Last Update: Sep 04, 2024 | Published: Mar 03, 2022
In this guide, I’ll provide information on where to download Microsoft Entra Connect (previously called Azure AD Connect) and walk you through the installation and configuration of it.
Microsoft states that the most common topology is a single on-premises forest, with one or multiple domains, and a single Microsoft Entra ID tenant. My guide will follow this topology, using a new Windows Server 2019 forest and domain, an Microsoft Entra ID tenant using a Premium P2 trial license, and a verified custom domain.
Please note that Microsoft Entra Connect and Azure AD Connect are used interchangeably in this article because Microsoft has yet to update the application to reflect the name change.
Before we delve into the detail, here are the 6 high-level steps required to get Azure AD Connect V2 set up and working:
Simply put, Microsoft Entra Connect allows you to synchronize your Active Directory (AD) with Microsoft Entra ID. This extends your old-school but still critically important Windows Server Active Directory to Microsoft’s cloud-hosted Microsoft Entra ID, and helps you achieve your goal of creating a hybrid identity.
If you are unfamiliar with these terms or need a refresher, that’s okay. We recommend taking the time to check out our comparison of Active Directory and Microsoft Entra ID before going further.
Microsoft Entra Connect contains features like password hash synchronization (PHS), pass-through authentication (PTA) and integration with Active Directory Federation Services (AD FS). These and other features are explained in Microsoft’s What is Microsoft Entra Connect support page.
Also, please note that Microsoft Entra Domain Services is a different offering by Microsoft, and it’s not covered in this guide.
Microsoft Entra Connect brings some significant changes:
Microsoft has already announced that all Azure AD Connect V1 versions will be retired on August 31, 2022. This alone should be a good incentive to upgrade to Microsoft Entra Connect.
Please see Petri’s Russel Smith’s article about what’s new in Azure AD Connect V2 for more information about the biggest changes in Microsoft Entra Connect. Also, Microsoft’s Entra Connect: Version release history support page contains more important details on new features and functionalities.
Before we can install Microsoft Entra Connect, there are a few things that we’ll need:
For this guide, we’ll simply use a Global Administrator account for the Microsoft Entra ID tenant and a member of the AD Enterprise Admins group for the AD connectivity. In your production environments, make sure you use dedicated accounts that cover just the minimum permissions required for your situation and keep your password safe. See Microsoft’s Microsoft Entra Connect: Accounts and permissions support page for full details.
The first thing we’ll need to do is download the Microsoft Entra Connect installer. Here’s how to proceed.
Once downloaded we’ll execute this installer (AzureADConnect.msi) on our Microsoft Entra Connect server (domain controller or dedicated server). Elevated privileges are required for this, so make sure you select Yes when prompted.
Once the installer loads, you’ll be greeted by the Welcome to Azure AD Connect screen. Once you’ve accepted the license terms and privacy notice, click Continue.
In the Express Settings screen, you’ll need to select Customize at the bottom of the page. The Express Settings might be suitable for many environments, but certain settings can only be set using the Customized Settings installation.
On the Install required components screen, you can customize settings affecting Azure AD Connect:
Once you’ve completed your selection, click Install. The installer will install the required components like the Synchronization Service.
After a few moments, the User sign-in screen will be displayed. You can select one of the following options:
You can also enable single sign-on for your users. Pick your desired method (we’re using Password Hash Synchronization for this guide), and click Next.
On the Connect to Azure AD screen, enter your Azure AD account credentials (see prerequisites in the previous section). You might be prompted to change your password if you haven’t logged in with this account before. Also, if MFA is enabled on your account, then you might get challenged to satisfy whatever requirements your organization has set.
Click Next to continue.
On the Connect your directories screen, under FOREST, select your directory and click Add Directory.
In a pop-up window, you’ll be prompted to select either Create a new account or Use existing account. This account will be used for directory synchronization.
