How to give AAD Connect account permissions

AAD connect Installation

 

During the AD connect customize setup installation, you will see the below window to enter the Service account cred.

1: Create New AD account: This will ask you to enter Enterprise Admin credential to create new AD connector account like MSOL_cer44rwXXX

In AAD connect when you check Connector properties you will see MSOL account showing. But when you check in Services.msc for AAD connect you will see Enterprise Admin cred.

2: Use existing AD account: This option work only when you have created a Service account already with proper permission.

 

 

What type of permission required to be with Service account ?

 

Permission

Used for

  • Replicate Directory Changes
  • Replicate Directory Changes All

Password hash sync

Read/Write all properties User

Import and Exchange hybrid

Read/Write all properties iNetOrgPerson

Import and Exchange hybrid

Read/Write all properties Group

Import and Exchange hybrid

Read/Write all properties Contact

Import and Exchange hybrid

Reset password

Preparation for enabling password write back

 

Download the PowerShell Module or Import from the server where you have old version of AAD connect installed:

ADSyncConfig.psm1

PowerShell Module file location if you already have AAD connect installed:

C:\Program Files\Microsoft Azure Active Directory Connect\AdSyncConfig\AdSyncConfig.psm1

 

Open PowerShell as Administrator and Install Remote Server Administration Tools:

PS C:\> Install-WindowsFeature RSAT-AD-Tools

This will allow the PS commands to communicate with DC.

 

Import the PowerShell module AdSyncConfig.psm1 from the location where you have saved:

1: Copy the file path

Shift+right click on the file and copy as path

2: Open PowerShell:

PS C:\> Import-Module “C:\Program Files\Microsoft Azure Active Directory Connect\AdSyncConfig\AdSyncConfig.psm1”

You will get the prompt to click yes to install the module.

 

3: Copy the distuingedName or DN value of the service account created and edit the below PS and run it 1 by 1:

 

Set-ADSyncBasicReadPermissions -ADConnectorAccountDN “CN=AADC SVC1,CN=Users,DC=GoldenFive,DC=local”

 

Permissions for MS-DS-Consistency-Guid 

Set-ADSyncMsDsConsistencyGuidPermissions -ADConnectorAccountDN “CN=AADC SVC1,CN=Users,DC= GoldenFive,DC=local”

 
 

Password Hash Synchronization

Set-ADSyncPasswordHashSyncPermissions -ADConnectorAccountDN “CN=AADC SVC1,CN=Users,DC= GoldenFive,DC=local”

 

Password write back

Set-ADSyncPasswordWritebackPermissions -ADConnectorAccountDN “CN=AADC SVC1,CN=Users,DC= GoldenFive,DC=local”

 
 

Group write back

Set-ADSyncUnifiedGroupWritebackPermissions -ADConnectorAccountDN “CN=AADC SVC1,CN=Users,DC= GoldenFive,DC=local”

 

Exchange Hybrid Deployment

Set-ADSyncExchangeHybridPermissions -ADConnectorAccountDN “CN=AADC SVC1,CN=Users,DC= GoldenFive,DC=local”

 
 

 

$credential = Get-Credential     (You will see the credentials prompt, enter the user cred which have admin rights.)

 

Restriction on AD DS Connector Account 

Set-ADSyncRestrictedPermissions -ADConnectorAccountDN ‘CN=AADC SVC1,CN=Users,DC= GoldenFive,DC=local’ -Credential $credential

 

 

 

NOW YOU CAN USE THE SERVICE ACCOUNT IN AAD CONNECT, AS IT HAVE PROPER DELEGATE PERMISSIONS ON DC.

 

!!! Thank You for giving your time to read my blog !!!

Leave Comment

Your email address will not be published. Required fields are marked *