Pass-through authentication is an alternative to AD FS and password hash synchronization in Azure AD. This technology allows users to access cloud apps after authenticating against the local Active Directory. The configuration of pass-through authentication is less complex than that of AD FS, for example.

In a hybrid environment, many companies are already implementing a single credentials strategy. Users log in to their Active Directory accounts, and then they can also access public cloud applications such as those from M365.

This is often achieved by a relatively maintenance-intensive AD FS infrastructure. Pass-through authentication offers a simple alternative, which requires only an agent installation on-prem.

Pass through authentication status in the Azure Portal under Azure AD Connect

Pass through authentication status in the Azure Portal under Azure AD Connect

Advantages of using pass-through authentication

So, what advantages does pass-through authentication offer compared to other technologies, such as Active Directory Federation Services (AD FS)? A few examples will help clarify:

  • Pass-through authentication can be easily configured via Azure AD Connect (as a sign-in method).
  • The pass-through authentication agents are compact and can be installed on multiple servers in a highly available manner (but not multiple agents on one server).
  • The agents only communicate outbound with Azure AD via TCP port 443 (HTTPS requests for feature operations) and port 80 to Azure Active Directory (HTTP requests for downloading CRLs). Further firewall adjustments are not required, since outbound ports 80 and 443 are mostly already allowed.
  • Placement in a DMZ is not required.
  • Pass-through authentication does not require password hash transfer to the public cloud because authentication is done on-prem against Active Directory.
  • If the login account is locked in AD, then the user cannot log in to M365 either.
  • Password changes take effect immediately; there is no need to wait for a replication window (two minutes).
  • Pass-through authentication works together with MFA and Conditional Access Policies.
  • Self-service password reset (SSPR) in the cloud is supported (password writeback).

How pass-through authentication works

Pass through authentication process

Pass through authentication process

  1. In my example, a new user opens their cloud application.
  2. The request is routed to Azure AD, and the user enters their credentials to log in (response by Azure AD security token service).
  3. The password is encrypted with the pass-through authentication agent's public key (this is stored in Azure SQL for each registered agent). The encrypted password remains in the service bus queue until the pass-through authentication agent (permanently connected to the queue) receives it. Unlike AD FS, the cloud fetches its credentials and processes them in a queue.
  4. The pass-through authentication agent receives the username and encrypted password through an outbound connection.
  5. The agent on the on-prem system processes this login queue and decrypts the password using its private key.
  6. The credentials are validated against the on-prem AD DS using the Win32 LogonUser API.
  7. Active Directory then validates the request and acknowledges it as successful, failed, password expired, account locked, or credentials incorrect.
  8. The pass-through authentication agent forwards this response back to Azure AD.
  9. An assessment takes place at this point to determine whether this result is related to the log-in request.
  10. If the result is positive, the user can access the application.

Note: Agents do not communicate with each other but only with the public cloud. Also, there is no load balancing required when using multiple agents. The Windows server running the agents should be hardened.

Configuring pass-through authentication

As mentioned earlier, pass-through authentication can be configured quickly using an already installed Azure Active Directory Connect (AAD Connect). The wizard guides you through the necessary steps via the Change user sign-in task.

The AAD Connect Wizard guides you through the configuration of pass through authentication.

The AAD Connect Wizard guides you through the configuration of pass through authentication.

To begin, you need to connect to Azure AD via my global administrator as usual.

Using the global administrator to connect to Azure Active Directory

Using the global administrator to connect to Azure Active Directory

After that, you can select the pass-through authentication login option via the corresponding radio button. Additionally, the box Enable single sign-on is already checked.

Selecting pass through authentication and SSO in AAD Connect

Selecting pass through authentication and SSO in AAD Connect

If you decide to use single sign-on, then the credentials of the local domain admin have to be verified once.

Activating SSO via the on prem domain admin

Activating SSO via the on prem domain admin

The configuration for pass-through authentication is already done here. In this case, the password hash synchronization is still active (backup) and can be deactivated later, if required.

Completing the pass through authentication configuration using AAD Connect

Completing the pass through authentication configuration using AAD Connect

Once the configuration is confirmed, the AAD Connect pass-through authentication agent is automatically installed. Alternatively, this can be loaded from the Azure Portal and set up manually on additional servers (server core is not supported).

The summary shows the configuration steps that will follow.

The summary shows the configuration steps that will follow.

Now, two additional on-prem services are provided, one is the Azure AD Connect Authentication Agent and the other is Microsoft Azure AD Connect Agent Updater.

In Azure AD, it is possible to verify that the Authentication Agent is communicating properly.

Subscribe to 4sysops newsletter!

Pass through authentication can be verified in the Azure Portal under Azure AD.

Pass through authentication can be verified in the Azure Portal under Azure AD.

Additional links to pass-through authentication

avatar
1 Comment
  1. Randy Gadell 1 year ago

    Does this work in Azure GCC High?

Leave a reply

Your email address will not be published.

*

© 4sysops 2006 - 2023

CONTACT US

Please ask IT administration questions in the forums. Any other messages are welcome.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account