Hybrid Azure AD Join with Alternate Login ID (PHS)

%3CLINGO-SUB%20id%3D%22lingo-sub-1983669%22%20slang%3D%22en-US%22%3EHybrid%20Azure%20AD%20Join%20with%20Alternate%20Login%20ID%20(PHS)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1983669%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%3CBR%20%2F%3E%3CBR%20%2F%3ECould%20somebody%20clarify%20whether%20%3CSTRONG%3EHybrid%20Azure%20AD%20Join%3C%2FSTRONG%3E%20is%20supported%20when%20using%20%3CSTRONG%3EAlternate%20Login%20ID%3C%2FSTRONG%3E%3F%26nbsp%3BIn%20this%20scenario%20I'm%20using%20the%20%3CSTRONG%3EMail%3C%2FSTRONG%3E%20attribute%20to%20sync%2Frepresent%20the%26nbsp%3B%3CSTRONG%3EUPN%26nbsp%3B%3C%2FSTRONG%3Ein%20Azure%20AD.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20following%20article%20says%20that%20the%20AD%20on%20premises%20UPN%20needs%20to%20be%20internet%20routable%20(and%20verified%20in%20Azure%20AD)%20to%20be%20supported%20with%26nbsp%3B%3CSTRONG%3EHAADJ%3C%2FSTRONG%3E.%20However%2C%20it%20makes%20no%20reference%20to%20using%26nbsp%3B%3CSTRONG%3EAlternate%20Login%20ID%3C%2FSTRONG%3E%20in%20this%20article%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Fhybrid-azuread-join-plan%23review-on-premises-ad-users-upn-support-for-hybrid-azure-ad-join%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Fhybrid-azuread-join-plan%23review-on-premises-ad-users-upn-support-for-hybrid-azure-ad-join%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20ran%20some%20initial%20tests%20in%20a%20lab%2Ftest%20scenario%20which%20showed%20%3CSTRONG%3EHAADJ%3C%2FSTRONG%3E%26nbsp%3Bregistration%20and%20access%20to%20modern%20apps%20functioning%20in%20the%20sign-in%20logs%3B%20however%20functioning%20does%20not%20mean%20supported.%20The%20scenario%20of%20my%20lab%2Ftest%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CUL%3E%3CLI%3EAD%20on%20prem%20forest%20is%20%3CSTRONG%3Ead.contoso.com%3C%2FSTRONG%3E%3C%2FLI%3E%3CLI%3EMail%20domain%20is%20%3CSTRONG%3Econtoso.com%3C%2FSTRONG%3E%3C%2FLI%3E%3CLI%3EAAD%20Connect%20configured%20to%20sync%20%3CSTRONG%3EMail%3C%2FSTRONG%3E%20to%20%3CSTRONG%3EUPN%3C%2FSTRONG%3E%20in%20Azure%20with%20%3CSTRONG%3EPHS%3C%2FSTRONG%3E%3C%2FLI%3E%3CLI%3EUser%20set%20with%20AD%20on%20prem%20UPN%20%3CSTRONG%3Ejohn.smith%40ad.contoso.com%3C%2FSTRONG%3E%26nbsp%3B(domain%20not%20verified%20in%20tenant)%20and%20Mail%20attribute%20%3CSTRONG%3Ejohn.smith%40contoso.com%26nbsp%3B%3C%2FSTRONG%3E(domain%20verified%20in%20tenant)%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI'm%20really%20looking%20for%20some%20clarification%20on%20support%20for%20this%2C%20can%20anybody%20assist%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CEM%3EAs%20a%20side%20note%2C%20using%20UPN%20as%20the%20Login%20ID%20in%20Azure%20AD%20is%20my%20preference%2C%20but%20multiple%20LOB%20apps%20means%20significant%20delays%20and%2For%20other%20changes%20required.%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBen%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1983669%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Ealternate%20login%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAlternate%20Login%20ID%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20AD%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EHAADJ%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EHybrid%20Azure%20AD%20Join%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1985072%22%20slang%3D%22en-US%22%3ERe%3A%20Hybrid%20Azure%20AD%20Join%20with%20Alternate%20Login%20ID%20(PHS)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1985072%22%20slang%3D%22en-US%22%3EHi%2C%20you%E2%80%99re%20not%20using%20the%20preview%3F%3CBR%20%2F%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fauthentication%2Fhowto-authentication-use-email-signin%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fauthentication%2Fhowto-authentication-use-email-signin%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1985430%22%20slang%3D%22en-US%22%3ERe%3A%20Hybrid%20Azure%20AD%20Join%20with%20Alternate%20Login%20ID%20(PHS)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1985430%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F551905%22%20target%3D%22_blank%22%3E%40bec064%3C%2FA%3E%26nbsp%3Bno.%3CBR%20%2F%3E%3CBR%20%2F%3EAs%20I%20understand%20there%20are%203%20types%20of%20Alternate%20Login%20ID....%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3EAlternate%20Login%20ID%20(Preview)%20-%20as%20you%20mentioned%3C%2FLI%3E%3CLI%3EAlternate%20Login%20ID%20with%20PTA%2FPHS%20via%20AAD%20Connect%20login%20attribute%20-%20where%20you%20select%20a%20different%20on%20premises%20attribute%20to%20sync%20and%20populate%20as%20the%20UPN%20in%20Azure%20AD%20(typically%20Mail)%3C%2FLI%3E%3CLI%3EAlternate%20Login%20ID%20with%20Federated%20Identity%20-%20like%20above%20but%20you%20configure%20your%20federated%20endpoint%20to%20support%20login%20with%20alt%20log%20ID%20claim%3C%2FLI%3E%3C%2FOL%3E%3CP%3EI'm%20looking%20at%20option%202.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1985671%22%20slang%3D%22en-US%22%3ERe%3A%20Hybrid%20Azure%20AD%20Join%20with%20Alternate%20Login%20ID%20(PHS)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1985671%22%20slang%3D%22en-US%22%3EOk.%20Using%20Azure%20AD%20Connect%20to%20achieve%20this%20requires%20to%20set%20the%20email%20address%20as%20the%20UPN%20in%20Azure%20AD.%20With%20the%20preview%20you%20can%20use%20the%20same%20UPN%20across%20on-premises%20AD%20and%20Azure%20AD%20to%20achieve%20compatibility%20across%20the%20services%2C%20while%20still%20allowing%20your%20users%20to%20sign%20in%20either%20with%20UPN%20or%20email.%20But%20you%20don%E2%80%99t%20want%20to%20use%20the%20preview%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1986028%22%20slang%3D%22en-US%22%3ERe%3A%20Hybrid%20Azure%20AD%20Join%20with%20Alternate%20Login%20ID%20(PHS)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1986028%22%20slang%3D%22en-US%22%3EThat%20would%20not%20resolve%20the%20issue%20in%20my%20scenario.%20The%20on%20premises%20UPN%20is%20not-routable%20e.g.%20%40contoso.local%20.%20As%20a%20result%2C%20the%20preview%20wouldn't%20provide%20a%20solution.%3CBR%20%2F%3E%3CBR%20%2F%3EAs%20I%20understand%2C%20this%20preview%20is%20helpful%20where%20the%20UPN%20is%20internet%20routable%2C%20but%20not%20eh%20not%20same%20domain%20suffix%20as%20the%20mail%20attribute%3F%3C%2FLINGO-BODY%3E
Contributor

