Deploy on-premises Microsoft Entra Password Protection

R, Sandeep 20 Reputation points
2023-11-09T13:50:25.9466667+00:00

Hi Team,

We are looking implement on-premised entra password protection and following document and we have a question before we can proceed further.

https://learn.microsoft.com/en-us/entra/identity/authentication/howto-password-ban-bad-on-premises-deploy

We want to understand if password is sent from On-premises AD to Azure AD?

Sandeep

Microsoft Security | Microsoft Entra | Microsoft Entra ID
{count} votes

Accepted answer
  1. Dr. S. Gomathi 710 Reputation points MVP
    2023-11-09T13:55:51.66+00:00

    Hi Sandeep,

    Based on the provided documentation, the actual password validation happens locally within the on-premises environment using the banned password lists obtained from Azure. The passwords themselves are not sent to Azure AD for validation. The communication with Azure is primarily for the proxy service to download the banned password lists, which are then used by the DC agent during password change events.

    Hope this helps.


2 additional answers

Sort by: Most helpful
  1. R, Sandeep 20 Reputation points
    2023-11-09T14:20:02.3566667+00:00

    Hi Dr Gomathi,

    Thanks for quick answer. I have a followup question. How often does the proxy download policies from Azure AD? Does it download during every password resets?

    Documents mentions how it works, but doesn't mention anywhere if policies are downloaded to DC, so I was confused. It is not very clear in the document.

    1. The Microsoft Entra Password Protection Proxy service runs on any domain-joined machine in the current AD DS forest. The service's primary purpose is to forward password policy download requests from DCs to Microsoft Entra ID and then return the responses from Microsoft Entra ID to the DC.
    2. The password filter DLL of the DC Agent receives user password-validation requests from the operating system. The filter forwards them to the DC Agent service that's running locally on the DC.
    3. The DC Agent service of Microsoft Entra Password Protection receives password-validation requests from the password filter DLL of the DC Agent. The DC Agent service processes them by using the current (locally available) password policy and returns the result of pass or fail.

    Sandeep

    0 comments No comments

  2. Ed Harrison 336 Reputation points
    2024-04-09T08:45:40.6333333+00:00

    As is always the way, there are multiple documents which seem to say much the same thing, but often have extra snippets of goodness in them. In this case, Sandeep, I think https://learn.microsoft.com/en-us/entra/identity/authentication/concept-password-ban-bad-on-premises#how-microsoft-entra-password-protection-works includes the fact that the DC agent will request a new copy of the policy if the existing one is older than an hour. So, I guess, if you have password set/change events relatively rarely (i.e. more than an hour apart), it will get a new policy each time, but if you have lots of events happening all the time, then you'll just get a new policy every hour.

    The docs also say that if no policy is available, then passwords will be accepted unvalidated - however, what isn't clear is whether the DC will immediately discard a policy which is older than an hour. In other words, if it decides the current policy is old and it should get a new policy, but there's a problem with the proxy service, so can't get a new copy, will it the password with the old policy, or discard the old policy (because it is > 1 hour old) and accept the password without validation.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.