AD Connect vs Cloud Sync: Should You Migrate from Connect Sync to Cloud Sync?

As organizations embrace cloud technologies and modernize their authentication methods, they must still maintain support for their legacy on-premises environments. A key step in transitioning to a cloud-first strategy is extending on-premises Active Directory (AD) identities to a cloud identity provider. For many, this is accomplished through Microsoft Entra Connect Sync, which synchronizes identities and attributes from AD to Entra ID through sophisticated directory synchronization processes.

While Connect Sync remains fully supported, Microsoft has introduced a new syncing solution, Microsoft Entra Cloud Sync, which is designed to simplify and enhance the synchronization process. Cloud Sync not only performs many of the tasks previously handled by Connect Sync but also offers greater flexibility, additional features, and reduces reliance on on-premises infrastructure. These improvements are prompting many organizations to reconsider their synchronization strategy and evaluate whether it’s time to migrate from Connect Sync to the more modern Cloud Sync agent.

Microsoft Entra ID Connect Sync: The Traditional Solution for Maintaining Hybrid Identities

Partner with Microsoft experts you can trust

If it’s time to take that first step toward leveling up your organization’s security, get in touch with Ravenswood to start the conversation. 

Connect Sync has evolved over the years through several iterations (e.g., DirSync and Azure AD Connect Sync V1). The latest release, Microsoft Entra Connect V2, is an updated version of the same software, with the core functionality remaining unchanged: extending on-premises identities to the cloud for authentication to cloud resources. This is achieved by storing data about synchronized objects in the local connect database and processing changes through the Synchronization Engine service, which runs on the Connect Sync server.

Entra Connect V2 introduces several security improvements, such as support for TLS 1.2, migration from the Azure Active Directory authentication library (ADAL) to Microsoft authentication library (MSAL), and an upgrade to SQL Server 2019 for the local database.

Despite these improvements, the complicated on-premises infrastructure and upgrade procedures remain a challenge. These limitations continue to create difficulties for hybrid identity administrators, especially for organizations with complex synchronization topologies that span multiple AD forests and rely on Connect Sync.

For example, Figure 1 illustrates an environment with three forests across two separate networks. The environment uses an active-passive Connect Sync configuration with a separate connect database for each server. To enable Connect Sync, network connectivity has been established between Network 1 and Network 2. A network firewall filters traffic between the networks to minimize exposure to the forests in Network 1. The complexities in these infrastructure requirements, especially the need for network connectivity between disconnected forests have caused additional infrastructure to be implemented, including additional network appliances, dedicated servers for the Connect Database, cloud storage solutions for backup redundancy, and a staging server. The staging server does not participate in synchronization load during normal operations; it is only used during manual failover from the active sync server to the passive staging server as part of a swing migration for updates or outages.

Figure 1 - Connect Sync Synchronization Architecture

While many organizations continue using Connect Sync to synchronize identities with Entra ID, Microsoft has introduced a new agent to further modernize the synchronization process.

Microsoft Entra ID Cloud Sync: A Cloud Native Solution for Your Synchronization Needs

Cloud Sync has been significantly enhanced since its initial release, now offering performance on par with Connect Sync for most hybrid synchronization scenarios, Microsoft has documented common supported AD to Entra ID supported topologies on their Microsoft Entra Cloud Sync supported topologies and scenarios page. While it still extends identities to Entra ID, Cloud Sync reduces on-premises infrastructure requirements by using a lightweight agent. This minimizes infrastructure needs to bridge AD to Entra ID and allows synchronization orchestration to be managed through Microsoft Online services. Additionally, Cloud Sync supports multiple active agents for high availability, eliminating the need for complex active-passive high availability configurations that many organizations previously relied on. The Cloud Sync agent also supports previously unsupported architectural scenarios, such as disconnected AD forests. Another benefit is that Cloud Sync introduces Group Writeback V2, which improves upon its predecessor by adding new features like the ability to choose the Organizational Unit (OU) for group writebacks. Additionally, Cloud Sync introduces new features like on-demand provisioning, which lets you test synchronization with a small group of users before applying changes to the larger population. Cloud Sync’s greatest strength lies in its simplified management, support for synchronization of objects from disconnected forests, and support for multiple active agents. In Figure 2, the environment from Figure 1 has been updated to replace the Connect Sync implementation with Cloud Sync. Since provisioning configuration is stored and run in the cloud through the Microsoft Entra provisioning service, there is no need for a local SQL Server installation. This significantly reduces the on-premises infrastructure and resource requirements. Each Cloud Sync Server actively participates in the synchronization operations, eliminating the need for manual failover and enabling high availability. Additionally, disconnected forests can be synchronized without establishing network connectivity, which eliminates the need for additional network appliances. This approach allows the separation of Network 1 and Network 2, while still allowing identity synchronization to a common identity provider.
Figure 2 - Cloud Sync Synchronization Architecture