Hello,

Could somebody clarify whether Hybrid Azure AD Join is supported when using Alternate Login ID? In this scenario I'm using the Mail attribute to sync/represent the UPN in Azure AD.

 

The following article says that the AD on premises UPN needs to be internet routable (and verified in Azure AD) to be supported with HAADJ. However, it makes no reference to using Alternate Login ID in this article - https://docs.microsoft.com/en-us/azure/active-directory/devices/hybrid-azuread-join-plan#review-on-p...

 

I have ran some initial tests in a lab/test scenario which showed HAADJ registration and access to modern apps functioning in the sign-in logs; however functioning does not mean supported. The scenario of my lab/test:

 

  • AD on prem forest is ad.contoso.com
  • Mail domain is contoso.com
  • AAD Connect configured to sync Mail to UPN in Azure with PHS
  • User set with AD on prem UPN john.smith@ad.contoso.com (domain not verified in tenant) and Mail attribute john.smith@contoso.com (domain verified in tenant)

 

I'm really looking for some clarification on support for this, can anybody assist?

 

As a side note, using UPN as the Login ID in Azure AD is my preference, but multiple LOB apps means significant delays and/or other changes required.

 

Ben

6 Replies

@ChristianBergstrom no.

As I understand there are 3 types of Alternate Login ID....

 

  1. Alternate Login ID (Preview) - as you mentioned
  2. Alternate Login ID with PTA/PHS via AAD Connect login attribute - where you select a different on premises attribute to sync and populate as the UPN in Azure AD (typically Mail)
  3. Alternate Login ID with Federated Identity - like above but you configure your federated endpoint to support login with alt log ID claim

I'm looking at option 2.

Ok. Using Azure AD Connect to achieve this requires to set the email address as the UPN in Azure AD. With the preview you can use the same UPN across on-premises AD and Azure AD to achieve compatibility across the services, while still allowing your users to sign in either with UPN or email. But you don’t want to use the preview?
That would not resolve the issue in my scenario. The on premises UPN is not-routable e.g. @contoso.local . As a result, the preview wouldn't provide a solution.

As I understand, this preview is helpful where the UPN is internet routable, but not eh not same domain suffix as the mail attribute?
Spoiler
 

@Ben Owens 

I managed to get clarification for from Microsoft via the Technical Advisor on GitHub.
https://github.com/MicrosoftDocs/azure-docs/pull/49710#issuecomment-744067855

 

The reason I thought this would be supported by Microsoft is that in my lab, a user with a UPN of john.smith@ad.contoso.com achieved Hybrid Azure AD Join status when accessing M365 via Modern Apps or Browser access.  This is when the UPN suffix is not verified in the tenant.

On closer investigation I found this worked because my AD forest domain was a forest suffix of ad.contoso.com which is a sub domain of contoso.com.  When I ran a home realm discovery using the sun domain, it returns the details of the correct realm.

E.g.

https://login.microsoftonline.com/common/UserRealm/?user=ad.contoso.com&api-version=1.0&checkForMicrosoftAccount=false&fallback_domain=madeupdomainthatdoesntexist.com

 

So in conclusion, if your users on premises UPN suffix is a sub domain of a verified domain in your tenant, (but not verified in Azure AD) I found HAADJ will work.  If you have a .local UPN suffix, you will need to amend the users UPN to work with HAADJ.

 

Great, thanks for the update. Actually read the following just now when doing some searches.

”There are other features in Azure AD that are not compatible with non routable UPNs. One major is Azure AD Hybrid Join”