Configure Password Writeback in Azure AD

In this post I will show you how to enable and configure password writeback in your Azure AD hybrid environment. By enabling password writeback feature you can synchronize password changes in Azure Active Directory back to your on-premises Active Directory environment.

To enable password writeback feature, we use Azure AD Connect tool to that provides secure mechanism to send password changes back to an existing on-premises directory from Azure AD. To know how the password writeback feature works, read this article.

Most of all ensure you always have the latest version of Azure AD Connect running. That’s an important point because the password writeback feature will stop working for Azure AD Connect versions 1.0.8641.0 and older than that.

So what happens when a user resets the password and what about password complexity ?. When a user resets the password, it is checked to ensure it meets your on-premises Active Directory policy before committing it to that directory. That includes the complexity, age, password filters that has been defined in local Active Directory.

If you haven’t enabled password writeback in Azure AD, you will see something similar shown in the below screenshot. When you click password reset – On-premises integration, it shows On-premises integration has not been enabled yet.

Configure Password Writeback in Azure AD

Azure AD Password Writeback Prerequisites

To use password writeback, you must have one of the following licenses assigned on your tenant.

  • Azure AD Premium P1
  • Azure AD Premium P2
  • Enterprise Mobility + Security E3 or A3
  • Enterprise Mobility + Security E5 or A5
  • Microsoft 365 E3 or A3, Microsoft 365 E5 or A5, Microsoft 365 F1
  • Microsoft 365 Business

Configure Password Writeback in Azure AD

First of all to configure password writeback, sign in to your Azure AD Connect server. Start the Azure AD Connect configuration wizard. On the Welcome page, select Configure.

Microsoft Azure Active Directory Connect tool

Next on the Additional tasks page, select Customize synchronization options.

customize synchronization options

  • On the Connect to Azure AD page, enter a global administrator credential, and then select Next.
  • Click Next on the Connect directories and Domain/OU filtering pages.
  • On the Optional features page, enable Password writeback and select Next.

Configure Password Writeback in Azure AD

Click Configure.

Microsoft Azure Active Directory Connect tool

The Configuration is complete. You also see the message Azure AD connect configuration succeeded. The synchronization process has been initiated.

Microsoft Azure Active Directory Connect tool

In the above steps you enabled the password writeback in Azure AD. In the next step we will enable password writeback option in SSPR.

Enable password writeback option in SSPR

  • Open the Azure portal and sign in with a Global Administrator account.
  • Go to Azure Active Directory and click on Password Reset.
  • From the left pane, select On-premises integration.
  • Set the option for Write back passwords to your on-premises directory to Yes.
  • You can also set Allow users to unlock accounts without resetting their password to Yes.
  • Finally click Save.

Password Writeback

Related Posts
Oldest Most Voted
Inline Feedbacks
View all comments

Hi, how to match/Sync users while users are exists with same name on Azure-AD and On-Prem AD while doing first time AAD Sync what are the options i have to select so that duplicate users will not be created on Azure AD.

James Cook

Hi, does anyone know how this works with an initial sync from an On-Prem AD to an existing user base in Azure AD? Ideally id want to sync users, match with existing cloud accounts and have the cloud password become THE user password rather than be overwritten with the On-Prem AD password.



I receive error messages with the description “ADAdminActionRequired” in the password reset logs when trying to reset from Azure AD. I have double checked the permissions and they are correct, and have disabled all on-prem password policy GPOs. Is there anything else I can check?

I don’t think it’s a licensing issue. My Azure AD tenant shows Azure AD Premium P1 for its license, and the Licensed Features section lists password writeback as available.

Many thanks



I’m very confuse wit licence to manage it.
Today i have several license :
Office 365 Enterprise E3
Office 365 Business Premium
Office 365 Business Essentials

It seems not working because i haven’t the appropriate licence.

Does i need to buy AD premium P1 for each users or only one to activate this functionnlity?

Thanks in advance for your answer.

Ryan Goldstein

Yes, u need to by p1

Lane Boudreaux

I have been using password hash with AAD write back for awhile now. Still having trouble with password expiration in local AD and AAD expiring together. Users can still access email on cloud apps but cannot access apps that use LDAP for authentication since the password expired maybe need some type of notification


Accorind to MS:

If there are synchronized users that only interact with Azure AD integrated services and must also comply with a password expiration policy, you can force them to comply with your Azure AD password expiration policy by enabling the EnforceCloudPasswordPolicyForPasswordSyncedUsers feature.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More