New enforcement logic and audit controls aim to block SyncJacking and strengthen hybrid identity protection.
Key Takeaways:
Microsoft is strengthening Entra Connect security to block account takeover attempts stemming from hard match abuse (commonly referred to as SyncJacking). The new protections are scheduled to take effect starting in March 2026.
Microsoft Entra Connect is a tool that synchronizes on-premises Active Directory with Microsoft Entra ID (formerly Azure AD). It enables a unified identity for users across cloud and on-premises environments. This service ensures consistent authentication and access control by syncing user accounts, groups, and attributes, supporting hybrid identity scenarios like single sign-on and password hash synchronization.
Microsoft will introduce a new enforcement logic in Entra Connect that will verify the OnPremisesObjectIdentifier to prevent unauthorized remapping attempts. Moreover, the updated audit logs will help administrators record any changes made to OnPremisesObjectIdentifier and DirSyncEnabled to provide better visibility into potential security risks. For legitimate recovery scenarios, administrators will also be able to clear the OnPremisesObjectIdentifier to ensure secure and controlled remediation when necessary.
To comply with the new security measures, administrators will need to upgrade to the latest version of Microsoft Entra Connect and review the updated hardening guidance. They will also need to enable the suggested flags as well as disable hard match takeover to strengthen protection against account compromise.
It’s important to note that blocked operations will display an error message stating: “Hard match operation blocked due to security hardening. Review OnPremisesObjectIdentifier mapping.” Administrators will need to use audit logs to identify affected objects by reviewing changes to OnPremisesObjectIdentifier or DirSyncEnabled. For legitimate recovery, the OnPremisesObjectIdentifier should be cleared and reset using the Microsoft Graph API with the following request:
POST https://graph.microsoft.com/beta/users/?$select=onPremisesObjectIdentifier
{
onPremisesObjectIdentifier: null
}
This security enhancement would help commercial customers reduce the risk of account compromise through hard match abuse. It ensures greater integrity in identity synchronization processes by enforcing stricter checks, improving audit visibility, and providing controlled recovery options. These measures strengthen overall security posture and simplify incident response to help organizations maintain compliance and protect sensitive user accounts in hybrid environments.