| title | Prerequisites for Microsoft Entra Cloud Sync in Microsoft Entra ID |
|---|---|
| description | This article describes the prerequisites and hardware requirements you need for cloud sync. |
| ms.topic | how-to |
| ms.date | 09/29/2025 |
| ms.subservice | hybrid-cloud-sync |
This article provides guidance on using Microsoft Entra Cloud Sync as your identity solution.
You need the following to use Microsoft Entra Cloud Sync:
-
Domain Administrator or Enterprise Administrator credentials to create the Microsoft Entra Connect cloud sync gMSA (group managed service account) to run the agent service.
-
A Hybrid Identity Administrator account for your Microsoft Entra tenant that isn't a guest user.
-
Microsoft Entra Cloud Sync agent must be installed on a domain-joined server that runs Windows Server 2022, Windows Server 2019, or Windows Server 2016. We recommend Windows Server 2022. You can deploy Microsoft Entra Cloud Sync on Windows Server 2016, but since it's in extended support, you might need a paid support program if you require support for this configuration. Installing on unsupported versions of Windows Server may cause service failures or unexpected behavior.
[!IMPORTANT] Windows Server 2025 is NOT supported. There is a known issue on Windows Server 2025 that can cause Microsoft Entra Cloud Sync to encounter synchronization problems. If you upgraded to Windows Server 2025, make sure you have installed October 20, 2025 - KB5070773 update, or later. After installing this update, restart the server for the changes to take effect. Windows Server 2025 support for Microsoft Entra Cloud Sync is planned for a future release.
-
This server should be a tier 0 server based on the Active Directory administrative tier model. Installing the agent on a domain controller is supported. For more information, see Harden your Microsoft Entra provisioning agent server
-
The Active Directory Schema is required to have the attribute msDS-ExternalDirectoryObjectId, which is available in Windows Server 2016 and later.
-
The Windows Credential Manager service (VaultSvc) cannot be disabled as that prevents the provisioning agent from installing.
-
High availability refers to the Microsoft Entra Cloud Sync's ability to operate continuously without failure for a long time. By having multiple active agents installed and running, Microsoft Entra Cloud Sync can continue to function even if one agent should fail. Microsoft recommends having 3 active agents installed for high availability.
-
On-premises firewall configurations.
We recommend that you harden your Microsoft Entra provisioning agent server to decrease the security attack surface for this critical component of your IT environment. Following these recommendations helps mitigate some security risks to your organization.
- We recommend hardening the Microsoft Entra provisioning agent server as a Control Plane (formerly Tier 0) asset by following the guidance provided in Secure Privileged Access and Active Directory administrative tier model.
- Restrict administrative access to the Microsoft Entra provisioning agent server to only domain administrators or other tightly controlled security groups.
- Create a dedicated account for all personnel with privileged access. Administrators shouldn't be browsing the web, checking their email, and doing day-to-day productivity tasks with highly privileged accounts.
- Follow the guidance provided in Securing privileged access.
- Deny use of NTLM authentication with the Microsoft Entra provisioning agent server. Here are some ways to do this: Restricting NTLM on the Microsoft Entra provisioning agent Server and Restricting NTLM on a domain
- Ensure every machine has a unique local administrator password. For more information, see Local Administrator Password Solution (Windows LAPS) can configure unique random passwords on each workstation and server store them in Active Directory protected by an ACL. Only eligible authorized users can read or request the reset of these local administrator account passwords. Additional guidance for operating an environment with Windows LAPS and privileged access workstations (PAWs) can be found in Operational standards based on clean source principle.
- Implement dedicated privileged access workstations for all personnel with privileged access to your organization's information systems.
- Follow these additional guidelines to reduce the attack surface of your Active Directory environment.
- Follow the Monitor changes to federation configuration to set up alerts to monitor changes to the trust established between your IdP and Microsoft Entra ID.
- Enable multifactor authentication (MFA) for all users that have privileged access in Microsoft Entra ID or in AD. One security issue with using Microsoft Entra provisioning agent is that if an attacker can get control over the Microsoft Entra provisioning agent server they can manipulate users in Microsoft Entra ID. To prevent an attacker from using these capabilities to take over Microsoft Entra accounts, MFA offers protections. For example, even if an attacker manages to reset a user's password using the Microsoft Entra provisioning agent, they still can't bypass the second factor.
A group Managed Service Account is a managed domain account that provides automatic password management and simplified service principal name (SPN) management. It also offers the ability to delegate the management to other administrators and extends this functionality over multiple servers. Microsoft Entra Cloud Sync supports and uses a gMSA for running the agent. You'll be prompted for administrative credentials during setup, in order to create this account. The account appears as domain\provAgentgMSA$. For more information on a gMSA, see group Managed Service Accounts.
- The Active Directory schema in the gMSA domain's forest needs to be updated to Windows Server 2012 or later.
- PowerShell RSAT modules on a domain controller.
- At least one domain controller in the domain must be running Windows Server 2012 or later.
- A domain-joined server that runs Windows Server 2022, Windows Server 2019, or Windows Server 2016 for the agent installation.
