Hybrid Authentication: PHS, PTA & Seamless SSO
Choose the right authentication method for hybrid environments — password hash sync, pass-through authentication, or federation — and plan your AD FS migration.
The hybrid authentication decision
When cloud and on-prem meet, someone has to check the password. The question is: who?
Three options:
- Password Hash Sync (PHS) — Copy a scrambled version of passwords to the cloud. Entra checks the password directly. Like giving a copy of your house key to a trusted neighbour.
- Pass-Through Auth (PTA) — Entra asks your on-prem AD to check the password in real-time. The password never leaves your building. Like calling your landlord to verify a visitor.
- Federation (AD FS) — A separate server handles all authentication. Everything goes through it. Like having a dedicated security guard at the front gate.
The three methods compared
| Feature | Password Hash Sync (PHS) | Pass-Through Auth (PTA) | Federation (AD FS) |
|---|---|---|---|
| Where passwords are validated | In the cloud (Entra ID) | On-premises (AD agents) | On-premises (AD FS servers) |
| Password stored in cloud? | Hash of hash (not plaintext) | Never — validated on-prem | Never — validated on-prem |
| On-prem dependency | None (works if on-prem is down) | Yes — needs running agents | Yes — needs running AD FS servers |
| Infrastructure required | Entra Connect only | Entra Connect + PTA agents | AD FS servers + WAP proxies |
| Supports ID Protection | |||
| Supports leaked credentials detection | |||
| On-prem password policies enforced | At sync time (not real-time) | Real-time | Real-time |
| Smart lockout | Cloud-based | Cloud + on-prem | On-prem only |
| Complexity | Low | Medium | High |
| Microsoft recommendation | Primary choice | When on-prem validation required | Migrate away |
Password Hash Synchronisation (PHS)
How it works:
- Entra Connect reads the password hash from on-prem AD
- Applies an additional hashing algorithm (SHA-256)
- Syncs the derived hash to Entra ID
- When a user signs in, Entra compares the entered password hash against the stored hash
Why Microsoft recommends PHS:
- Simplest — no extra infrastructure
- Most resilient — works even if on-prem is completely down
- Enables ID Protection — leaked credentials detection requires cloud-stored hashes
- No real-time on-prem dependency — sign-in doesn’t fail if your network goes down
Exam tip: PHS is NOT storing plaintext passwords
A common misconception the exam tests: PHS does NOT store your actual password in the cloud. It stores a hash of the hash (double-hashed with SHA-256). Even if the hash were compromised, deriving the original password is computationally infeasible.
The trade-off: password changes on-prem take up to 2 minutes to sync to the cloud. PHS runs its own dedicated sync cycle every ~2 minutes, independent of the 30-minute delta sync. During that window, the old password still works in the cloud.
Pass-Through Authentication (PTA)
How it works:
- User enters credentials at the Entra sign-in page
- Entra encrypts the password and puts it in a queue
- An on-prem PTA agent picks up the request
- The agent validates the password against on-prem AD
- Result (success/failure) is returned to Entra
When to choose PTA:
- Regulatory or security policy requires passwords to NEVER leave on-premises
- You need real-time enforcement of on-prem password policies, account lockouts, and logon hours
- Certain compliance frameworks (healthcare, government) mandate on-prem password validation
PTA agent deployment:
- Install at least 2-3 agents for high availability (if one agent fails, others take over)
- Agents connect outbound to Azure Service Bus — no inbound firewall rules needed
- Agents must be installed on domain-joined Windows Servers
Scenario: Priya chooses PTA for clinical systems
Meridian Health’s security policy states: “Patient data system credentials must not be stored outside the hospital network.” This eliminates PHS for clinical staff.
Priya deploys PTA:
- Three PTA agents across Auckland, Wellington, and Christchurch data centres
- If the Auckland agent goes down, Wellington and Christchurch handle authentication
- On-prem AD logon hour restrictions are enforced in real-time (nurses can’t sign in outside their shift)
But she also enables PHS as a backup. If ALL PTA agents are offline (e.g., national network outage), Entra can fall back to PHS. This requires enabling both — PHS runs alongside PTA.
Seamless SSO
Seamless SSO eliminates password prompts for users on domain-joined devices inside the corporate network. It works with both PHS and PTA.
How it works:
- User signs in to their domain-joined device (Kerberos ticket obtained)
- User opens a browser and navigates to a cloud app
- The browser sends a Kerberos authentication request
- Entra Connect has created a computer account (
AZUREADSSOACC) in on-prem AD - The Kerberos ticket is validated against this account
- User is silently signed in — no password prompt
Requirements:
- Domain-joined devices (Windows)
- Users must be on the corporate network (or VPN)
- Works with PHS or PTA (not needed with AD FS — it has its own SSO)
- The
AZUREADSSOACCcomputer account’s Kerberos decryption key must be rotated regularly (every 30 days recommended)
Exam tip: seamless SSO limitations
Seamless SSO only works on domain-joined devices on the corporate network. It does NOT work:
- On Entra Joined (cloud-only) devices — they already have SSO via Primary Refresh Token
- On personal/BYOD devices
- On macOS, iOS, or Android
- When the user is off-network (unless on VPN)
The exam tests these limitations. If a question mentions “personal laptop from home,” seamless SSO is not the answer.
Migrating from AD FS
Microsoft actively recommends migrating from AD FS to PHS or PTA. AD FS is complex, requires on-prem infrastructure, and doesn’t benefit from cloud security features (ID Protection, leaked credentials).
Migration approach (staged rollout):
- Enable PHS alongside AD FS (as a safety net)
- Use staged rollout to migrate groups of users from AD FS to PHS/PTA
- Test each group thoroughly (Conditional Access, MFA, SSO)
- Move all users once confidence is high
- Decommission AD FS servers
Scenario: Anika migrates a client from AD FS
Anika’s client has been running AD FS for 8 years. Three WAP servers, two AD FS servers, certificates to manage, and a history of outages when the AD FS farm goes down.
Migration plan:
- Enable PHS (passwords sync to cloud as a safety net)
- Use staged rollout: move the IT department first (50 users)
- Monitor for 2 weeks — check sign-in logs, CA policy behaviour
- Migrate Finance, then HR, then all remaining users
- After 30 days with no issues, decommission AD FS
Result: Simpler infrastructure, cloud-side security features unlocked, no more AD FS certificate emergencies at 2 AM.
🎬 Video walkthrough
🎬 Video coming soon
Hybrid Authentication — SC-300 Module 8
Hybrid Authentication — SC-300 Module 8
~12 minFlashcards
Knowledge Check
An organisation wants users to sign in to cloud apps without entering a password when they're on domain-joined devices at the office. They use password hash sync. What should they enable?
A hospital's security policy states that user passwords must never be stored outside the hospital network, even in hashed form. Which authentication method satisfies this requirement?
Anika is migrating a client from AD FS to cloud authentication. She wants to test with the IT team first before moving all 2,000 users. Which feature enables this phased approach?
An organisation currently uses password hash synchronisation and seamless SSO. Users on domain-joined devices at the office sign in without entering a password. A remote worker on a personal laptop reports they must always enter their password. Why?
Next up: Authentication Methods: Passwords to Passkeys — explore the full toolkit of modern authentication methods from certificate-based auth to FIDO2 passkeys.