From Ticket To Self‑Service: SSPR To The Rescue

One of the busiest and least enjoyable tasks for any IT team is resetting passwords. Someone returns from leave, a password expires, or a user simply forgets credentials. Those users then have to call your helpdesk. These requests often arrive in waves and quickly overwhelm support staff, clogging the ticket queue and stealing time from higher‑value work. Microsoft Entra self‑service password reset (short SSPR) lets users change or reset their password without helpdesk or admin involvement. If you enable Password Writeback, Entra ID writes the cloud password reset back to your on‑premises Active Directory in real time. That means fewer tickets, faster recovery, and much less admin overhead. In the following blog post, you learn what SSPR is, how to implement SSPR and a best-practice guide to implement SSPR in your environment.

How SSPR Works

Users reach SSPR via https://aka.ms/sspr or https://passwordreset.microsoftonline.com or the “Forgot my password” link on Microsoft 365 sign‑in pages (the picture is in German, thus it shows “Forgot my password” in German).

When a user starts the password reset process via SSPR, the portal localizes to the browser’s language and the user must first provide his username and complete a CAPTCHA. Entra then checks whether the account exists, whether it’s a B2B guest, and whether the password is managed in the cloud or on-premises. Entra also verifies that the user is enabled for SSPR and has registered the required authentication methods. The user can then change his password using those methods.

If the account is hybrid, and you have enabled Password Writeback, Entra writes the new password back to Active Directory immediately. If writeback isn’t configured or the domain controller is unreachable for an on-premises account, the user is then directed to contact the helpdesk.

Users can only reset their own passwords, and Entra logs every change. Microsoft protects users with admin roles by enforcing a stricter built-in SSPR policy than the one that applies to regular users. Personal Microsoft accounts (Outlook/Hotmail) cannot use SSPR. B2B guest accounts can only use SSPR, if you invite them through the proper B2B flow (see the B2B section below).

Licensing

SSPR covers basic cloud password changes at no extra cost, but some useful features require a licence. Here is a quick overview:

  • Entra Free: Cloud password reset supported, but writeback NOT.
  • Microsoft 365 Business Standard: Cloud password reset supported, but writeback NOT.
  • Microsoft 365 Business Premium: Full SSPR features and writeback supported.
  • Microsoft Entra ID P1 / P2: Full SSPR features and writeback supported.

Password Reset For Administrators

By default, administrator accounts are enabled for SSPR, but they’re treated differently to keep privileged accounts safer. A built‑in, non‑changeable two‑gate policy is enforced for admins. That means two pieces of authentication data are required (for example, an email plus an authenticator app or phone). The SSPR administrator policy doesn’t depend upon the authentications method policySecurity questions are prohibited, and in trial or free tenants office/mobile voice calls are also blocked.

A two-gate policy applies in the following circumstances:

  • All the following Azure administrator roles are affected:
    • Application Administrator
    • Authentication Administrator
    • Billing Administrator
    • Compliance Administrator
    • Cloud Device Administrator
    • Directory Synchronization Accounts (an admin role assigned to the Microsoft Entra Connect service)
    • Directory Writers
    • Dynamics 365 Administrator
    • Exchange Administrator
    • Global Administrator
    • Helpdesk Administrator
    • Intune Administrator
    • Microsoft Entra Joined Device Local Administrator
    • Partner Tier1 Support
    • Partner Tier2 Support
    • Password Administrator
    • Power Platform Administrator
    • Privileged Authentication Administrator
    • Privileged Role Administrator
    • Security Administrator
    • Service Support Administrator
    • SharePoint Administrator
    • Skype for Business Administrator
    • Teams Administrator
    • Teams Communications Administrator
    • Teams Devices Administrator
    • User Administrator
  • If 30 days elapsed in a trial subscription
  • A custom domain is configured for your Microsoft Entra tenant, such as duo-infernale.ch
  • Microsoft Entra Connect synchronizes identities from your on-premises directory

There are a couple of limited exceptions where a one‑gate (single method) policy applies also to administrative accounts:

  • Within the first 30 days of a trial subscription
  • If the tenant still uses the default *.onmicrosoft.com domain and Entra Connect isn’t synchronizing identities.

Disable Password Reset For Administrators

You can disable SSPR for administrator accounts by changing the AllowedToUseSspr property on the tenant authorization policy. This is done using the Microsoft Graph PowerShell module and requires a privileged account (Global Administrator or Policy Administrator) and the Policy.ReadWrite.Authorization scope. Changes can take up to 60 minutes to apply.