If you're creating a custom gMSA account, you need to ensure that the account has the following permissions.
| Type | Name | Access | Applies To |
|---|---|---|---|
| Allow | gMSA Account | Read all properties | Descendant device objects |
| Allow | gMSA Account | Read all properties | Descendant InetOrgPerson objects |
| Allow | gMSA Account | Read all properties | Descendant Computer objects |
| Allow | gMSA Account | Read all properties | Descendant foreignSecurityPrincipal objects |
| Allow | gMSA Account | Full control | Descendant Group objects |
| Allow | gMSA Account | Read all properties | Descendant User objects |
| Allow | gMSA Account | Read all properties | Descendant Contact objects |
| Allow | gMSA Account | Create/delete User objects | This object and all descendant objects |
For steps on how to upgrade an existing agent to use a gMSA account see group Managed Service Accounts.
For more information on how to prepare your Active Directory for group Managed Service Account, see group Managed Service Accounts Overview and Group managed service accounts with cloud sync.
- Create a cloud-only Hybrid Identity Administrator account on your Microsoft Entra tenant. This way, you can manage the configuration of your tenant if your on-premises services fail or become unavailable. Learn about how to add a cloud-only Hybrid Identity Administrator account. Finishing this step is critical to ensure that you don't get locked out of your tenant.
- Add one or more custom domain names to your Microsoft Entra tenant. Your users can sign in with one of these domain names.
Run the IdFix tool to prepare the directory attributes for synchronization.
- Identify a domain-joined host server that runs Windows Server 2022, Windows Server 2019, or Windows Server 2016 with a minimum of 4-GB RAM and .NET 4.7.1+ runtime.
- The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
- If there's a firewall between your servers and Microsoft Entra ID, see Firewall and proxy requirements.
Note
Installing the cloud provisioning agent on Windows Server Core isn't supported.
[!INCLUDE pre-requisites]
- Minimum Microsoft .NET Framework 4.7.1
Note
Transport Layer Security (TLS) is a protocol that provides for secure communications. Changing the TLS settings affects the entire forest. For more information, see Update to enable TLS 1.1 and TLS 1.2 as default secure protocols in WinHTTP in Windows.
The Windows server that hosts the Microsoft Entra Connect cloud provisioning agent must have TLS 1.2 enabled before you install it.
To enable TLS 1.2, follow these steps.
-
Set the following registry keys by copying the content into a .reg file and then run the file (right select and choose Merge):
Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2] [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client] "DisabledByDefault"=dword:00000000 "Enabled"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server] "DisabledByDefault"=dword:00000000 "Enabled"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319] "SchUseStrongCrypto"=dword:00000001 -
Restart the server.
If there's a firewall between your servers and Microsoft Entra ID, configure the following items:
-
Ensure that agents can make outbound requests to Microsoft Entra ID over the following ports:
Port number Description 80 Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. 443 Handles all outbound communication with the service. 8080 (optional) Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Microsoft Entra admin center. -
If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
-
Ensure that your proxy supports at least HTTP 1.1 protocol and chunked encoding is enabled.
-
If your firewall or proxy allows you to specify safe suffixes, add connections:
| URL | Description |
|---|---|
*.msappproxy.net*.servicebus.windows.net |
The agent uses these URLs to communicate with the Microsoft Entra cloud service. |
*.microsoftonline.com*.microsoft.com*.msappproxy.com*.windowsazure.com |
The agent uses these URLs to communicate with the Microsoft Entra cloud service. |
mscrl.microsoft.com:80 crl.microsoft.com:80 ocsp.msocsp.com:80 www.microsoft.com:80 |
The agent uses these URLs to verify certificates. |
login.windows.net |
The agent uses these URLs during the registration process. |
| URL | Description |
|---|---|
*.msappproxy.us*.servicebus.usgovcloudapi.net |
The agent uses these URLs to communicate with the Microsoft Entra cloud service. |
mscrl.microsoft.us:80 crl.microsoft.us:80 ocsp.msocsp.us:80 www.microsoft.us:80 |
The agent uses these URLs to verify certificates. |
login.windows.us secure.aadcdn.microsoftonline-p.com *.microsoftonline.us *.microsoftonline-p.us *.msauth.net *.msauthimages.net *.msecnd.net*.msftauth.net *.msftauthimages.net*.phonefactor.net enterpriseregistration.windows.netmanagement.azure.com policykeyservice.dc.ad.msft.netctldl.windowsupdate.us:80 aadcdn.msftauthimages.us *.microsoft.us msauthimages.us msftauthimages.us |
The agent uses these URLs during the registration process. |
- If you're unable to add connections, allow access to the Azure datacenter IP ranges, which are updated weekly.
You shouldn't enable NTLM on the Windows Server that is running the Microsoft Entra provisioning agent and if it is enabled you should make sure you disable it.
The following are known limitations:
- Group scope filtering for delta sync doesn't support more than 50,000 members.
- When you delete a group that's used as part of a group scoping filter, users who are members of the group, don't get deleted.
- When you rename the OU or group that's in scope, delta sync doesn't remove the users.
- Provisioning logs don't clearly differentiate between create and update operations. You could see a create operation for an update and an update operation for a create.
- If you rename a group or OU in AD that's in scope for a given configuration, the cloud sync job isn't able to recognize the name change in AD. The job doesn't go into quarantine and remains healthy.
When using OU scoping filter
-
The scoping configuration has a limitation of 4 MB in character length. In a standard tested environment, this translates to approximately 50 separate Organizational Units (OUs) or Security Groups, including its required metadata, for a given configuration.
-
Nested OUs are supported (that is, you can sync an OU that has 130 nested OUs, but you can't sync 60 separate OUs in the same configuration).
- Using password hash sync with InetOrgPerson isn't supported.