Skip to content

Commit fde799e

Browse files
committed
[AzureADDS] Incorporate feedback on sync process
1 parent 68f33cd commit fde799e

File tree

2 files changed

+12
-7
lines changed

2 files changed

+12
-7
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41174,7 +41174,7 @@
4117441174
},
4117541175
{
4117641176
"source_path": "articles/active-directory-domain-services/active-directory-ds-getting-started-password-sync-synced-tenant.md",
41177-
"redirect_url": "/azure/active-directory-domain-services/tutorial-configue-password-hash-sync",
41177+
"redirect_url": "/azure/active-directory-domain-services/tutorial-configure-password-hash-sync",
4117841178
"redirect_document_id": true
4117941179
},
4118041180
{

articles/active-directory-domain-services/tutorial-configure-password-hash-sync.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,14 @@ ms.author: iainfou
1313

1414
#Customer intent: As an server administrator, I want to learn how to enable password hash synchronization with Azure AD Connect to create a hybrid environment using an on-premises AD DS domain.
1515
---
16+
1617
# Tutorial: Enable password synchronization in Azure Active Directory Domain Services for hybrid environments
1718

18-
For hybrid environments, an Azure Active Directory (Azure AD) tenant can be configured to synchronize with an on-premises Active Directory Domain Services (AD DS) environment using Azure AD Connect. By default, Azure AD Connect doesn't synchronize legacy NTLM and Kerberos credential hashes to Azure AD.
19+
For hybrid environments, an Azure Active Directory (Azure AD) tenant can be configured to synchronize with an on-premises Active Directory Domain Services (AD DS) environment using Azure AD Connect. By default, Azure AD Connect doesn't synchronize legacy NT LAN Manager (NTLM) and Kerberos password hashes that are needed for Azure Active Directory Domain Services (Azure AD DS).
20+
21+
To use Azure AD DS with accounts synchronized from an on-premises AD DS environment, you need to configure Azure AD Connect to synchronize those password hashes required for NTLM and Kerberos authentication. After Azure AD Connect is configured, an on-premises account creation or password change event also then synchronizes the legacy password hashes to Azure AD.
1922

20-
To use Azure Active Directory Domain Services (Azure AD DS) with accounts synchronized from an on-premises AD DS environment, you need to configure Azure AD Connect to synchronize the password hashes required for NTLM and Kerberos authentication. You don't need to perform these steps if you use cloud-only accounts with no on-premises AD DS environment.
23+
You don't need to perform these steps if you use cloud-only accounts with no on-premises AD DS environment.
2124

2225
In this tutorial, you learn:
2326

@@ -43,9 +46,9 @@ To complete this tutorial, you need the following resources:
4346

4447
Azure AD Connect is used to synchronize objects like user accounts and groups from an on-premises AD DS environment into an Azure AD tenant. As part of the process, password hash synchronization enables accounts to use the same password in the on-prem AD DS environment and Azure AD.
4548

46-
To authenticate users on the managed domain, Azure AD DS needs password hashes in a format that's suitable for NT LAN Manager (NTLM) and Kerberos authentication. Azure AD doesn't generate or store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Azure AD DS for your tenant. For security reasons, Azure AD also doesn't store any password credentials in clear-text form. Therefore, Azure AD can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
49+
To authenticate users on the managed domain, Azure AD DS needs password hashes in a format that's suitable for NTLM and Kerberos authentication. Azure AD doesn't store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Azure AD DS for your tenant. For security reasons, Azure AD also doesn't store any password credentials in clear-text form. Therefore, Azure AD can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
4750

48-
Azure AD Connect can be configured to generate the required NTLM or Kerberos password hashes for Azure AD DS. Make sure that you have completed the steps to [enable Azure AD Connect for password hash synchronization][enable-azure-ad-connect]. If you had an existing instance of Azure AD Connect, [download and update to the latest version][azure-ad-connect-download] to make sure you can generate the legacy password hashes for NTLM and Kerberos. This functionality isn't available in early releases of Azure AD Connect or with the legacy DirSync tool. Azure AD Connect version *1.1.614.0* or later is required.
51+
Azure AD Connect can be configured to synchronize the required NTLM or Kerberos password hashes for Azure AD DS. Make sure that you have completed the steps to [enable Azure AD Connect for password hash synchronization][enable-azure-ad-connect]. If you had an existing instance of Azure AD Connect, [download and update to the latest version][azure-ad-connect-download] to make sure you can synchronize the legacy password hashes for NTLM and Kerberos. This functionality isn't available in early releases of Azure AD Connect or with the legacy DirSync tool. Azure AD Connect version *1.1.614.0* or later is required.
4952

5053
## Enable synchronization of password hashes
5154

@@ -63,16 +66,18 @@ With Azure AD Connect installed and configured to synchronize with Azure AD, now
6366
* The Azure AD connector is named *contoso.onmicrosoft.com - AAD*
6467
* The on-premises AD DS connector is named *onprem.contoso.com*
6568

66-
1. Copy and paste the following PowerShell script to the computer with Azure AD Connect installed. Update the `$azureadConnector` and `$adConnector` variables with the connector names from the previous step.
69+
1. Copy and paste the following PowerShell script to the computer with Azure AD Connect installed. The script triggers a full password sync that includes legacy password hashes. Update the `$azureadConnector` and `$adConnector` variables with the connector names from the previous step.
6770

68-
Run this script on each AD forest to synchronize on-premises account NTLM and Kerberos password hashes to Azure AD. The script also initiates a full synchronization of Azure AD Connect to Azure AD:
71+
Run this script on each AD forest to synchronize on-premises account NTLM and Kerberos password hashes to Azure AD.
6972

7073
```powershell
7174
# Define the Azure AD Connect connector names and import the required PowerShell module
7275
$azureadConnector = "<CASE SENSITIVE AZURE AD CONNECTOR NAME>"
7376
$adConnector = "<CASE SENSITIVE AD DS CONNECTOR NAME>"
7477
Import-Module "C:\Program Files\Microsoft Azure Active Directory Connect\AdSyncConfig\AdSyncConfig.psm1"
7578
79+
# Create a new ForceFullPasswordSync configuration parameter object then
80+
# update the existing connector with this new configuration
7681
$c = Get-ADSyncConnector -Name $adConnector
7782
$p = New-Object Microsoft.IdentityManagement.PowerShell.ObjectModel.ConfigurationParameter "Microsoft.Synchronize.ForceFullPasswordSync", String, ConnectorGlobal, $null, $null, $null
7883
$p.Value = 1

0 commit comments

Comments
 (0)