Skip to main content
< All Topics
Print

Comprehensive Knowledge Base article that walks you through enabling SSPR in a hybrid environment

Prerequisites

Before enabling SSPR, ensure the following:

Licensing

  • Microsoft Entra ID P1 or P2 (required for password writeback)

Infrastructure Requirements

  • Azure AD Connect (latest version recommended)
  • Hybrid identity configured and syncing users
  • At least one writable domain controller
  • Outbound HTTPS (TCP 443) access from Azure AD Connect server

Permissions

  • Global Administrator (initial setup)
  • Domain Admin (for Azure AD Connect configuration)

Architecture Overview

SSPR in hybrid works as follows:

  1. User initiates password reset in Microsoft 365
  2. Identity is verified using configured authentication methods
  3. Azure sends request via Azure AD Connect
  4. Password is written back to on-prem Active Directory

Step 1: Enable SSPR in Microsoft Entra ID

  1. Go to:
  2. Navigate to:
    • ProtectionPassword reset
  3. Under Properties:
    • Set Self service password reset enabled to:
      • Selected (recommended for pilot)
      • or All
  4. Click Save

Step 2: Configure Authentication Methods

  1. Go to:
    • Password resetAuthentication methods
  2. Configure:
    • Number of methods required (recommended: 2)
    • Methods available:
      • Mobile app notification
      • Mobile app code
      • Email
      • Mobile phone
      • Office phone
      • Security questions (less recommended)

Best Practice

  • Enable:
    • Authenticator app
    • SMS
  • Avoid relying solely on security questions

Step 3: Configure Registration Settings

  1. Go to:
    • Password resetRegistration
  2. Enable:
    • Require users to register when signing in
  3. Set:
    • Number of days before reconfirmation (recommended: 180)

Step 4: Enable Password Writeback in Azure AD Connect

This is the critical hybrid step.

On the Azure AD Connect Server:

  1. Open:
    • Azure AD Connect
  2. Click:
    • Configure
  3. Select:
    • Customize synchronization options
  4. Authenticate as Global Admin
  5. Continue through options until:
    • Optional Features
  6. Check:
    • Password writeback
  7. Complete the wizard

Step 5: Set Required Permissions in Active Directory

Azure AD Connect automatically sets permissions, but verify:

Required permissions on the domain:

  • Reset password
  • Write lockoutTime
  • Write pwdLastSet

Verify via:

  • ADSIEdit or Delegation Wizard on domain root

Step 6: Configure Password Policies

Ensure alignment between:

On-Prem AD:

  • Password complexity
  • Minimum length
  • Lockout policies

Microsoft Entra:

  • Cloud password policy (if used)

⚠️ Mismatched policies can cause failed resets.


Step 7: Test SSPR End-to-End

Test Scenario:

  1. Go to:
  2. Select:
    • “Forgot my password”
  3. Enter test user
  4. Complete authentication
  5. Reset password
  6. Validate:
    • User can log in to:
      • Domain-joined machine
      • VPN
      • Microsoft 365

Step 8: Monitor and Validate

Azure Logs:

  • Go to:
    • Entra IDMonitoringAudit logs
  • Filter:
    • Password reset events

Azure AD Connect Logs:

  • Event Viewer:
    • Applications and Services Logs
    • Directory Synchronization

Step 9: Rollout Strategy (Recommended)

Phase 1: Pilot

  • IT team or small user group

Phase 2: Department rollout

  • High-volume support users first

Phase 3: Organization-wide

  • Enable for all users

Security Best Practices

  • Require 2 authentication methods
  • Enforce MFA registration
  • Disable security questions if possible
  • Monitor for suspicious reset activity
  • Combine with:
    • Conditional Access policies

Common Issues & Troubleshooting

1. Password writeback fails

  • Check Azure AD Connect health
  • Verify outbound connectivity (TCP 443)
  • Confirm permissions on AD

2. “You can’t reset your password” error

  • User not in SSPR scope
  • Missing authentication methods

3. Password resets but cannot log in

  • AD replication delay
  • Cached credentials on device

4. Authentication methods not prompting

  • User has not completed registration
  • Registration enforcement not enabled

Helpful PowerShell Commands

Check Azure AD Connect version:

Get-ADSyncGlobalSettings

Force sync:

Start-ADSyncSyncCycle -PolicyType Delta