Microsoft Entra ID Only Joined Devices

Imprivata Enterprise Access Management supports enterprises with devices joined to Microsoft Entra ID and users managed on Active Directory.  This topic describes a configuration where Microsoft Active Directory maintains users, and AD syncs with Microsoft Entra ID via Entra Connect.

Click to enlarge.

Entra only support

For other supported configurations, see Microsoft Entra ID Support.

NOTE:
  • Entra ID in Managed mode is supported. Federation mode is not supported at this time.

  • Kerberos authentication is not supported at this time.

Install and Configure Entra Connect

  1. Download Entra Connect from Microsoft: https://www.microsoft.com/en-us/download/details.aspx?id=47594

  2. Install Entra Connect on a dedicated Windows Server.

  3. Run Entra Connect Wizard:

    • Choose Customize for more options.

    • Select your sign-in method based on your needs:

      • Password Hash Synchronization (PHS) Syncs password hashes from AD to Entra ID. PHS enables users to authenticate against Microsoft 365 and other cloud services using their on-premises AD credentials without needing AD FS or Pass-Through Authentication (PTA). However, PHS can cause a delay during password synchronization: the user must wait approximately 5 minutes after the password has been changed or reset before accessing an Entra ID-joined device.

      • Recommended — Pass-Through Authentication (PTA). Users authenticate via on-premises AD. PTA ensures that AD is always treated as the primary "source of truth" for password verification.

    • Connect to your on-premises AD (enter Domain Admin credentials).

    • Connect to Entra ID (enter Global Admin credentials).

    • Configure Domain and OU filtering (if needed).

    • Enable Seamless SSO (optional but recommended).

  4. Start Synchronization:

    • Sync users and groups.

    • Verify by viewing synchronized users on Microsoft Entra ID.

    • Verify that a user managed on AD can log onto an Entra-only joined device.

Entra ID Conditional Access Policies

You must exclude the Imprivata Azure AD Sync app from your MFA conditional access policies for this feature. This requirement is due to a Microsoft blocker.

  1. In Entra ID, go to SecurityConditional Access, and select a policy that applies to your Imprivata users and requires MFA.

  2. To exclude your Imprivata app, go to Cloud apps or actionsCloud appsExcludeSelect excluded cloud apps, and select the Imprivata Azure AD Sync app.

  3. Click Save.

  4. Repeat for all conditional access policies that apply to your Imprivata app and require MFA.

NOTE:

Microsoft-managed policies don't allow you to exclude specific cloud apps. If you have a Microsoft-managed policy that requires MFA, recreate it so you can exclude the Imprivata Azure AD Sync app, and then turn off the Microsoft-managed policy.

Imprivata Appliance Configuration

Adding on-premises Active Directory to your existing Imprivata Enterprise Access Management setup:

  1. In the Imprivata Admin Console, go to UsersDirectoriesAdd

  2. On the Select Directory Server pageAdd New Imprivata Domain, select MS Active Directory, and click Next.

  3. On the Connection Parameters page, enter the relevant information about your domain.

  4. Click Save, or Synchronize Users to proceed with user synchronization.