However, Cloud Sync does not currently support the same wide range of synchronization scenarios as Connect Sync and does come with its own complexities.

Preparing for Connect Sync to Cloud Sync Migration

With a well-planned migration, both Connect Sync and Cloud Sync can coexist until the migration is complete, ensuring a smooth transition and minimizing disruption. Assessing your organization’s readiness for Cloud Sync starts with evaluating your current Connect Sync implementation and AD Forest configuration. While Cloud Sync supports many scenarios, there are notable exceptions, including environments which require Hybrid Join devices to manage devices which are connected to their on-premises AD domain, large AD domains with over 150,000 objects and complex synchronization scenarios such as Exchange Server resource forests.

Unsupported Configurations

Although Cloud Sync has seen significant improvements and can now support a variety of configurations, it still lacks the depth of the current Connect Sync client. Connect Sync remains the only client capable of supporting many of the complex configurations required by enterprises.

 

Hybrid Join Devices

The lack of support for Hybrid Join devices will make Cloud Sync unsuitable for many enterprise customers, as many still rely on on-premises authentication protocols. These organizations often require Hybrid Join to ensure seamless integration between their on-premises Active Directory and Entra ID environments. Without this support, they cannot migrate to Cloud Sync by converting their devices to Entra Join without losing access to critical on-premises resources, which could lead to significant disruptions in their operations and workflow.

Exchange Resource Forests

Enterprises with complex Exchange implementations will need to rethink their plans to migrate to Cloud Sync, as it currently does not support all scenarios, such as Exchange resource forests or dedicated Exchange forests. These configurations involve housing accounts and mailboxes in separate forests and using custom attribute matching to merge accounts in Entra ID. As a result, organizations will need to continue to utilize Connect Sync.

Migration Readiness

Before migration, hybrid identity administrators should assess their environment’s compatibility. Microsoft has streamlined this process by providing the Check Sync Tool, which helps evaluate whether Cloud Sync is a suitable option. This tool allows administrators to assess their current synchronization configuration and determine if it aligns with their organization’s needs. While some configurations may immediately disqualify Cloud Sync, others may require adjustments to the existing setup for compatibility.

Authentication

Cloud Sync currently supports Password Hash Sync (PHS) and federation, but it does not support Pass Through Authentication (PTA). If your organization is still using PTA, it may be worth assessing PHS as an alternative. Depending on the specific requirements that led your organization to use PTA, you may find that transitioning to PHS is straightforward and provides additional benefits.

Transitioning to PHS provides the opportunity to enable additional Entra ID services, such as allowing your organization to leverage Microsoft Entra ID Protection, which can detect if any users’ credentials have been compromised, helping mitigate potential risks to your organization. When combined with user risk detections and risk policies, users who fall victim to credential harvesting attacks can be prompted to reset their passwords before completing authentication to cloud services.

Device Writeback

If you’re using device writeback solely for Windows Hello for Business, Microsoft continues to support this important passwordless sign-in experience with the Windows Hello for Business Hybrid Cloud Kerberos Trust deployment model, detailed in the Windows Hello for Business Cloud Kerberos Trust Deployment Guide. Although this requires additional configuration before migrating, it offers the benefit of eliminating the need to maintain complex public key infrastructure (PKI) and waiting for Connect Sync synchronization.

