Skip to content

Commit 68f33cd

Browse files
committed
[AzureADDS] Edits and revisions
1 parent 5a7c35d commit 68f33cd

File tree

1 file changed

+18
-12
lines changed

1 file changed

+18
-12
lines changed

articles/active-directory-domain-services/tutorial-configure-password-hash-sync.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: iainfou
1717

1818
For hybrid environments, an Azure Active Directory (Azure AD) tenant can be configured to synchronize with an on-premises Active Directory Domain Services (AD DS) environment using Azure AD Connect. By default, Azure AD Connect doesn't synchronize legacy NTLM and Kerberos credential hashes to Azure AD.
1919

20-
To use Azure Active Directory Domain Services (Azure AD DS) with accounts synchronized from an on-premises AD DS environment, you need to configure Azure AD Connect to synchronize the password hashes required for NTLM and Kerberos authentication. You don't need to perform these steps if you use cloud-only accounts and don't have an on-premises AD DS environment.
20+
To use Azure Active Directory Domain Services (Azure AD DS) with accounts synchronized from an on-premises AD DS environment, you need to configure Azure AD Connect to synchronize the password hashes required for NTLM and Kerberos authentication. You don't need to perform these steps if you use cloud-only accounts with no on-premises AD DS environment.
2121

2222
In this tutorial, you learn:
2323

@@ -38,43 +38,49 @@ To complete this tutorial, you need the following resources:
3838
* If needed, [enable Azure AD Connect for password hash synchronization][enable-azure-ad-connect].
3939
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
4040
* If needed, [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
41-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
4241

4342
## Password hash synchronization using Azure AD Connect
4443

4544
Azure AD Connect is used to synchronize objects like user accounts and groups from an on-premises AD DS environment into an Azure AD tenant. As part of the process, password hash synchronization enables accounts to use the same password in the on-prem AD DS environment and Azure AD.
4645

4746
To authenticate users on the managed domain, Azure AD DS needs password hashes in a format that's suitable for NT LAN Manager (NTLM) and Kerberos authentication. Azure AD doesn't generate or store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Azure AD DS for your tenant. For security reasons, Azure AD also doesn't store any password credentials in clear-text form. Therefore, Azure AD can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
4847

49-
As prerequisite to configuring Azure AD Connect to generate the required NTLM or Kerberos password hashes for Azure AD DS, you need to first [enable Azure AD Connect for password hash synchronization][enable-azure-ad-connect]. Make sure that you [download and install the latest available release of Azure AD Connect][azure-ad-connect-download].
50-
51-
If you have an existing instance of Azure AD Connect, update to the latest version to make sure you can generate the legacy password hashes for NTLM and Kerberos. This functionality isn't available in early releases of Azure AD Connect or with the legacy DirSync tool. Azure AD Connect version *1.1.614.0* or later is required.
48+
Azure AD Connect can be configured to generate the required NTLM or Kerberos password hashes for Azure AD DS. Make sure that you have completed the steps to [enable Azure AD Connect for password hash synchronization][enable-azure-ad-connect]. If you had an existing instance of Azure AD Connect, [download and update to the latest version][azure-ad-connect-download] to make sure you can generate the legacy password hashes for NTLM and Kerberos. This functionality isn't available in early releases of Azure AD Connect or with the legacy DirSync tool. Azure AD Connect version *1.1.614.0* or later is required.
5249

5350
## Enable synchronization of password hashes
5451

55-
With Azure AD Connect installed and configured to synchronize with Azure AD, now configure the legacy password hash sync for NTLM and Kerberos.
52+
With Azure AD Connect installed and configured to synchronize with Azure AD, now configure the legacy password hash sync for NTLM and Kerberos. A PowerShell script is used to configure the required settings and then start a full password synchronization to Azure AD. When that Azure AD Connect password hash synchronization process is complete, users can sign in to applications through Azure AD DS that use legacy NTLM or Kerberos password hashes.
5653

57-
1. On the computer with Azure AD Connect installed, from the Start menu, open the Azure AD Connect > Synchronization Service.
54+
1. On the computer with Azure AD Connect installed, from the Start menu, open the **Azure AD Connect > Synchronization Service**.
5855
1. Select the **Connectors** tab. The connection information used to establish the synchronization between the on-premises AD DS environment and Azure AD are listed.
5956

60-
The **Type** indicates either *Windows Azure Active Directory (Microsoft)* for the Azure AD connector or *Active Directory Domain Services* for the on-premises connector. Make a note of the connector names to use in PowerShell script in the next step.
61-
62-
In the following example screenshot, the Azure AD connector is named *contoso.onmicrosoft.com - AAD* and the on-premises connector is named *onprem.contoso.com*
57+
The **Type** indicates either *Windows Azure Active Directory (Microsoft)* for the Azure AD connector or *Active Directory Domain Services* for the on-premises AD DS connector. Make a note of the connector names to use in the PowerShell script in the next step.
6358

6459
![List the connector names in Sync Service Manager](media/tutorial-configure-password-hash-sync/service-sync-manager.png)
6560

66-
1. Copy and paste the following PowerShell script to the computer with Azure AD Connect installed. Update the `$azureadConnector` and `$adConnector` variables with the connector names from the previous step. Run this script on each AD forest to synchronize on-premises account NTLM and Kerberos password hashes to Azure AD. The script also initiates a full synchronization of Azure AD Connect to Azure AD:
61+
In this example screenshot, the following connectors are used:
62+
63+
* The Azure AD connector is named *contoso.onmicrosoft.com - AAD*
64+
* The on-premises AD DS connector is named *onprem.contoso.com*
65+
66+
1. Copy and paste the following PowerShell script to the computer with Azure AD Connect installed. Update the `$azureadConnector` and `$adConnector` variables with the connector names from the previous step.
67+
68+
Run this script on each AD forest to synchronize on-premises account NTLM and Kerberos password hashes to Azure AD. The script also initiates a full synchronization of Azure AD Connect to Azure AD:
6769

6870
```powershell
71+
# Define the Azure AD Connect connector names and import the required PowerShell module
6972
$azureadConnector = "<CASE SENSITIVE AZURE AD CONNECTOR NAME>"
7073
$adConnector = "<CASE SENSITIVE AD DS CONNECTOR NAME>"
71-
Import-Module adsync
74+
Import-Module "C:\Program Files\Microsoft Azure Active Directory Connect\AdSyncConfig\AdSyncConfig.psm1"
75+
7276
$c = Get-ADSyncConnector -Name $adConnector
7377
$p = New-Object Microsoft.IdentityManagement.PowerShell.ObjectModel.ConfigurationParameter "Microsoft.Synchronize.ForceFullPasswordSync", String, ConnectorGlobal, $null, $null, $null
7478
$p.Value = 1
7579
$c.GlobalParameters.Remove($p.Name)
7680
$c.GlobalParameters.Add($p)
7781
$c = Add-ADSyncConnector -Connector $c
82+
83+
# Disable and re-enable Azure AD Connect to force a full password synchronization
7884
Set-ADSyncAADPasswordSyncConfiguration -SourceConnector $adConnector -TargetConnector $azureadConnector -Enable $false
7985
Set-ADSyncAADPasswordSyncConfiguration -SourceConnector $adConnector -TargetConnector $azureadConnector -Enable $true
8086
```

0 commit comments

Comments
 (0)