Systems Admin

Enable Entra Self-Service Password Reset (SSPR) with Writeback — All Six Phases

SSPR — Self-Service Password Reset — lets users reset their own password from passwordreset.microsoftonline.com without calling the helpdesk. With writeback enabled, the new password flows back to on-premises AD via Entra Connect, so the user can also sign into their domain laptop with the new password. Helpdesk pw-reset tickets are the #1 ticket type at most orgs; SSPR drops them ~70%. This walkthrough covers all six phases.

Six phases at a glance

  1. Phase 1 — enable SSPR scope + auth methods in the Entra admin centre
  2. Phase 2 — tick Password Writeback on the Entra Connect server
  3. Phase 3 — flip the cloud-side On-premises integration toggle
  4. Phase 4 — set GPO Minimum password age to 0 to prevent AD rejecting resets
  5. Phase 5 — end-user test: reset cloud, then verify domain-joined sign-in
  6. Phase 6 — check Event Viewer logs to confirm the writeback round trip

Phase 1 — cloud-side enable

Same Password Reset Properties page after Save showing the All scope is now applied to every user in the tenant
Save confirms the policy applies to every user. For testing, you can scope it to a security group instead and add users gradually.
Authentication methods page with Email and Mobile phone selected as the two factors users will use to verify identity during a reset
Tick the methods you want users to choose from. Email + Mobile phone is the standard pair. SMS is weak but better than nothing for users without smartphones.

The cloud side is now ready to accept resets but no on-premises integration yet.

Phase 2 — writeback on Entra Connect

Server desktop showing Microsoft Entra Connect icon ready to be launched
Find the Microsoft Entra Connect / Azure AD Connect shortcut on the desktop or Start menu.
Confirmation prompt before launching the configuration wizard, ensuring the admin is ready to make changes
Confirm the prompt to enter the configuration wizard.
Wizard task selection screen with Customize synchronization options highlighted as the chosen path
Choose Customize synchronization options. Click Next.
Wizard prompt for Global Administrator credentials to authenticate the configuration change with Microsoft Entra ID
Sign in with a Global Administrator account — the wizard authenticates back to the cloud.
Connect Directories step of the wizard showing the existing AD forest already configured
Click Next through the existing forest configuration; nothing to change here.
Optional Features screen with the Password writeback checkbox now ticked, the central change of this walkthrough
On the Optional Features page, tick Password writeback. This is the actual writeback enable.
Ready to Configure summary screen confirming Password writeback will be added on the next click
Click Next, then review the Ready to Configure summary.
Same Configuration complete screen with the Exit button visible to close the wizard cleanly
On exit, writeback is active on this server. The cloud-side toggle from Phase 1 + this server-side change = working pipeline.

The writeback agent is now running. The cloud knows it can ship password changes back to your AD, but it’s waiting for you to authorise that path on the cloud side too.

Phase 3 — cloud-side on-prem integration

Same On-premises integration page with the Allow users to unlock accounts without resetting their password toggle also set to Yes for full coverage
Also enable Allow users to unlock accounts without resetting their password — recommended. Save.

This is the cloud’s “ok, send password changes back to on-prem AD” switch. Both ends now agreed; data path is open.

Phase 4 — GPO Minimum password age = 0

The hidden phase that breaks SSPR if you skip it. AD’s default minimum-password-age is 1 day. So if a user resets their password and that password was set today (e.g. they JUST reset it manually 5 minutes ago), AD rejects the SSPR-driven write because the password is too young to change.

Minimum password age policy editor with the value being set to 0 days, removing the cooldown that would otherwise reject SSPR resets
Open Minimum password age. Set to 0 days. Click OK. Reason: SSPR fails if AD rejects the new password because of an active minimum-age cooldown.
Successful gpupdate output confirming Computer Policy and User Policy update completed successfully
Output confirms Computer Policy and User Policy updates. Phase 4 done.