If you have already created an account for this, then make sure that it is NOT a member of the Enterprise Admins or Domain Admins group. For this guide, we’ll create a new account.
You’ll see your added directory listed under CONFIGURED DIRECTORIES. You also have an option to remove one or more added directories should your requirements or circumstances have changed.
Once completed, click Next.
On the Azure AD Sign-in configuration screen, you’ll see the Active Directory UPN Suffix and corresponding Azure AD Domain status for all your added directories. If any of your domains aren’t verified or added, then you can fix this and refresh this screen using the Refresh icon below the table.
On the same page, you’ll also get to customize your User Principal Name (UPN), the on-premises attribute that will be used as the Azure AD username.
You are required to make a critical decision on how your users will be identified in Azure AD. Unlike Active Directory, Azure AD does not allow duplicates.
Strictly speaking, AD doesn’t allow duplicates either, but it doesn’t really enforce this. You could have duplicated UPNs in your AD and get away with it, whereas Azure AD will only synchronize the first account, ignoring any subsequent ones. You could also have the same usernames in multiple directories and the same limitation will apply.
If you are concerned that this might apply to you, then you can verify your AD using idFix before initiating the Azure AD Connect setup. See Microsoft’s GitHub page on idFix for further information.
Typically, you can leave this set to the default userPrincipalName value, but your specific circumstances may differ. Non-routable domain names (common ones are .local or .internal) are also a good reason to change your UPN, but this can also be addressed by adding an alternative (and routable) UPN suffix via Active Directory Domain and Trusts.
Click Next to continue.
On the Domain and OU filtering screen, you can either sync all domains and Organizational Units (OUs) or customize which ones you’d like to synchronize. Microsoft states that certain OUs are essential for functionality and you should leave them selected. Microsoft’s Organizational unit–based filtering includes further information on those OUs.
Click Next to continue.
On the Uniquely identify your users screen, select the options best in line with your infrastructure. As in the previous section, it is critical to get this right.
While the default values may suit many organizations, your environment might require you to spend some time and effort identifying the values best for you. See Microsoft’s Uniquely identifying your users support page for further information.
Once ready, click Next to continue.
On the Filter users and devices screen, you can limit which users and devices will be synchronized to Azure AD by specifying a single group. This is a convenient way to limit your initial pilot deployment.
These settings can be changed after you have completed your pilot and worked out all the problems of your deployment, should you encounter any. If you want to use this, then simply enter the name of your pilot group and click the Resolve button.
Bear in mind that Microsoft warns that this feature is not meant to be used in a production deployment, so make sure you change it before going live.
For this guide, I have created a group called HybridUsers and added all my test users to it.
Click Next to continue.
On the Optional features screen, you can set additional settings unique to your organization’s requirements:
For this guide, I’ll keep the default values. For your environment, make sure you select the most appropriate settings and bear in mind that some have specific requirements. Microsoft has further information on its Optional features support page.
Click Next to continue.
We’ve made it to the Ready to configure screen, which provides you with a selective overview of your choices. It also allows you to set the following two options:
Now, Azure AD Connect will deploy your settings, install several components, and then kick off the initial sync between your AD and your Azure AD. This might take a while depending on the size of your AD.
Still in Azure Active Directory, in the Manage section, select Users. You’ll find all your selected on-prem (AD) users synchronized to Azure AD. Note the Directory synced column, this will allow you to easily determine if an account was synced from your on-prem AD or born in the cloud (Azure AD).
Azure AD Connect installs and enables further tools and portals that will help you get the most out of your hybrid identity setup:
Now that we have installed Microsoft Entra Connect and checked that the two directories are in sync with each other, it might be time to check out some of the more advanced use cases like enabling Single Sign-On (SSO) and Pass-through authentication. Also, you’ll need to stay up-to-date on new versions of Microsoft Entra Connect, as Microsoft likes to release new features and occasionally remove some that you might be using in your environment.
Related Article: