{"id":89480,"date":"2019-05-30T09:00:42","date_gmt":"2019-05-30T16:00:42","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89480"},"modified":"2023-05-15T23:00:28","modified_gmt":"2023-05-16T06:00:28","slug":"demystifying-password-hash-sync","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/05\/30\/demystifying-password-hash-sync\/","title":{"rendered":"Demystifying Password Hash Sync"},"content":{"rendered":"

This blog is part of a series of posts providing a behind-the-scenes look of Microsoft\u2019s Detection and Response Team (DART). While responding to cybersecurity incidents around the world, DART engages with customers who are wary about using Password Hash Sync (PHS) or are not utilizing this service\u2019s full capabilities. As customers can gain tremendous security benefits using the full capabilities of this service, we want to demystify PHS.<\/p>\n

What PHS is and is not<\/h3>\n

What is PHS? First, let\u2019s start with what it is not. PHS doesn\u2019t sync actual passwords. Rather, it syncs the hashes of passwords, which have all undergone a per-user salt and 1,000 iterations of the HMAC-SHA256 key hashing algorithm, before being sent to Azure Active Directory (Azure AD). Through our hands-on experiences, we\u2019ve learned that many companies believe that Microsoft may have access to users’ passwords. Microsoft is committed to protecting your privacy, and it\u2019s important to note that the SHA256 hash cannot be decrypted\u2014so the plain-text version of the password is never and can never be exposed to Microsoft.<\/p>\n

\"Microsoft<\/a><\/p>\n

The second important consideration of PHS is that, with PHS your Identity Management provider is moved from your current provider to Azure AD. This allows the organization to move from an Identity Management provider\u2014which is typically an on-premises server and requires maintenance and potentially server downtime\u2014to a platform-as-a-service (PaaS) provider.<\/p>\n

From a security perspective, organizations gain significant reliability advantages and improved capabilities by moving to PHS, including Smart Lockout, IP Lockout, and the ability to discover leaked credentials, as well as the benefits of utilizing Microsoft\u2019s billions of worldwide data points as additional layers of security to your organization\u2019s environment.<\/p>\n

More about these key features:<\/p>\n