admin resets them from the Azure portal**: Whenever an admin resets a user’s password in the [Azure portal](https://portal.azure.com), if that user is federated or password hash synchronized, the password is written back to on-premises. This functionality is currently not supported in the Office admin portal.
39
-
***Doesn’t require any inbound firewall rules**: Password writeback uses an Azure Service Bus relay as an underlying communication channel. All communication is outbound over port 443.
29
+
***Enforcement of on-premises Active Directory Domain Services (AD DS) password policies**: When a user resets their password, it's checked to ensure it meets your on-premises AD DS policy before committing it to that directory. This review includes checking the history, complexity, age, password filters, and any other password restrictions that you define in AD DS.
30
+
***Zero-delay feedback**: Password writeback is a synchronous operation. Users are notified immediately if their password doesn't meet the policy or can't be reset or changed for any reason.
31
+
***Supports password changes from the access panel and Office 365**: When federated or password hash synchronized users come to change their expired or non-expired passwords, those passwords are written back to AD DS.
32
+
***Supports password writeback when an admin resets them from the Azure portal**: When an admin resets a user's password in the [Azure portal](https://portal.azure.com), if that user is federated or password hash synchronized, the password is written back to on-premises. This functionality is currently not supported in the Office admin portal.
33
+
***Doesn't require any inbound firewall rules**: Password writeback uses an Azure Service Bus relay as an underlying communication channel. All communication is outbound over port 443.
40
34
41
35
> [!NOTE]
42
-
> Administrator accounts that exist within protected groups in on-premises AD can be used with password writeback. Administrators can change their password in the cloud but cannot use password reset to reset a forgotten password. For more information about protected groups, see [Protected accounts and groups in Active Directory](https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/appendix-c--protected-accounts-and-groups-in-active-directory).
43
-
44
-
## Licensing requirements for password writeback
45
-
46
-
**Self-Service Password Reset/Change/Unlock with on-premises writeback is a premium feature of Azure AD**. For more information about licensing, see the [Azure Active Directory pricing site](https://azure.microsoft.com/pricing/details/active-directory/).
47
-
48
-
To use password writeback, you must have one of the following licenses assigned on your tenant:
49
-
50
-
* Azure AD Premium P1
51
-
* Azure AD Premium P2
52
-
* Enterprise Mobility + Security E3 or A3
53
-
* Enterprise Mobility + Security E5 or A5
54
-
* Microsoft 365 E3 or A3
55
-
* Microsoft 365 E5 or A5
56
-
* Microsoft 365 F1
57
-
* Microsoft 365 Business
58
-
59
-
> [!WARNING]
60
-
> Standalone Office 365 licensing plans *don't support "Self-Service Password Reset/Change/Unlock with on-premises writeback"* and require that you have one of the preceding plans for this functionality to work.
36
+
> Administrator accounts that exist within protected groups in on-premises AD can be used with password writeback. Administrators can change their password in the cloud but can't use password reset to reset a forgotten password. For more information about protected groups, see [Protected accounts and groups in Active Directory](/windows-server/identity/ad-ds/plan/security-best-practices/appendix-c--protected-accounts-and-groups-in-active-directory).
61
37
62
38
## How password writeback works
63
39
@@ -71,38 +47,39 @@ When a federated or password hash synchronized user attempts to reset or change
71
47
1. When the user selects **Submit**, the plaintext password is encrypted with a symmetric key created during the writeback setup process.
72
48
1. The encrypted password is included in a payload that gets sent over an HTTPS channel to your tenant-specific service bus relay (that is set up for you during the writeback setup process). This relay is protected by a randomly generated password that only your on-premises installation knows.
73
49
1. After the message reaches the service bus, the password-reset endpoint automatically wakes up and sees that it has a reset request pending.
74
-
1. The service then looks for the user by using the cloud anchor attribute. For this lookup to succeed:
50
+
1. The service then looks for the user by using the cloud anchor attribute. For this lookup to succeed, the following conditions must be met:
75
51
76
52
* The user object must exist in the Active Directory connector space.
77
53
* The user object must be linked to the corresponding metaverse (MV) object.
