{"id":89480,"date":"2019-05-30T09:00:42","date_gmt":"2019-05-30T16:00:42","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89480"},"modified":"2023-05-15T23:00:28","modified_gmt":"2023-05-16T06:00:28","slug":"demystifying-password-hash-sync","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/05\/30\/demystifying-password-hash-sync\/","title":{"rendered":"Demystifying Password Hash Sync"},"content":{"rendered":"
This blog is part of a series of posts providing a behind-the-scenes look of Microsoft\u2019s Detection and Response Team (DART). While responding to cybersecurity incidents around the world, DART engages with customers who are wary about using Password Hash Sync (PHS) or are not utilizing this service\u2019s full capabilities. As customers can gain tremendous security benefits using the full capabilities of this service, we want to demystify PHS.<\/p>\n
What is PHS? First, let\u2019s start with what it is not. PHS doesn\u2019t sync actual passwords. Rather, it syncs the hashes of passwords, which have all undergone a per-user salt and 1,000 iterations of the HMAC-SHA256 key hashing algorithm, before being sent to Azure Active Directory (Azure AD). Through our hands-on experiences, we\u2019ve learned that many companies believe that Microsoft may have access to users’ passwords. Microsoft is committed to protecting your privacy, and it\u2019s important to note that the SHA256 hash cannot be decrypted\u2014so the plain-text version of the password is never and can never be exposed to Microsoft.<\/p>\n
<\/a><\/p>\n The second important consideration of PHS is that, with PHS your Identity Management provider is moved from your current provider to Azure AD. This allows the organization to move from an Identity Management provider\u2014which is typically an on-premises server and requires maintenance and potentially server downtime\u2014to a platform-as-a-service (PaaS) provider.<\/p>\n From a security perspective, organizations gain significant reliability advantages and improved capabilities by moving to PHS, including Smart Lockout, IP Lockout, and the ability to discover leaked credentials, as well as the benefits of utilizing Microsoft\u2019s billions of worldwide data points as additional layers of security to your organization\u2019s environment.<\/p>\n More about these key features:<\/p>\n When the service acquires username\/password pairs, the passwords are sent through the same hashing algorithm and are checked against Azure AD users’ password hashes. When a match is found (indicating a compromised credential), a “Leaked Credentials Risk Event” is created. Please see Azure AD Risk Events<\/a> for\u00a0additional information regarding Leaked Credentials.<\/p>\n Another important benefit to PHS is that, should your tenant experience a Denial of Service (DoS) and\/or Password Spray attack, Microsoft will take the brunt of that traffic. That traffic is directed at Microsoft, not your on-premises Active Directory Federated Services (AD FS). When authentication happens via on-premises AD FS your server is responsible for managing the load and potentially causing downtime.<\/p>\n Moving an organization\u2019s identity management provider to Azure AD and utilizing Password Hash Sync allows for both an increase in overall security posture and reduced management overhead. The security benefits, including leaked credentials, IP lockout, and Smart Lockout, all utilize Microsoft\u2019s telemetry that gives organizations the power of Microsoft\u2019s intelligence.<\/p>\n NOTE<\/strong>: If PHS is the secondary authentication method and, if you choose to take advantage of Smart Lockout and IP Lockout, the primary authentication method must support these functionalities. PHS is recommended as secondary in a hybrid environment if Federated or Pass-through Authentication is primary as a redundancy mechanism, as well as the ability to collect information for Leaked Credentials.<\/p>\n To learn more about DART, our engagements, and how they are delivered by experienced cybersecurity professionals who devote 100 percent of their time to providing cybersecurity solutions to customers worldwide, please contact your account executive.\u00a0Also,\u00a0bookmark the\u202fSecurity blog<\/a> to keep up with our expert coverage on security matters and follow us at\u202f@MSFTSecurity<\/a> for the latest news and updates on cybersecurity. Read DART: the Microsoft cybersecurity team we hope you never meet<\/a> for more about the DART team.<\/p>\n","protected":false},"excerpt":{"rendered":" We debunk the myths about Password Hash Sync (PHS) so you can gain security benefits by using the full capabilities of this service.<\/p>\n","protected":false},"author":96,"featured_media":89486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3673,3675],"products":[3702,3703],"threat-intelligence":[],"tags":[3753,3823],"coauthors":[2107,2108,2109],"class_list":["post-89480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-identity-and-access-management","topic-information-protection-and-governance","products-microsoft-entra","products-microsoft-entra-id","tag-cybersecurity-policy","tag-password-protection"],"yoast_head":"\n\n
\n
Learn more<\/h3>\n