You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article is intended to establish a common practice for how to troubleshoot synchronization issues in Microsoft Entra ID.
14
14
15
-
This method is used when an object or attribute fails to synchronize with Microsoft Entra ID directory, and no errors are shown in the sync engine, Application event viewer logs, or Microsoft Entra logs. It's easy to get lost in the details if there's no obvious error. However, by using best practices, you can isolate the issue and provide insights for Microsoft Support engineers.
15
+
This method is used when an object or attribute fails to synchronize with the Microsoft Entra ID directory and no errors are shown in the sync engine, Application event viewer logs, or Microsoft Entra logs. It's easy to get lost in the details if there's no obvious error. However, by using best practices, you can isolate the issue and provide insights for Microsoft Support engineers.
16
16
17
17
As you apply this troubleshooting method to your environment, over time, you'll be able to do the following steps:
18
18
@@ -38,11 +38,11 @@ For a better understanding of this article, first read the following prerequisit
38
38
39
39
The `onPremisesSyncEnabled` attribute in Microsoft Entra ID controls whether the tenant is prepared to accept synchronization of objects from on-premises AD DS.
40
40
41
-
It is common to disable DirSync on the tenant while troubleshooting object or attribute synchronization issues. Directory synchronization can be turned off using Graph or PowerShell, however this process might cause disruptions.
41
+
It's common to disable DirSync on the tenant while troubleshooting object or attribute synchronization issues. Directory synchronization can be turned off using Graph or PowerShell. However, this process might cause disruptions.
42
42
43
-
Disabling DirSync at the tenant level triggers a complex and lengthy backend operation to transfer the Source of Authority (SoA) from local Active Directory to Microsoft Entra ID and Exchange Online for all the synced objects on the tenant. This operation is necessary to convert each object from `onPremisesSyncEnabled=True` to cloud-only objects (`onPremisesSyncEnabled=<null>`), and clean up all the shadow properties that are synced from on-premises AD DS (for example, `ShadowUserPrincipalName` and `ShadowProxyAddresses`). This operation might take over 72 hours depending on the tenant's size, and its completion time can't be predicted.
43
+
Disabling DirSync at the tenant level triggers a complex and lengthy backend operation to transfer the Source of Authority (SoA) from local Active Directory to Microsoft Entra ID and Exchange Online for all the synced objects on the tenant. This operation is necessary to convert each object from `onPremisesSyncEnabled=True` to a cloud-only object (`onPremisesSyncEnabled=<null>`), and clean up all the shadow properties that are synced from on-premises AD DS (for example, `ShadowUserPrincipalName` and `ShadowProxyAddresses`). Depending on the tenant's size, this operation might take over 72 hours, and its completion time can't be predicted.
44
44
45
-
Don't use this method to troubleshoot a sync issue because such operation can cause more harm and doesn't fix the root issue. You can't enable DirSync again until this disablement operation is complete. After re-enabling DirSync, the Entra Connect server must match all on-premises objects with existing Microsoft Entra ID objects.
45
+
Don't use this method to troubleshoot a sync issue because such an operation can cause more harm and doesn't fix the root issue. You can't enable DirSync again until this disabling operation is complete. After re-enabling DirSync, the Entra Connect server must match all on-premises objects with existing Microsoft Entra ID objects.
46
46
47
47
Disabling DirSync is supported only in the following scenarios:
48
48
@@ -51,13 +51,13 @@ Disabling DirSync is supported only in the following scenarios:
51
51
- You're currently using a custom attribute as the SourceAnchor in Entra Connect (for example, employeeId), and you're re-installing AADC to start using **ms-Ds-Consistency-Guid/ObjectGuid** as the new SourceAnchor attribute (or vice versa).
52
52
- Certain scenarios within your mailbox migration strategy might result in potential issues.
53
53
54
-
In some situations, you might have to temporarily stop synchronization or manually control Entra Connect sync cycles. For example, you might have to pause synchronization to be able to run one sync step at a time. Instead of disabling DirSync, you can just stop the sync scheduler by running the following cmdlet:
54
+
In some situations, you might have to temporarily stop synchronization or manually control Entra Connect sync cycles. For example, you might have to pause synchronization to run one sync step at a time. Instead of disabling DirSync, you can just stop the sync scheduler by running the following cmdlet:
55
55
56
56
```PowerShell
57
57
Set-ADSyncScheduler -SyncCycleEnabled $false
58
58
```
59
59
60
-
And when you're ready, restore the normal sync scheduler by running the following cmdlet:
60
+
When you're ready, restore the normal sync scheduler by running the following cmdlet:
61
61
62
62
```PowerShell
63
63
Start-ADSyncSyncCycle
@@ -120,7 +120,7 @@ Connection issues to ADDS have the following causes:
120
120
- A "no-start-ma" error, which occurs when there are name resolution issues (DNS) in AD.