78
54
* The user object must be linked to the corresponding Azure Active Directory connector object.
79
55
* The link from the Active Directory connector object to the MV must have the synchronization rule `Microsoft.InfromADUserAccountEnabled.xxx` on the link.
80
-
56
+
81
57
When the call comes in from the cloud, the synchronization engine uses the **cloudAnchor** attribute to look up the Azure Active Directory connector space object. It then follows the link back to the MV object, and then follows the link back to the Active Directory object. Because there can be multiple Active Directory objects (multi-forest) for the same user, the sync engine relies on the `Microsoft.InfromADUserAccountEnabled.xxx` link to pick the correct one.
82
58
83
59
1. After the user account is found, an attempt to reset the password directly in the appropriate Active Directory forest is made.
84
60
1. If the password set operation is successful, the user is told their password has been changed.
61
+
85
62
> [!NOTE]
86
-
> If the user's password hash is synchronized to Azure AD by using password hash synchronization, there is a chance that the on-premises password policy is weaker than the cloud password policy. In this case, the on-premises policy is enforced. This policy ensures that your on-premises policy is enforced in the cloud, no matter if you use password hash synchronization or federation to provide single sign-on.
63
+
> If the user's password hash is synchronized to Azure AD by using password hash synchronization, there's a chance that the on-premises password policy is weaker than the cloud password policy. In this case, the on-premises policy is enforced. This policy ensures that your on-premises policy is enforced in the cloud, no matter if you use password hash synchronization or federation to provide single sign-on.
87
64
88
-
1. If the password set operation fails, an error prompts the user to try again. The operation might fail because:
65
+
1. If the password set operation fails, an error prompts the user to try again. The operation might fail because of the following reasons:
89
66
* The service was down.
90
-
* The password they selected did not meet the organization's policies.
67
+
* The password they selected doesn't meet the organization's policies.
91
68
* Unable to find the user in local Active Directory.
92
69
93
-
The error messages provide guidance to users so they can attempt to resolve without administrator intervention.
70
+
The error messages provide guidance to users so they can attempt to resolve without administrator intervention.
94
71
95
72
## Password writeback security
96
73
97
-
Password writeback is a highly secure service. To ensure your information is protected, a four-tiered security model is enabled as the following describes:
74
+
Password writeback is a highly secure service. To ensure your information is protected, a four-tiered security model is enabled as follows:
98
75
99
76
***Tenant-specific service-bus relay**
100
77
* When you set up the service, a tenant-specific service bus relay is set up that's protected by a randomly generated strong password that Microsoft never has access to.
* After the service bus relay is created, a strong symmetric key is created thatis used to encrypt the password as it comes over the wire. This key only lives in your company's secret store in the cloud, which is heavily locked down and audited, just like any other password in the directory.
79
+
* After the service bus relay is created, a strong symmetric key is created that'is used to encrypt the password as it comes over the wire. This key only lives in your company's secret store in the cloud, which is heavily locked down and audited, just like any other password in the directory.
103
80
***Industry standard Transport Layer Security (TLS)**
104
81
1. When a password reset or change operation occurs in the cloud, the plaintext password is encrypted with your public key.
105
-
1. The encrypted password is placed into an HTTPS message that is sent over an encrypted channel by using Microsoft TLS/SSL certs to your service bus relay.
82
+
1. The encrypted password is placed into an HTTPS message that's sent over an encrypted channel by using Microsoft TLS/SSL certs to your service bus relay.
106
83
1. After the message arrives in the service bus, your on-premises agent wakes up and authenticates to the service bus by using the strong password that was previously generated.
107
84
1. The on-premises agent picks up the encrypted message and decrypts it by using the private key.
108
85
1. The on-premises agent attempts to set the password through the AD DS SetPassword API. This step is what allows enforcement of your Active Directory on-premises password policy (such as the complexity, age, history, and filters) in the cloud.
