Microsoft Entra hybrid join targeted deployment
You can validate your planning and prerequisites for hybrid Microsoft Entra joining devices using a targeted deployment before enabling it across the entire organization. This article explains how to accomplish a targeted deployment of Microsoft Entra hybrid join.
Caution
Use caution when modifying values in Active Directory. Making changes in an established environment might have unintended consequences.
Targeted deployment of Microsoft Entra hybrid join on Windows current devices
For devices running Windows 10, the minimum supported version is Windows 10 (version 1607) to do hybrid join. As a best practice, upgrade to the latest version of Windows 10 or 11. If you need to support previous operating systems, see the section Supporting down-level devices.
To do a targeted deployment of Microsoft Entra hybrid join on Windows current devices, you need to:
- Clear the Service Connection Point (SCP) entry from Windows Server Active Directory if it exists.
- Configure client-side registry setting for SCP on your domain-joined computers using a Group Policy Object (GPO).
- If you're using Active Directory Federation Services (AD FS), you must also configure the client-side registry setting for SCP on your AD FS server using a GPO.
- You might need to customize synchronization options in Microsoft Entra Connect to enable device synchronization.
Tip
The SCP might be configured locally in the registry of the device in certain situations. If the device finds a value in the registry it uses that configuration, otherwise it queries the directory for the SCP and attempts to hybrid join.
Clear the SCP from Microsoft Windows Server Active Directory
Use the Active Directory Services Interfaces Editor (ADSI Edit) to modify the SCP objects in Microsoft Windows Server Active Directory.
- Launch the ADSI Edit desktop application from and administrative workstation or a domain controller as an Enterprise Administrator.
- Connect to the Configuration Naming Context of your domain.
- Browse to CN=Configuration,DC=contoso,DC=com > CN=Services > CN=Device Registration Configuration.
- Right-click on the leaf object CN=62a0ff2e-97b9-4513-943f-0d221bd30080 and select Properties.
- Select keywords from the Attribute Editor window and select Edit.
- Select the values of azureADId and azureADName (one at a time) and select Remove.
- Close ADSI Edit.
Configure client-side registry setting for SCP
Use the following example to create a Group Policy Object (GPO) to deploy a registry setting configuring an SCP entry in the registry of your devices.
- Open a Group Policy Management console and create a new Group Policy Object in your domain.
- Provide your newly created GPO a name (for example, ClientSideSCP).
- Edit the GPO and locate the following path: Computer Configuration > Preferences > Windows Settings > Registry.
- Right-click on the Registry and select New > Registry Item.
- On the General tab, configure the following.
- Action: Update.
- Hive: HKEY_LOCAL_MACHINE.
- Key Path: SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD.
- Value name: TenantId.
- Value type: REG_SZ.
- Value data: The globally unique identifier (GUID) or Tenant ID of your Microsoft Entra tenant, which can be found in Identity > Overview > Properties > Tenant ID.
- Select OK.
- On the General tab, configure the following.
- Right-click on the Registry and select New > Registry Item.
- On the General tab, configure the following.
- Action: Update.
- Hive: HKEY_LOCAL_MACHINE.
- Key Path: SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD.
- Value name: TenantName.
- Value type: REG_SZ.
- Value data: Your verified domain name if you're using federated environment such as AD FS. Your verified domain name or your partner.onmschina.cn domain name, for example
contoso.partner.onmschina.cn
if you're using managed environment.
- Select OK.
- On the General tab, configure the following.
- Close the editor for the newly created GPO.
- Link the newly created GPO to the correct organizational unit (OU) containing domain-joined computers that belong to your controlled rollout population.
Configure AD FS settings
If your Microsoft Entra ID is federated with AD FS, you first need to configure client-side SCP using the instructions mentioned earlier by linking the GPO to your AD FS servers. The SCP object defines the source of authority for device objects. It can be on-premises or Microsoft Entra ID. When client-side SCP is configured for AD FS, the source for device objects is established as Microsoft Entra ID.
Note
If you failed to configure client-side SCP on your AD FS servers, the source for device identities would be considered as on-premises. AD FS will then start deleting device objects from on-premises directory after the stipulated period defined in the AD FS Device Registration's attribute "MaximumInactiveDays". AD FS Device Registration objects can be found using the Get-AdfsDeviceRegistration cmdlet.
Supporting down-level devices
To register Windows down-level devices, organizations must install Microsoft Workplace Join for non-Windows 10 computers available on the Microsoft Download Center.
You can deploy the package by using a software distribution system like Microsoft Configuration Manager. The package supports the standard silent installation options with the quiet parameter. The current branch of Configuration Manager offers benefits over earlier versions, like the ability to track completed registrations.
The installer creates a scheduled task on the system that runs in the user context. The task is triggered when the user signs in to Windows. The task silently joins the device with Microsoft Entra ID with the user credentials after authenticating with Microsoft Entra ID.
To control the device registration, you should deploy the Windows Installer package to your selected group of Windows down-level devices.
Note
If a SCP is not configured in Microsoft Windows Server Active Directory, then you should follow the same approach as described to Configure client-side registry setting for SCP) on your domain-joined computers using a Group Policy Object (GPO).
Why a device might be in a pending state
When you configure a Microsoft Entra hybrid join task in the Microsoft Entra Connect Sync for your on-premises devices, the task syncs device objects to Microsoft Entra ID, and temporarily set the registered state of the devices to "pending" before the device completes the device registration. This pending state is because the device must be added to the Microsoft Entra directory before it can be registered. For more information about the device registration process, see How it works: Device registration.
Post validation
After you verify that everything works as expected, you can automatically register the rest of your Windows current and down-level devices with Microsoft Entra ID. Automate Microsoft Entra hybrid join by configuring the SCP using Microsoft Entra Connect.