Upgrade Connect Sync

It is required that organizations ensure they are using the latest version of Connect Sync to ensure that Cloud Sync migration goes smoothly. Depending on the environment’s architecture, this may involve simply upgrading the primary server. However, in most cases, a swing migration will be preferred for more advanced deployments, which include primary and staging servers. The steps for this migration can be found in the Microsoft document: Microsoft Entra Connect: Upgrade from a previous version – Swing migration.

Approach to Migration

A successful migration starts with thorough planning. This includes identifying the objects currently being synchronized and testing similar objects in a controlled test environment. The non-production and production migration should both follow a similar approach to ensure that the process has been thoroughly tested. These migration milestones have been outlined in Table 1: Pilot Migration, Migration Execution, and Migration Completion.

Pilot Migration
Migration Execution
Migration Completion
Table 1 – Migration Approach
  • Identify good candidates from the three supported categories: users, groups, and contacts
  • Move eligible candidates into a pilot migration by filtering them out of Connect Sync
  • Verify that candidates are successfully filtered and provisioned from the Cloud Sync agent
  • Identify remaining eligible candidates and develop a phased migration strategy
  • Continue moving eligible candidates to Cloud Sync by filtering them out of Connect Sync with each wave
  • Verify successful filtering and provisioning from the Cloud Sync agent, ensuring each migration wave operates as expected before moving to the next
  • Ensure all eligible candidates are marked with the Cloud Sync filtering attribute
  • Stop Connect Sync synchronization and verify that identity changes continue to flow as expected
  • After a sufficient transition period, uninstall the Connect Sync agent

Pilot migration begins with identifying low-risk candidates from each of the supported categories: users, groups, and contacts. These candidates are filtered from the object attribute synchronization flow using custom Connect Sync inbound and outbound rules, and they are scoped into Cloud Sync using scoping filters.

This strategy allows Connect Sync and Cloud Sync to coexist during the transition, enabling a smooth handoff between the two synchronization agents. The steps involved in this process are outlined in the Pilot Migration column of Table 1. Note that the pilot migration may involve multiple phases, with each phase repeating the same steps.

After a successful pilot migration, the remaining in-scope objects should be divided into migration phases. Between each phase, verify that the objects have been successfully filtered from Connect Sync and are being provisioned correctly by Cloud Sync. These validation steps ensure that each migration wave works as expected before moving on to the next. Much of the migration will take place during these phases, which are detailed in the Migration Execution column of Table 1.

Once all eligible objects have been filtered from Connect Sync, the synchronization scheduler should be stopped. This action disables provisioning from the on-premises Connect Sync agent while still allowing for quick reactivation if any issues occur. After a suitable observation period, you can proceed with fully decommissioning the Connect Sync agent and all related infrastructure. These final steps, which include uninstalling the Connect Sync agent, are described in the Migration Completion column of Table 1.

Conclusion

While Connect Sync is still fully supported and has no announced end-of-life date, it may be time to evaluate whether your organization should start planning for a migration from Connect Sync to Cloud Sync, or if Connect Sync can serve as a valuable tool in your cloud-first strategy. When weighing AD Connect vs Cloud Sync options, organizations must carefully consider their specific requirements and infrastructure constraints.

Even if you’re not ready to start the migration now, it’s a good idea to begin reviewing your current synchronization configuration and consider the following questions:

  • What form of authentication is my organization using for Entra ID?
  • Is my primary Connect Sync server running the latest version?
  • Has my staging Connect Sync server been upgraded to the most recent version?
  • Have I recently tested my staging server to ensure it can function if the primary server fails?

If you need guidance on determining whether your organization is ready to migrate to Cloud Sync or assistance in evaluating your current Connect Sync configuration, don’t hesitate to reach out to Ravenswood today.

Partner with Microsoft experts you can trust

If it’s time to take that first step toward leveling up your organization’s security, get in touch with Ravenswood to start the conversation. 

[RELEVANT BLOG CONTENT]