Skip to main content

Deploying Microsoft Entra Self-Service Password Reset in a Hybrid Environment with PowerShell

· 5 min read

One of the first things organizations do once they upgrade to a M365 license type that includes Microsoft Entra ID P1 is to start rolling out Conditional Access Polices to incorporate fine-grained security polices. However, after that, an attractive feature, especially for organizations with a hybrid environment, is the Self-Service Password Reset (SSPR) feature.

Overview

By default, Microsoft Entra ID Free allows password hash synchronization from on-premises Active Directory (AD) to Entra ID. However, any password changes made in Entra ID are not synced back to on-premises AD — essentially making it a one-way sync.

With Entra ID P1 or higher, you can enable password writeback via Entra Connect, allowing password changes in Entra ID to sync back to on-premises AD. This is a game-changer for hybrid organizations, as it lets users securely reset their passwords from anywhere — even if they are off the corporate network.

In this guide, I’ll show you how to gradually roll out SSPR in a hybrid environment using PowerShell to streamline the deployment process.

Prerequisites

Before getting started, ensure you meet the following requirements:

Microsoft Entra ID P1 or higher (for password writeback)
Entra Connect set up and syncing with AD
Hybrid Identity Administrator role (minimum permission needed)

Step 1: Create an Active Directory security group and enable password writeback with Entra Connect

  1. Create a new security group in Active Directory that will contain the users you want to enable SSPR for. For instance, create a group called SSPR-Enabled-Users.
tip

Make sure the security group resides in an OU that is being synchronized to Microsoft Entra ID using Entra Connect.

  1. Open the Entra Connect wizard to enable password writeback.
  2. Navigate to Entra Connect > Configure > Customize synchronization options and click Next.
  3. Enter the Hybrid Identity Administrator or Global Administrator credentials and click Next.
  4. Click Next until reaching the Optional Features section. Select Password writeback and click Next.
  5. Click Configure and once the configuration is complete, click Exit. Entra Connect password writeback setting
tip

Verify synchronization is working properly by creating a test user and running a Delta sync Start-ADSyncSyncCycle -PolicyType Delta.

If you don't already have the ADSyncTools PowerShell module installed, you can install the module by running the following command:

[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
Install-Module -Name ADSyncTools

Step 2: Enable SSPR in Microsoft Entra ID

info

As of the date of writing this guide, SSPR only supports adding one Microsoft Entra group or all users to SSPR. Nested groups are supported for wider deployments; however, nested groups aren't necessarily helpful, because one, coming from an on-premises environment, most departments are separated by Organizational Units (OUs) and not groups. Secondly, creating additional groups for the sake of gradually rolling out SSPR can be cumbersome and difficult to manage.

  1. Navigate to the Microsoft Entra portal and sign in with an account that has the minimum role of Hybrid Identity Administrator.
  2. Navigate to Protection > Password Reset > On-premises integration to verify Microsoft Entra ID is detecting password writeback properly configured with the on-premises Entra Connect.
  3. Navigate to Protection > Password Reset.
  4. Under Manage > Properties, toggle Self service password reset enabled to Selected.
  5. Select the SSPR-Enabled-Users group you created in Step 1.
  6. Click Save.

At this point, we can stick primarily with the default settings; however, you can customize the Authentication methods to suit your organization's requirements. Additionally, setting the Number of methods required to reset to 2 can add an additional level of security to SSPR.

Add additional authentication methods

To add additional authentication methods for SSPR, navigate to Protection > Authentication methods > Policies to enable additional authentication methods that can be used with SSPR. Keep in mind that these enabled authentication methods will apply to both Multi-Factor Authentication (MFA) and SSPR since Microsoft Entra ID now uses Combined Registration to allow users to register for both MFA and SSPR at the same time.

Step 3: Create a PowerShell script to gradually add licensed users associated with OUs (Departments) to the SSPR security group

Now for the fun part! 🎉 Let's write some PowerShell 🤖 to automate the gradual rollout of SSPR to users associated with OUs.

info

The machine running this PowerShell script will need the Active Directory PowerShell module installed. This module is included with the Remote Server Administration Tools (RSAT). From an elevated PowerShell session, run the following command to install the module:

Install-WindowsFeature RSAT-AD-PowerShell
  1. First, a little preparation. Navigate to the Microsoft 365 admin center and download a list of users licensed with Microsoft Entra ID P1 or higher. While all users in the tenant can technically use SSPR as long as at least one Entra ID P1 license is available, only those with Entra ID P1 or higher should utilize it to remain in compliance with licensing requirements. A CSV file can be downloaded by navigating to Users > Active users > Export users.
  2. Secondly, lets create a CSV file that contains the OUs. We can use PowerShell 😎 to accomplish this.
$OUs = Get-ADOrganizationalUnit -Filter * -SearchBase 'OU=assumebreach users,DC=assumebreach,DC=local'
$OUs | Select-Object Name, DistinguishedName | Export-Csv -Path 'C:\temp\ou-list.csv' -NoTypeInformation