121
121
- Other problems that can be caused by name resolution issues, network routing problems, blocked network ports, high network packet fragmentation, no writable DCs available, and so on. In such cases, you will likely have to involve the Directory Services or networking support teams to help troubleshoot.
122
122
123
-
Troubleshooting summary
123
+
**Troubleshooting summary:**
124
124
125
125
- Identify which domain controller is used.
126
126
- Use preferred domain controllers to target the same domain controller.
@@ -184,7 +184,7 @@ The best way to troubleshoot permissions is to use the "Effective Access" featur
184
184
- Temporarily add the ADCA to the Enterprise admins or Domain admins, and restart the ADSync service.
185
185
186
186
> [!WARNING]
187
-
> Don't use this as a permanent solution for permissions issues. After determining the permissions issue, remove the ADCA from any highly privileged groups, and grant the required AD permissions directly to the ADCA.
187
+
> Don't use this as a permanent solution to permission issues. After determining the permission issue, remove the ADCA from any highly privileged groups, and grant the required AD permissions directly to the ADCA.
188
188
189
189
> [!NOTE]
190
190
> Engage Directory Services or a network support team to help you troubleshoot the situation.
@@ -215,7 +215,7 @@ Another approach is to use the RepAdmin tool to check the object's replication m
215
215
216
216
:::image type="content" source="media/troubleshoot-aad-connect-objects-attributes/repadmin-replsummary.png" alt-text="Screenshot of the RepAdmin tool using the replsummary command." border="false":::
217
217
218
-
Troubleshooting summary
218
+
**Troubleshooting summary:**
219
219
220
220
- Identify which domain controller is used.
221
221
- Compare data between domain controllers.
@@ -245,7 +245,7 @@ Use the `Get-ADSyncConnector` cmdlet to retrieve the object types that are enabl
245
245
246
246
The following list shows the object types that should be enabled by default (The `publicFolder` object type exists only when the Mail Enabled Public Folder feature is enabled.):
247
247
248
-
:::image type="content" source="media/troubleshoot-aad-connect-objects-attributes/get-adsyncconnector-objects.png" alt-text="Screenshot show the Get-ADSyncConnector object types." border="false":::
248
+
:::image type="content" source="media/troubleshoot-aad-connect-objects-attributes/get-adsyncconnector-objects.png" alt-text="Screenshot showing the Get-ADSyncConnector object types." border="false":::
249
249
250
250
251
251
-**Attribute excluded in ADCS**
@@ -326,7 +326,7 @@ The synchronization between ADCS and MV occurs on the delta/full synchronization
326
326
327
327
-**Export the object to XML**
328
328
329
-
For a more detailed analysis (or for offline analysis), you can collect all the database data that's related to the object by using `Export-ADSyncToolsObjects` cmdlet. This exported information will help determine which rule is filtering out the object. In other words, which Inbound Scoping Filter in the Provisioning Sync Rules is preventing the object from being projected to the MV.
329
+
For a more detailed analysis (or for offline analysis), you can collect all the database data that's related to the object by using the `Export-ADSyncToolsObjects` cmdlet. This exported information will help determine which rule is filtering out the object. In other words, which Inbound Scoping Filter in the Provisioning Sync Rules is preventing the object from being projected to the MV.
330
330
331
331
Here are some examples of the `Export-ADSyncToolsObjects` syntax:
332
332
@@ -383,7 +383,7 @@ The synchronization between ADCS and MV occurs on the delta/full synchronization
383
383
384
384
1. **Export the object to XML**
385
385
386
-
For a more detailed analysis or offline analysis, you can collect all the database data that's related to the object by using `Export-ADSyncToolsObjects` cmdlet. This exported information can help you determine which sync rule or transformation rule missing on the object that's preventing the attribute from being projected to the MV (see the `Export-ADSyncToolsObjects` examples earlier in this article).
386
+
For a more detailed analysis or offline analysis, you can collect all the database data that's related to the object by using `Export-ADSyncToolsObjects` cmdlet. This exported information can help you determine which sync rule or transformation rule is missing on the object that's preventing the attribute from being projected to the MV (see the `Export-ADSyncToolsObjects` examples earlier in this article).
387
387
388
388
#### Troubleshooting summary (for attributes)
389
389
@@ -442,9 +442,9 @@ The synchronization between MV and AADCS occurs in the delta/full synchronizatio
442
442
443
443
1. **Export the object to XML**
444
444
445
-
For a more detailed analysis or offline analysis, you can collect all the database data that's related to the object by using `Export-ADSyncToolsObjects` cmdlet. This exported information, together with the (outbound) sync rules configuration, can help determine which rule is filtering out the object, and can determine which outbound scoping filter in the provisioning sync rules is preventing the object from connecting with the AADCS).
