- Office 365 password reset not working with ad sync how to#
- Office 365 password reset not working with ad sync update#
I think most reasonable people would assume that if you are syncing an expired password, then the user would not be allowed to logon. This limitation is documented, but it doesn’t jump out at you. All of these can contain sensitive information that you probably don’t want expired users accessing. Services like Office 365, Salesforce, Dropbox etc.
It doesn’t take much thought to see the concern here, in this scenario users who’s password has expired, or perhaps more worryingly, who’s account has expired, will still be able to login to services using their AAD account. When password sync is enabled, the hash of the password in the cloud is set to never expire. When you enable AD sync, your password complexity rules from on premises are used in place of any set in the cloud, however your expiration policies are not. In this scenario all your authentication happens in Azure AD. With user and password has sync enabled, users are able to use their Azure AD identity to connect to your services, and third part services such as Office 365. Where things get complicated, is when you enable Azure AD Connect to synchronize your on premises users with Azure AD and you enable password hash sync to allow authentication in the cloud. Azure AD in cloud only mode has a set of password policies it follows, which includes password expiry by default of 90 days. If your lucky enough to be using cloud only identity (no synchronization at all), then this isn’t a headache you really need to deal with. Moving your identity to Azure complicates things, and that’s what we are going to talk about today, and in particular password expiry and related processes in the world of Azure AD Connect.Īzure AD password policies vary depending on how you have things setup. Set the required policy for your domain, make sure it’s applied and forget about it, AD will take care of enforcing password changes and compliance with your password rules. One prerequisite is that you need to have Self Service Password Reset implemented, and you need to have an Azure AD Premium P1 or Azure AD Premium P2.In an on premises world, with Active Directory, password expiry is easy.
Office 365 password reset not working with ad sync how to#
In this blogpost I’ve shown you how to implement password writeback in your synchronized Azure AD environment. After you have changed your password, it is written back to your on-premises Active Directory and the following event is written to the eventlog of the Azure AD Connect server. To test the password write back option, follow the same procedure as in the SSPR blogpost. Check the following options:Ĭlick on OK to apply the changes to Active Directory and close any following pop-up boxes. Select the service account that was retrieved earlier under Principal and in the applies to dropdown box select Descendent User Objects. Open Active Directory and Computers, enable Advanced Features, select the properties of the domain, click on Security, click on Advanced and click Add. The following permissions need to be granted to the service account on either the domain object, or on an OU if you want to scope the permissions: To find out which service account is used by Azure AD Connect, start Azure AD Connect and select View Current Configuration and check the account as shown in the following screenshot: The service account that’s used by Azure AD Connect needs the appropriate permissions in your on-premises Active Directory to store the new password that has been set in Azure AD. Check the Password Writeback option as shown in the screenshot below and click Next to continue.įollow the wizard until the configuration is complete and click Exit to finish the wizard and store the new configuration. Follow the wizard until you reach the Optional Features. Start the Azure AD Connect wizard and select the Customize Synchronization Options. At the time of writing the latest version of Azure AD Connect was 1.1.882.0 (as of Sept.
Office 365 password reset not working with ad sync update#
Even better, use the auto update feature of Azure AD Connect to make sure you’re up-to-date. Make sure you always have the latest version of Azure AD Connect running. To configure password writeback you have to run the Azure AD Connect wizard. To implement password writeback, you need to have SSPR up-and-running. Enterprise Mobility + Security (EMS) E3 does include Azure AD Premium P1, EMS E5 does include Azure AD Premium P2. You this you need an Azure AD Premium P1 or Azure AD Premium P2 license. Luckily this feature is available, but the standard Office 365 licenses do not include password writeback functionality. These are managed in your on-premises Active Directory, so for SSPR to work you need to implement a password writeback solution. A nice feature for cloud identities, but this doesn’t work if you have synchronized identities or federated identities.
My previous blogpost was about the Self Service Password Reset (SSPR).