You can modify the automatic configuration settings of an existing Azure AD connector in the Synchronization Service Console.
Prerequisites
To create, consent and delete Azure AD applications for Active Roles Synchronization Service, the user account performing the procedure must have the following permissions:
-
Application Administrator
-
Privileged Role Administrator
To modify the automatic configuration settings of an Azure AD connector
-
In the Synchronization Service Console, open the Connections tab.
-
Click Connection settings under the existing Azure AD connection you want to modify.
-
On the Connection Settings tab, click Specify connection settings to expand it and use the following options.
-
To create a new Azure application or update an existing one, select Auto configuration.
NOTE: If you have more than one Azure Active Directory (Azure AD) service in your Azure tenant, select I have more than one Azure AD in my Azure tenant, and use the Tenant ID field to specify the GUID of the Azure AD for which you want to set up synchronization. For more information, see Finding the GUID (Tenant ID) of an Azure AD for Azure BackSync.
-
Select one of the following options based on the number of Azure AD services in your Azure tenant:
-
I have one Azure AD in my Azure tenant.
-
I have more than one Azure AD in my Azure tenant.
-
-
Authenticate your access to Azure AD:
-
If you have selected I have one Azure AD in my Azure tenant, to authenticate your access to Azure AD, click Log in to Azure, and from the Select Environment Type drop-down, select the environment type of your Azure tenant.
NOTE: Active Roles supports Azure Cloud, Azure GCC and Azure GCC-H government tenants.
-
If you have selected I have more than one Azure AD in my Azure tenant, in Tenant ID, enter the GUID of the Azure AD for which you want to set up synchronization.
TIP: For more information on how to find the GUID of an Azure AD service, see Finding the GUID (Tenant ID) of an Azure AD for Azure BackSync.
After specifying the tenant ID, to authenticate your access to Azure AD, click Log in to Azure, and in the Select Environment Type drop-down, select the environment of your Azure tenant.
NOTE: If you select I have more than one Azure AD in my Azure tenant, the Log in to Azure button will be enabled only if you specify a well-formed Azure AD GUID in the Tenant ID text box.
-
-
Azure application name: Enter the name of the new or existing Azure application.
-
To create or update the Azure application in Azure AD, click Create or update Azure application.
The created or updated Azure application has the following directory roles assigned to it:
-
Directory Writers
-
Exchange Administrator
-
User Administrator
The following permissions are also added, for which you must give admin consent:
-
Sign in and read user profile
-
Manage Exchange As Application
NOTE: You may need to set additional permissions depending on your needs, or remove permissions later if the Azure AD app is no longer used. To add additional permissions to the Azure application or remove any of them, sign in to the Azure Portal, then under Microsoft Entra ID > Manage > Roles and Administrators, manage the currently assigned roles of the app.
-
-
To give admin consent for the permissions of the Azure application, click Consent. Then, in the Azure Tenant Consent dialog, click Accept.
-
To test the connection with the new parameters, click Test connection.
-
To modify the connection settings, click Save.