445
+
For a more detailed analysis or offline analysis, you can collect all the database data that's related to the object by using `Export-ADSyncToolsObjects` cmdlet. This exported information, together with the (outbound) sync rules configuration, can help determine which rule is filtering out the object, and can determine which outbound scoping filter in the provisioning sync rules is preventing the object from connecting with the AADCS.
446
446
447
-
Here are some examples of `Export-ADSyncToolsObjects` syntax:
447
+
Here are some examples of the `Export-ADSyncToolsObjects` syntax:
For a more detailed analysis or offline analysis, you can collect all the database data that's related to the object by using `Export-ADSyncToolsObjects` cmdlet. This exported information, together with the (outbound) sync rules configuration, can help you determine which sync rule or transformation rule is missing from the object that's preventing the attribute from flowing to AADCS (see the `Export-ADSyncToolsObjects` examples earlier).
494
+
For a more detailed analysis or offline analysis, you can collect all the database data that's related to the object by using the `Export-ADSyncToolsObjects` cmdlet. This exported information, together with the (outbound) sync rules configuration, can help you determine which sync rule or transformation rule is missing from the object that's preventing the attribute from flowing to AADCS (see the `Export-ADSyncToolsObjects` examples earlier).
495
495
496
496
#### Troubleshooting summary for attributes
497
497
@@ -527,7 +527,7 @@ Multiple components and processes that are involved in importing and exporting d
527
527
528
528
- Connectivity to the internet
529
529
- Internal firewalls and ISP connectivity (for example, blocked network traffic)
530
-
- The Microsoft Entra Gateway in front of DirSync Webservice (also known as the AdminWebService)
530
+
- The Microsoft Entra Gateway in front of DirSync Webservice (also known as AdminWebService)
531
531
- The DirSync Webservice API
532
532
- The Microsoft Entra Core directory service
533
533
@@ -549,14 +549,14 @@ Fortunately, the issues that affect these components usually generate an error i
549
549
550
550
-**UserPrincipalName changes don't update in Microsoft Entra ID**
551
551
552
-
If the UserPrincipalName attribute isn't updated in Microsoft Entra ID, while other attributes synchronize as expected, it’s possible that a feature called [SynchronizeUpnForManagedUsers](/azure/active-directory/hybrid/how-to-connect-syncservice-features#synchronize-userprincipalname-updates) isn't enabled on the tenant.
552
+
If the `UserPrincipalName` attribute isn't updated in Microsoft Entra ID, while other attributes synchronize as expected, it's possible that a feature called [SynchronizeUpnForManagedUsers](/azure/active-directory/hybrid/how-to-connect-syncservice-features#synchronize-userprincipalname-updates) isn't enabled on the tenant.
553
553
554
554
Before this feature is added, any updates to the UPN from on-premises are *silently* ignored after the user is provisioned in Microsoft Entra ID and assigned a license. An admin must use the legacy MSOnline or AzureAD PowerShell to update the UPN directly in Microsoft Entra ID. After this feature is added, any updates to UPN will flow to Microsoft Entra regardless of whether the user is licensed (managed).
555
555
556
556
> [!NOTE]
557
557
> After it's enabled, this feature can't be disabled.
558
558
559
-
**UserPrincipalName** updates will work if the user isn't licensed. However, without the [SynchronizeUpnForManagedUsers](/azure/active-directory/hybrid/how-to-connect-syncservice-features#synchronize-userprincipalname-updates) feature, UserPrincipalName changes after the user is provisioned and is assigned a licensed that will NOT be updated in Microsoft Entra ID. Notice that Microsoft doesn't disable this feature on behalf of customers.
559
+
**UserPrincipalName** updates will work if the user isn't licensed. However, without the [SynchronizeUpnForManagedUsers](/azure/active-directory/hybrid/how-to-connect-syncservice-features#synchronize-userprincipalname-updates) feature, UserPrincipalName changes after the user is provisioned and is assigned a licensed that won't be updated in Microsoft Entra ID. Notice that Microsoft doesn't disable this feature on behalf of customers.
560
560
561
561
-**Invalid characters and ProxyCalc internals**
562
562
@@ -591,7 +591,7 @@ Fortunately, the issues that affect these components usually generate an error i
591
591
592
592
## Additional resources
593
593
594
-
-[Troubleshooting Errors during synchronization](/azure/active-directory/hybrid/tshoot-connect-sync-errors)
594
+
-[Troubleshooting errors during synchronization](/azure/active-directory/hybrid/tshoot-connect-sync-errors)
595
595
596
596
-[Troubleshoot object synchronization with Microsoft Entra Connect Sync](/azure/active-directory/hybrid/tshoot-connect-objectsync)
0 commit comments