A cloud-based identity and access management service for securing user authentication and resource access
Hey Luke, you’re correct—Azure AD Cloud Sync (aka Microsoft Entra hybrid cloud sync) only syncs on-premises AD objects into Entra ID (and supports group writeback only, not user provisioning back into AD). There isn’t a “flip-the-switch” to push users from Entra into your DC VM via Cloud Sync. To get Entra-managed users created and updated in your on-prem AD, you have two main supported options:
- Use the Microsoft Entra (Azure AD) Provisioning Service to on-premises AD • In the Entra admin center, go to Enterprise Applications > New application > add the built-in “Microsoft Active Directory” app • Under Provisioning, install the lightweight provisioning agent on a server that has line-of-sight to your Domain Controller • Configure your attribute mappings, scoping filters (e.g. user status = Enabled), OU targets, etc. • Start the job and Entra users will be created/updated as AD accounts in your chosen OU • (If you need passwords, enable Password Writeback in your Azure AD Connect configuration so newly provisioned accounts get a synchronized password) Docs: • https://learn.microsoft.com/entra/identity/hybrid/provision-on-premises-active-directory • https://learn.microsoft.com/entra/identity/hybrid/cloud-sync/what-is-cloud-sync
- Microsoft Identity Manager (MIM) with the Azure AD Connector • Deploy MIM in your on-prem environment and install the MIM Azure AD connector • Configure your sync rules to import users from Entra and export them into AD • This is a more heavyweight approach but gives you full control over attribute flows, transformations, join rules, etc. Docs: • https://docs.microsoft.com/microsoft-identity-manager/
Quick sketch of the flow with the Entra provisioning service:
- Grant your service account the necessary rights to the target OU in AD (create/update/delete users).
- Install the Entra provisioning agent on a member server or DC.
- In the Entra portal’s Provisioning blade, point to your on-prem agent, set your attribute mappings (e.g. userPrincipalName, displayName, mail).
- Set your scoping rules so you only provision the Entra users you want.
- Run the provisioning job; monitor errors under Provisioning > Job history.
If you don’t have Azure AD Premium licensing or can’t install an agent, your fallback is to script it yourself using Graph API + the ActiveDirectory PowerShell module:
• Pull users from Entra (Get-MgUser)
• Create/update AD users (New-ADUser / Set-ADUser) on your DC VM
Hope that points you in the right direction!
—
Reference list
- Provisioning Entra users to on-prem AD via the Azure AD provisioning service https://learn.microsoft.com/entra/identity/hybrid/provision-on-premises-active-directory
- What is Microsoft Entra Cloud Sync (hybrid cloud sync)? https://learn.microsoft.com/entra/identity/hybrid/cloud-sync/what-is-cloud-sync
- Microsoft Identity Manager overview https://docs.microsoft.com/microsoft-identity-manager/
- Password writeback in Azure AD Connect (if you need cloud passwords for on-prem accounts) https://learn.microsoft.com/azure/active-directory/hybrid/how-to-connect-install-custom#password-writeback