After converting your domain from Federated to Managed authentication, the next logical step in a cloud-first identity strategy is to disconnect Azure AD Connect and make all users cloud-only.
This sounds simple, but it’s one of the most misunderstood steps in Microsoft Entra ID. Many admins assume stopping the sync service is enough, it isn’t.
This blog walks through the correct, Microsoft-supported process, explains confusing Graph behavior (like “no output” results), and sets expectations so you can complete this change without user interruption.
Critical Concept (Read This First)
Stopping Azure AD Connect does NOT make users cloud-only.
There are two separate actions that must happen:
- Break directory synchronization ownership at the tenant level
- Stop Azure AD Connect on the server
Both are required — and order matters.
Phase 1 – Pre-Checks (Mandatory)
1. Confirm Authentication Is Managed
Before touching sync, make sure ADFS is no longer involved.
Get-MgDomain | Select Id, AuthenticationType
✔ All domains must show Managed
❌ If any domain is still Federated, stop here
2. Ensure Password Hash Sync Was Working
This ensures users can continue signing in once they become cloud-only.
On the Azure AD Connect server:
Get-ADSyncAADCompanyFeature
Confirm:
PasswordHashSync : True
If this is False, do not proceed.
3. Identify How Many Users Are Still Synced
Get-MgUser -All | Where-Object {$_.OnPremisesSyncEnabled -eq $true} | Measure-Object
This gives you a baseline of how many objects will transition.
Phase 2 – Disable Directory Sync at the Tenant Level (MOST IMPORTANT STEP)
This is the step that actually makes users cloud-only.
1. Connect to Microsoft Graph
Connect-MgGraph -Scopes Directory.ReadWrite.All
2. Disable Directory Synchronization
$org = Get-MgOrganization
Update-MgOrganization -OrganizationId $org.Id -BodyParameter @{
onPremisesSyncEnabled = $false
}
What Happens Next (This Is Normal)
- The change is not immediate
- Microsoft backend processing takes:
- ⏱️ 30 minutes to 72 hours
- During this window:
- Users may still show as synced
- This is expected behavior
Phase 3 – Monitoring the Transition
1. “No Output” When Checking Tenant Sync Status
Many admins run:
(Get-MgOrganization).OnPremisesSyncEnabled
…and see no output.
This Is NOT an Error
In Microsoft Graph:
OnPremisesSyncEnabledis a nullable property- If the value is
null, PowerShell prints nothing nullis treated the same as sync disabled
Correct way to check:
Get-MgOrganization | Select Id, OnPremisesSyncEnabled
Possible results:
| Output | Meaning |
|---|---|
True | Sync still enabled |
False | Sync explicitly disabled |
| Blank / null | Sync already disabled (cloud-only state) |
👉 Blank is good.
2. Monitor User Conversion (Best Indicator)
Get-MgUser -Top 20 | Select DisplayName, OnPremisesSyncEnabled
Final expected state:
Falseor- Blank value
Both mean:
- Users are cloud-only
- Source of authority is Microsoft Entra ID
Phase 4 – Validation (Do Not Skip)
1. Identity Management Validation
In Entra Admin Center, confirm you can now edit:
- Display Name
- Job Title
- Department
- ProxyAddresses
If editable → users are cloud-only.
2. Password and MFA Validation
- Password sign-in works
- MFA prompts correctly
- SSPR works
- No dependency on on-prem AD
3. App and Client Testing
Test:
- Browser sign-in
- Outlook
- Teams
- Mobile devices
Phase 5 – Stop Azure AD Connect (Server-Side)
Only do this after tenant sync is disabled.
On the Azure AD Connect server:
Stop-Service ADSync
Set-Service ADSync -StartupType Disabled
At this point:
- No changes flow from on-prem
- Users remain functional
- No passwords change
Phase 6 – Decommission Azure AD Connect (Safely)
Recommended Approach
- Power off the server
- Wait 7–14 days
- Monitor sign-in logs and helpdesk tickets
- If stable:
- Uninstall Azure AD Connect
- Decommission the VM
⚠️ Do not delete immediately — rollback insurance matters.
Rollback (If Ever Needed)
You can re-enable directory sync:
Update-MgOrganization -OrganizationId (Get-MgOrganization).Id -BodyParameter @{
onPremisesSyncEnabled = $true
}
Then reinstall Azure AD Connect. or restart the services.
Common Mistakes to Avoid
❌ Only stopping the ADSync service
❌ Expecting instant cloud-only conversion
❌ Deleting Azure AD Connect too early
❌ Forgetting service or break-glass accounts
Will Users Be Impacted?
Short Answer: No major disruption
What Most Users Experience
- Same password
- Same MFA
- Same apps
- No visible change
What a Small Subset Might See
- One-time MFA prompt
- Token refresh
- “Stay signed in?” prompt
These are normal and temporary.
Final Takeaway
Authentication (Federated → Managed)
Identity ownership (Synced → Cloud-only)
These are two different operations and must be done in sequence.
If you:
- Disable tenant sync first
- Wait for backend processing
- Then stop Azure AD Connect
You get:
- Zero downtime
- No password resets
- No user interruption
- Fully cloud-managed identities
Closing Thought
If things have “stopped” and users are signing in normally, you did it right.
At this stage:
- Do nothing
- Monitor for 24–48 hours
- Then close the change confidently
!!! THANKS FOR READING !!!
Regards,
HARISH KUMAR
Knowledge is not a finite resource to hoard; it’s a boundless treasure that grows when shared