@@ -113,10 +90,10 @@ Password writeback is a highly secure service. To ensure your information is pro
113
90
114
91
After a user submits a password reset, the reset request goes through several encryption steps before it arrives in your on-premises environment. These encryption steps ensure maximum service reliability and security. They are described as follows:
115
92
116
-
***Step 1: Password encryption with 2048-bit RSA Key**: After a user submits a password to be written back to on-premises, the submitted password itself is encrypted with a 2048-bit RSA key.
117
-
***Step 2: Package-level encryption with AES-GCM**: The entire package, the password plus the required metadata, is encrypted by using AES-GCM. This encryption prevents anyone with direct access to the underlying ServiceBus channel from viewing or tampering with the contents.
118
-
***Step 3: All communication occurs over TLS/SSL**: All the communication with ServiceBus happens in an SSL/TLS channel. This encryption secures the contents from unauthorized third parties.
119
-
***Automatic key roll over every six months**: All keys roll over every six months, or every time password writeback is disabled and then re-enabled on Azure AD Connect, to ensure maximum service security and safety.
93
+
1.**Password encryption with 2048-bit RSA Key**: After a user submits a password to be written back to on-premises, the submitted password itself is encrypted with a 2048-bit RSA key.
94
+
1.**Package-level encryption with AES-GCM**: The entire package, the password plus the required metadata, is encrypted by using AES-GCM. This encryption prevents anyone with direct access to the underlying ServiceBus channel from viewing or tampering with the contents.
95
+
1.**All communication occurs over TLS/SSL**: All the communication with ServiceBus happens in an SSL/TLS channel. This encryption secures the contents from unauthorized third parties.
96
+
1.**Automatic key roll over every six months**: All keys roll over every six months, or every time password writeback is disabled and then re-enabled on Azure AD Connect, to ensure maximum service security and safety.
120
97
121
98
### Password writeback bandwidth usage
122
99
@@ -140,28 +117,32 @@ The size of each of the message described previously is typically under 1 KB. Ev
140
117
Passwords are written back in all the following situations:
141
118
142
119
***Supported end-user operations**
143
-
* Any end-user self-service voluntary change password operation
144
-
* Any end-user self-service force change password operation, for example, password expiration
145
-
* Any end-user self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com)
120
+
* Any end-user self-service voluntary change password operation.
121
+
* Any end-user self-service force change password operation, for example, password expiration.
122
+
* Any end-user self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com).
123
+
146
124
***Supported administrator operations**
147
-
* Any administrator self-service voluntary change password operation
148
-
* Any administrator self-service force change password operation, for example, password expiration
149
-
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com)
150
-
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com)
125
+
* Any administrator self-service voluntary change password operation.
126
+
* Any administrator self-service force change password operation, for example, password expiration.
127
+
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com).
128
+
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com).
151
129
152
130
## Unsupported writeback operations
153
131
154
-
Passwords are *not* written back in any of the following situations:
132
+
Passwords aren't written back in any of the following situations:
155
133
156
134
***Unsupported end-user operations**
157
-
* Any end user resetting their own password by using PowerShell version 1, version 2, or the Microsoft Graph API
135
+
* Any end user resetting their own password by using PowerShell version 1, version 2, or the Microsoft Graph API.
158
136
***Unsupported administrator operations**
159
-
* Any administrator-initiated end-user password reset from PowerShell version 1, version 2, or the Microsoft Graph API
160
-
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com)
137
+
* Any administrator-initiated end-user password reset from PowerShell version 1, version 2, or the Microsoft Graph API.
138
+
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com).
161
139
162
140
> [!WARNING]
163
-
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is supported as a preview feature of Azure AD Connect. For more information, see the article,[Implement password hash synchronization with Azure AD Connect sync](../hybrid/how-to-connect-password-hash-synchronization.md).
141
+
> Use of the checkbox "User must change password at next logon" in on-premises AD DS administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is supported as a preview feature of Azure AD Connect. For more information, see [Implement password hash synchronization with Azure AD Connect sync](../hybrid/how-to-connect-password-hash-synchronization.md).
164
142
165
143
## Next steps
166
144
167
-
Enable password writeback using the Tutorial: [Enabling password writeback](tutorial-enable-writeback.md)
145
+
To get started with SSPR writeback, complete the following tutorial:
0 commit comments