Forum Discussion

Gurdev Singh's avatar
Gurdev Singh
Iron Contributor
Jun 13, 2019

Azure AD Connect sync account MFA support

Does the account that AAD Connect uses to connect to Azure AD requires MFA to be disabled? It's the account that AAD Connect creates itself during the installation process.

 

Recently, we noticed that if MFA is enforced for this account then AAD Connect starts raising errors.

18 Replies

  • AndyDotPhillips's avatar
    AndyDotPhillips
    Copper Contributor
    Based on the previous comments, unsure if the upcoming 15-Oct-2024 MFA requirement for Azure/Entra/Intune portals apply to this?

    https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mandatory-multifactor-authentication
    • hobdeyc's avatar
      hobdeyc
      Copper Contributor

      AndyDotPhillips 

       

      It looks like that https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mandatory-multifactor-authentication has been updated with clarification on the Azure AD Connect sync accounts (excerpt shown below for convenience):


      Question: Will phase 1 or phase 2 of mandatory MFA impact my ability to sync with Microsoft Entra Connect or Microsoft Entra Cloud Sync?


      Answer: No. The syncronization service account isn't affected by the mandatory MFA requirement. Only applications listed previously require MFA for sign in.

       

  • Adam__Brown__'s avatar
    Adam__Brown__
    Copper Contributor

    Gurdev Singh 

     

    MFA is definately the issue here, I came across your post after experiencing similar issues. MFA was enfored to all accounts by Microsoft and disrupted our AD sync. The account i authenticated with in Azure AD was set to disabled for MFA but the issue remained. After much digging i then discovered that the account actually used for the sync was an account called sync_servername_tenant.

     

    Within the admin portal search for a user starting with Sync_ your server name should follow after the _.

     

    Once found visit the Multi-factor authentication menu and disabled multi-factor authentication for this sync_servername account.

     

    Its this account that is used by Azure AD Connect to sync on-prem AD to Azure. Once disabled you will find that your AD Connect sync resumes without issue.

  • Yes, exclude it from MFA or any CA policies that require MFA. The account you use to configure AAD Connect can have MFA on, but that one is only used to create the actual sync account.

Resources