
One of the first things organizations do once they upgrade to a M365 license type that includes Microsoft Entra ID P1 is to start rolling out Conditional Access Polices to incorporate fine-grained security polices. However, after that, an attractive feature, especially for organizations with a hybrid environment, is the Self-Service Password Reset (SSPR) feature.
Overview
By default, Microsoft Entra ID Free allows password hash synchronization from on-premises Active Directory (AD) to Entra ID. However, any password changes made in Entra ID are not synced back to on-premises AD — essentially making it a one-way sync.
With Entra ID P1 or higher, you can enable password writeback via Entra Connect, allowing password changes in Entra ID to sync back to on-premises AD. This is a game-changer for hybrid organizations, as it lets users securely reset their passwords from anywhere — even if they are off the corporate network.
In this guide, I’ll show you how to gradually roll out SSPR in a hybrid environment using PowerShell to streamline the deployment process.
Prerequisites
Before getting started, ensure you meet the following requirements:
✅ Microsoft Entra ID P1 or higher (for password writeback)
🔗 Entra Connect set up and syncing with AD
🛡️ Hybrid Identity Administrator role (minimum permission needed)
Step 1: Create an Active Directory security group and enable password writeback with Entra Connect
- Create a new security group in Active Directory that will contain the users you want to enable SSPR for. For instance, create a group called SSPR-Enabled-Users.
Make sure the security group resides in an OU that is being synchronized to Microsoft Entra ID using Entra Connect.
- Open the Entra Connect wizard to enable password writeback.
- Navigate to Entra Connect > Configure > Customize synchronization options and click Next.
- Enter the Hybrid Identity Administrator or Global Administrator credentials and click Next.
- Click Next until reaching the Optional Features section. Select Password writeback and click Next.
- Click Configure and once the configuration is complete, click Exit.

Verify synchronization is working properly by creating a test user and running a Delta sync Start-ADSyncSyncCycle -PolicyType Delta.
If you don't already have the ADSyncTools PowerShell module installed, you can install the module by running the following command:
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
Install-Module -Name ADSyncTools
Step 2: Enable SSPR in Microsoft Entra ID