Plan for directory synchronization using Microsoft Entra Connect Sync

Completed

While Microsoft Entra Connect Sync requires a greater investment to deploy and support than Microsoft Entra Cloud Sync, it's still easy to implement. That being said, organizations must still thoroughly plan their Microsoft Entra Connect Sync implementation. This requirement is especially true if an organization has a complex on-premises Active Directory implementation or special requirements, such as partial attribute synchronization. To start planning, an organization should collect answers to the following questions:

  • On what server do you want to install Microsoft Entra Connect Sync?
  • Do you require a Microsoft Entra Connect Sync failover scenario?
  • Do you want to synchronize one or more Active Directories (or multiple forests)?
  • Do you want to synchronize all or only part of your Active Directory?
  • Do you want to synchronize all object attributes, or use specific filters?
  • Do you want to use advanced configuration features such as password hash synchronization, password writeback, or device writeback?

An organization's decision whether to implement password hash synchronization will affect its next steps. Be mindful of the following considerations:

  • Implementing password hash synchronization. Password hash synchronization enables users to authenticate using the same username and password as on-premises. Microsoft Entra Connect Sync synchronizes a user's password hash (a cryptographic hash of the password hash) and stores it in the respective user object in Microsoft Entra ID. Since the password can't be reverse-engineered, organizations can consider it as securely stored.
  • Not implementing password hash synchronization. If a company doesn't want its Active Directory password hashes stored outside the company, it must implement either Active Directory Federation Services (AD FS) or Microsoft Entra pass-through authentication to provide single-sign on. Alternatively, organizations can have each user provide with a separate password for their Microsoft Entra account.

Before you install Microsoft Entra Connect Sync

Before an organization installs Microsoft Entra Connect Sync, there are a few preparation tasks that it must complete. The following sections outline these tasks, which validate the hardware and connectivity requirements of Microsoft Entra Connect Sync.

Microsoft Entra ID

To run Microsoft Entra Connect Sync, an organization needs a Microsoft Entra tenant. You can get one with an Azure free trial. You can use either the Microsoft Entra admin portal or the Office portal.to manage Microsoft Entra Connect Sync.

An organization should then add and verify the domain it plans to use in Microsoft Entra ID. For example, if you plan to use contoso.com for your users, ensure you verify this domain and that you're not using just the contoso.onmicrosoft.com default domain.

A Microsoft Entra tenant allows, by default, 50,000 objects. When an organization verifies its domain, the limit increases to 300,000 objects. If it needs even more objects in Microsoft Entra ID, it must open a support case to have the limit increased even further. If it needs more than 500,000 objects, it needs a license, such as Microsoft 365, Microsoft Entra Premium, or Enterprise Mobility + Security.

Prepare your on-premises data

Organizations should consider the following requirements when preparing their on-premises data:

On-premises Active Directory

Organizations should consider the following requirements when planning their on-premises Active Directory:

  • The Active Directory schema version and forest functional level must be Windows Server 2003 or later. The domain controllers can run any version as long as it satisfies the schema version and forest-level requirements. An organization might require a paid support program if it requires support for domain controllers running Windows Server 2016 or older.
  • The domain controller used by Microsoft Entra ID must be writable. Microsoft Entra Connect Sync doesn't support a read-only domain controller (RODC), nor does it follow any write redirects.
  • Microsoft Entra Connect Sync doesn't support using on-premises forests or domains by using "dotted" NetBIOS names, which are names containings a period.
  • Microsoft recommends that organizations enable the Active Directory recycle bin.

PowerShell execution policy

Microsoft Entra Connect Sync runs signed PowerShell scripts as part of the installation. You must ensure the PowerShell execution policy allows running of scripts. The recommended execution policy during installation is "RemoteSigned."

Additional reading. For more information on setting the PowerShell execution policy, see Set-ExecutionPolicy.

Microsoft Entra Connect Sync server

The Microsoft Entra Connect Sync server contains critical identity data. Therefore, it's important that organizations properly secure administrative access to this server. Follow the guidelines in Securing privileged access.

Organizations should treat the Microsoft Entra Connect Sync server as a Tier 0 component as documented in the Active Directory administrative tier model. Microsoft recommends that organizations harden the Microsoft Entra Connect Sync server as a Control Plane asset by following the guidance provided in Secure Privileged Access.

Additional reading. To read more about securing your Active Directory environment, see Best practices for securing Active Directory.

SQL Server used by Microsoft Entra Connect Sync

Microsoft Entra Connect Sync requires a SQL Server database to store identity data. By default, Microsoft Entra Connect Sync installs a SQL Server 2019 Express LocalDB, which is a light version of SQL Server Express.

SQL Server Express has a 10-GB size limit that enables organizations to manage approximately 100,000 objects. If an organization must manage a higher volume of directory objects, it must point the installation wizard to a different installation of SQL Server. The type of SQL Server installation can impact the performance of Microsoft Entra Connect Sync.

If an organization uses a different installation of SQL Server, the following requirements apply:

  • Microsoft Entra Connect Sync supports all mainstream supported SQL Server versions up to SQL Server 2019. Refer to the SQL Server lifecycle article to verify the support status of your SQL Server version. Microsoft Entra Connect Sync doesn't support Azure SQL Database and Azure SQL Managed Instance.
    • You must use a case-insensitive SQL collation. These collations are identified with a _CI_ in their name. Microsoft Entra Connect doesn't support a case-sensitive collation identified by _CS_ in their name.
    • You can have only one sync engine per SQL instance. Microsoft Entra Connect Sync doesn't support sharing a SQL instance with FIM/MIM Sync, DirSync, or Microsoft Entra Sync.