Set to 0 days. Reset takes effect immediately. Skip this and SSPR will appear to work in the cloud but fail to write back to AD on edge cases.

Phase 5 — end-user verification

Open a private window. Pretend you’re jdoe and you forgot your password — or you’re testing the change-password flow.

Office portal landing page after a successful sign-in with the user’s avatar in the top-right corner
After sign-in, click the avatar in the top-right and choose View account.
Security info or Password section of the My Account page with the Change Password link visible
Click Change Password.
Submit button being clicked to send the new password to the cloud
Submit. The cloud accepts the change.
Same confirmation popup from a different angle showing the close/OK button being clicked to dismiss
Confirmation closed. SSPR cloud-side worked. Now we verify the writeback path.
Sign-in screen at portal.office.com with the user’s account ready to enter the new password
Sign back in with the new password.
Apps tile view of the portal with all M365 apps available, confirming the new password is fully active in the cloud
M365 apps fully accessible — cloud authentication is healthy.
OneDrive view via the same session, further confirming the new password works across all M365 services
Cross-checked from another M365 service for redundancy.

Cloud side works. Now the writeback test.

Successful Windows desktop session showing the new password also worked locally, proving writeback completed
It works locally too — the writeback agent pushed the password down to AD. This is the final proof.

Sign into a domain-joined client with the new password. If it works, writeback is doing its job.

Phase 6 — server-side log verification

Detail of an Event ID 31009 or 31010 success entry confirming the cloud-to-AD password sync round trip succeeded
Event ID 31009 (Operation Performed) or 31010 (Success) confirms the writeback round trip in your logs.

Event ID 31009 / 31010 in the Application log under source PasswordReset = success. If you don’t see these, check the writeback agent service status, the cloud-side toggle, and the AD permissions on the EC service account.

Licence requirements (read carefully)

User type What they want to do Licence needed
Cloud-only Change a password they already know Free / any
Cloud-only Reset a forgotten password Business Standard or higher
Hybrid (synced from AD) Reset a forgotten password Business Premium / Entra ID P1 / P2

SSPR with writeback requires Entra ID P1 or higher per user. If your synced users only have Business Standard, the cloud reset will work but writeback won’t.

Things that bite people

Service account permissions on AD

The Entra Connect service account needs explicit AD permissions: Reset Password, Change Password, and Write on the lockoutTime attribute (for the unlock feature). The Entra Connect installer grants these on first install if you used Express settings, but custom installs and old configurations may be missing them. If writeback events show 31010 then nothing happens, this is the first thing to check.

Complex AD password policies

The cloud password policy and the on-prem password policy don’t talk to each other. If your AD requires 14-character passwords with a special character, but the cloud reset form doesn’t enforce that, the user will type a valid cloud password that AD rejects. They’ll see a generic error. Solution: configure password protection in Entra ID to enforce on-prem complexity rules at the cloud reset point.

Admins must use SSPR too

Admin SSPR is configured separately in the same blade. Without it, your admins are still calling the helpdesk. Enable both.

Writeback delay (~2 minutes)

SSPR with writeback isn’t real-time. There’s a ~2 minute delay between cloud reset and AD update. If a user immediately tries to sign into their domain laptop after a reset, they may need to wait. Tell them in the comms.

Notifications

Enable email notifications on password change — both to the user (so they know it succeeded or notice if it wasn’t them) and to admins (so a sudden burst of resets gets noticed). The Notifications page in the Password reset blade controls this.

If writeback breaks: check writeback agent service

On the EC server, the service is Microsoft Entra Connect Synchronization Service. Restart it. Check Application log for sync errors. If the agent is wedged, the cloud will queue resets but they won’t ship until the agent is healthy again.

What’s next

SSPR is the user-facing piece. The next post in this hybrid identity pathway covers the opposite end-of-life decision: disabling directory sync entirely when going fully cloud. For broader hardening, see restricting Entra admin centre access for standard users.

Leave a Reply