Hybrid Identity: Connect Sync vs Cloud Sync
Bridge your on-premises Active Directory with Entra ID β choose between Entra Connect Sync and Cloud Sync, and monitor the pipeline with Connect Health.
Why hybrid identity?
Hybrid identity is like having both a physical filing cabinet and a digital copy in the cloud.
Most organisations didnβt start in the cloud. They have an on-premises Active Directory with years of user accounts, group policies, and computer objects. Moving everything to the cloud overnight isnβt realistic.
Hybrid identity bridges the gap β it synchronises your on-prem AD users and groups to Entra ID, so people can use the same identity for on-prem file servers AND cloud apps like Microsoft 365. One username, one password, everywhere.
The big comparison: Connect Sync vs Cloud Sync
| Feature | Entra Connect Sync | Entra Cloud Sync |
|---|---|---|
| Architecture | Heavy agent on a Windows Server | Lightweight agent β logic runs in the cloud |
| Server requirement | Dedicated Windows Server (recommended) | Lightweight agent on any domain-joined machine |
| Multi-forest support | Yes (complex configuration) | Yes (simpler β one agent per forest) |
| Password hash sync | ||
| Pass-through auth | ||
| ADFS federation | ||
| Device writeback | ||
| Group writeback | Yes (supported) | |
| Exchange hybrid | Limited | |
| Custom attribute sync | Extensive | Growing (via expressions) |
| High availability | Staging server (manual failover) | Multiple agents (automatic failover) |
| Management | On-premises wizard | Cloud-based (Entra portal) |
| Best for | Complex hybrid environments | Simpler environments or multi-forest |
When to choose Connect Sync
- You need pass-through authentication or ADFS federation
- You need device writeback (write Entra devices back to on-prem AD)
- You have a complex Exchange hybrid deployment
- You need advanced attribute filtering and transformation rules
When to choose Cloud Sync
- You want simpler management (cloud-based, no on-prem server to maintain)
- You have multiple disconnected AD forests (easier multi-forest support)
- You want automatic failover (multiple lightweight agents)
- Youβre a new deployment without legacy Connect Sync requirements
- Microsoft is investing heavily here β Cloud Sync is the future direction
Quick decision flowchart
Need PTA or AD FS? β Connect Sync (only option) Need device writeback? β Connect Sync (only option) Multiple forests + password hash sync only? β Cloud Sync (simpler) New deployment, no legacy requirements? β Cloud Sync (recommended) Already on Connect Sync, no blockers? β Consider migrating to Cloud Sync
Scenario: Priya migrates from Connect Sync to Cloud Sync
Meridian Health has been running Entra Connect Sync for three years on a dedicated Windows Server. After the CityClinic acquisition, they now have two AD forests.
Priya evaluates the options:
- Current state: Connect Sync handles the Meridian forest. Adding CityClinic requires complex multi-forest configuration on the same server.
- Cloud Sync option: Install a lightweight agent in each forest. Management moves to the cloud. Automatic failover if an agent goes down.
Since Meridian doesnβt use pass-through authentication (they use password hash sync) and doesnβt need device writeback, Cloud Sync is the better fit for the multi-forest scenario.
Entra Connect Sync β how it works
- Install the Entra Connect Sync application on a Windows Server (joined to your AD domain)
- Configure which OUs and attributes to synchronise
- Choose an authentication method (password hash sync, pass-through auth, or federation)
- Initial sync β full synchronisation of all in-scope objects
- Delta sync β runs every 30 minutes, syncing only changes
Key components:
- Sync engine β the core that reads from AD and writes to Entra ID
- Connector space β staging area for objects being synced
- Metaverse β unified view merging all connected directories
- Rules engine β transforms attributes during sync (e.g., construct UPN from AD fields)
Entra Cloud Sync β how it works
- Install the Entra Cloud Sync provisioning agent on a domain-joined machine
- Configure everything in the Entra admin center (cloud-based)
- Scoping filters define which users/groups to sync
- Attribute mapping (with expression support) controls data transformation
- Provisioning runs continuously β creates, updates, and deprovisions objects
Key difference: The sync logic runs in the cloud, not on-premises. The agent is just a connector β it has no local database or rules engine.
Entra Connect Health β monitor the pipeline
Entra Connect Health monitors your hybrid identity infrastructure and provides alerts when something goes wrong.
| What It Monitors | Alerts For |
|---|---|
| Entra Connect Sync | Sync failures, export errors, password sync issues |
| AD FS servers | Service availability, performance, certificate expiration |
| AD Domain Services | Replication health, NTLM/Kerberos auth issues |
Where to find it: Entra admin center β Connect Health
Exam tip: Connect Health requires P1
Entra Connect Health requires a Microsoft Entra ID P1 licence. It installs a health agent on each monitored server (Connect Sync server, ADFS servers, domain controllers).
Key monitoring features:
- Sync error report β objects that failed to sync (duplicate attributes, missing required fields)
- Password sync troubleshooting β specific heartbeat for password hash sync
- Alert notifications β email when critical issues are detected
- Usage analytics β ADFS sign-in patterns, top requesting applications
π¬ Video walkthrough
π¬ Video coming soon
Hybrid Identity β SC-300 Module 7
Hybrid Identity β SC-300 Module 7
~12 minFlashcards
Knowledge Check
A company has two disconnected AD forests after an acquisition. They need to sync users from both forests to a single Entra tenant. They use password hash sync and don't need pass-through authentication or device writeback. Which sync solution is most appropriate?
After deploying Entra Connect Sync, Priya notices some user objects aren't appearing in Entra ID. Where should she check first?
Anika recommends Cloud Sync for a client. The client asks why they can't use Cloud Sync for pass-through authentication. What is Anika's response?
Next up: Hybrid Authentication: PHS, PTA & Seamless SSO β choose the right authentication method for your hybrid environment and plan AD FS migration.