Accounts

An organization must have a Microsoft Entra Global Administrator account or a Hybrid Identity Administrator account for the Microsoft Entra tenant that it wants to integrate with. This account must be a school or organization account. It can't be a Microsoft account.

If an organization uses express settings or upgrades from DirSync, it must have an Enterprise Administrator account for its on-premises Active Directory.

An organization has more options if it uses the custom settings installation path. For more information, see Custom installation settings.

Connectivity

Organizations should consider the following requirements when planning their network connectivity with the Microsoft Entra Connect Sync server:

  • The Microsoft Entra Connect Sync server needs DNS resolution for both intranet and internet. The DNS server must be able to resolve names both to your on-premises Active Directory and the Microsoft Entra endpoints.
  • Microsoft Entra Connect Sync requires network connectivity to all configured domains.
  • Microsoft Entra Connect Sync requires network connectivity to the root domain of all configured forest.
  • If an organization limits the URLs its proxy or firewall can access, it must open the URLs documented in Office 365 URLs and IP address ranges. Also see Safelist the Azure portal URLs on your firewall or proxy server.
  • Microsoft Entra Connect Sync (version 1.1.614.0 and after) by default uses TLS 1.2 for encrypting communication between the sync engine and Microsoft Entra ID. If TLS 1.2 isn't available on the underlying operating system, Microsoft Entra Connect Sync incrementally falls back to older protocols (TLS 1.1 and TLS 1.0). From Microsoft Entra Connect Sync version 2.0 onwards. Microsoft Entra Connect Sync doesn't support TLS 1.0 and 1.1. A Microsoft Entra Connect Sync installation fails if TLS 1.2 isn't enabled.
  • Prior to version 1.1.614.0, Microsoft Entra Connect Sync by default uses TLS 1.0 for encrypting communication between the sync engine and Microsoft Entra. To change to TLS 1.2, follow the steps in Enable TLS 1.2 for Microsoft Entra Connect Sync.

Additional reading. For more information, see Microsoft Entra Connect Sync ports if you have firewalls on your intranet and you need to open ports between the Microsoft Entra Connect Sync servers and your domain controllers. If you're using the Microsoft cloud in Germany or the Microsoft Azure Government cloud, see Microsoft Entra Connect Sync sync service instances considerations for URLs.

Outbound proxy server requirements

This section only applies when an organization uses an outbound proxy for connecting to the internet.

In this scenario, the organization must add the following setting in the C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\machine.config file. The installation wizard and Microsoft Entra Connect Sync requires this setting to connect to the internet and Microsoft Entra ID. The organization must enter this text at the bottom of the file. In this code, <PROXYADDRESS> represents the actual proxy IP address or host name.

Diagram showing code for the machine.config file when an organization uses an outbound proxy for connecting to the internet.

If an organization's proxy server requires authentication, its domain must include the service account. To specify a custom service account, an organization must use the customized settings installation path.

The organization also needs a different change to the machine.config file so that the installation wizard and sync engine respond to authentication requests from the proxy server. All installation wizard pages, excluding the Configure page, use the signed-in user's credentials. On the Configure page at the end of the installation wizard, the context switches to the service account that you created. The machine.config section should look like this:

Diagram showing code for the machine.config file when the install wizard and sync engine respond to authentication requests from the proxy server.

If an existing setup is performing the proxy configuration, you must restart the Microsoft Entra Sync service for Microsoft Entra Connect Sync to read the proxy configuration and update the behavior.

Warning

When Microsoft Entra Connect Sync sends a web request to Microsoft Entra ID as part of directory synchronization, Microsoft Entra ID can take up to 5 minutes to respond. It's common for proxy servers to have a connection idle timeout configuration. As such, it's important that you verify the configuration, and if necessary, adjust the connection idle timeout setting to at least 6 minutes or more. Administrators typically become aware of a connection idle timeout issue through the observation of symptoms such as failed or delayed directory synchronization. They may notice that the synchronization process takes longer than expected or encounters errors during the sync operation. To investigate and identify the cause of such issues, administrators would typically review logs and monitoring tools related to Microsoft Entra Connect Sync, the proxy server, or any associated network infrastructure. These logs might indicate connection timeouts or failures that could point to a connection idle timeout problem.

Additional reading. For more information, see MSDN about the default proxy element. For more information when you have problems with connectivity, see Troubleshoot connectivity problems.

Hardware requirements for Microsoft Entra Connect Sync

The following table shows the minimum requirements for the Microsoft Entra Connect Sync server.

Number of objects in Active Directory CPU Memory Hard drive size
Fewer than 10,000 1.6 GHz 4 GB 70 GB
10,000–50,000 1.6 GHz 4 GB 70 GB
50,000–100,000 1.6 GHz 16 GB 100 GB
For 100,000 or more objects, the full version of SQL Server is required. For performance reasons, installing locally is preferred.
100,000–300,000 1.6 GHz 32 GB 300 GB
300,000–600,000 1.6 GHz 32 GB 450 GB
More than 600,000 1.6 GHz 32 GB 500 GB

The minimum requirements for computers running AD FS or Web Application Proxy servers are:

  • CPU. Dual core 1.6 GHz or higher.
  • Memory. 2 GB or higher.
  • Azure VM. A2 configuration or higher.

Knowledge check

Choose the best response for the following question. Then select “Check your answers.”

Check your knowledge

1.

As the Enterprise Administrator for Tailspin Toys, you're planning to use Microsoft Entra Connect Sync as your directory synchronization tool. Tailspin's on-premises Active Directory has less than 100,000 objects. Which of the following statements applies given the company's configuration?