To disable SSPR for admins, run in PowerShell:

Connect‑MgGraph -Scopes "Policy.ReadWrite.Authorization"
Update‑MgPolicyAuthorizationPolicy -AllowedToUseSspr:$false

To re-enable SSPR for admins, run in PowerShell:

Update‑MgPolicyAuthorizationPolicy -AllowedToUseSspr:$true

Password reset for B2B users

SSPR works for B2B scenarios as well. SSPR for B2B depends on how the guest was onboarded. Based on the Microsoft Learn article, there are two “real” scenarios:

  1. Users joined your tenant via self‑service sign‑up
    • Who handles the reset: Your tenant, using the email the partner user supplied at sign‑up.
    • What it means for you: The guest can reset using that registered email. You don’t need to manage their password.
  2. Guest invited via modern Entra B2B invite flow
    • Who handles the reset: Your tenant, using the alternate/authentication email the guest provided during the invite.
    • What it means for you: Make sure the invite captured an alternate/authentication email. if it did, the guest can use that address to run SSPR in your tenant.

On‑Premises Integration

Password writeback lets you push a cloud reset or change back into your on‑premises Active Directory Domain Services (short AD DS) in real time. That means users can sign in to on‑premises resources immediately after a reset, and your on‑premises password policy (complexity, history, age, filters) applies even though the reset started in the cloud.

Here’s what happens when a user completes SSPR with password writeback and submits a new password:

  1. Entra ID checks whether the account is managed on‑premises and whether the writeback service is available. If the service is down, the portal informs the user that the reset can’t complete.
  2. If the service is available, Entra ID encrypts the plaintext password with the tenant public key created during setup, adds the metadata, and sends the encrypted package over HTTPS to a tenant‑specific Azure Service Bus relay. That relay is protected by a randomly generated password known only to your on‑premises component.
  3. Your on‑premises agent authenticates to the service bus, retrieves and decrypts the package using the private key, and calls the AD DS SetPassword API against the resolved on‑premises account.
  4. The operation returns success or a meaningful error and the user receives immediate feedback.

Known Limitations Of Password Writeback

  • If the on‑premises agent is down, the user cannot complete a reset and must be told to contact IT.
  • Staged SSPR rollout (security‑group staging) is not reliably supported for writeback. Avoid staged rollout where dependable writeback is required.
  • The on‑premises service account cannot reset passwords for users in protected groups.
  • Some admin portals and older PowerShell variants do not trigger writeback. Admin‑initiated resets from the Entra admin center and Microsoft Graph are supported.

Setup SSPR

To set up SSPR, sign in to the Microsoft Entra admin center (or the Azure portal and open Entra ID) using an account with Global Administrator privileges. That Entra ID role is required to enable SSPR and configure authentication methods. Note that some policy tasks can be performed by the Authentication Policy Administrator, but full SSPR enablement and configuration require Global Administrator rights. 

Note: The following settings are recommended by me and are the configuration I personally use for my customers.

Configure Your Desired Authentication Methods

  • In Entra ID navigate to Security and then to Authentication methods.
  • Configure which verification methods to allow for your users (Authenticator app, Passkey (FIDO2), SMS, etc.).
  • Save changes for every method you configure.
  • If you haven’t migrated your legacy authentication methods for SSPR and per-user MFA, you should do that immediately.

Enable SSPR

  • Open the Password reset settings
    • Go to Entra ID Password reset.
  • Enable SSPR for your target users (pilot) or for all
    • Under Properties set “Self‑service password reset enabled” to All or Selected.
    • If you choose Selected, pick the pilot security group you want to start with.
    • If you choose All, make sure everyone has already configured authentication methods. Otherwise, users will be required to set them up the first time they sign in to any Microsoft cloud service, if configured later in this guide.
    • Click Save.

Choose SSPR Authentication Methods

  • Open Authentication methods.
  • Set the number of methods required to reset a password.
    • Personally I find it more convenient to use only one method to reset a password. Of course, using two methods is always better from a security perspective.
  • Furthermore, you can still configure “Security questions” as an optional authentication policy. This is managed through the SSPR portal rather than via the centralized Authentication Methods policy.
  • Save changes.

Configure Registration Behavior

  • Open Registration.
  • Require users to register and force registration at their next sign‑in. Set the reconfirmation cadence to match your conditional access reauthentication interval (for example, the same number of days).
    • Note: Make sure everyone has already configured authentication methods. Otherwise, users will be required to set them up the first time they sign in to any Microsoft cloud service.
  • Click Save.

Set Up Notifications

  • Open Notifications and enable “Notify users on password reset” and “Notify all admins when other admins reset their passwords” as appropriate.
  • With that configuration, the user receives an email after resetting his password. If an administrator resets his password, all global administrators receive an email notification.
  • Save after each change.

Set Up Customization

  • Open Customization.
  • Add a customized helpdesk link, so users can contact support if they cannot reset their password.
  • Click Save

Check On‑Premises Integration Status

  • Open On‑premises integration  to confirm whether writeback shows as available/connected.
  • Note: Actually enabling writeback is done in Entra ID Connect. This page lets you verify the connector/agent status.
  • Check the option forAllow users to unlock accounts without resetting their password” to Yes.
  • Click Save

Verify Admin Protection Behavior

  • Review the built‑in admin policy note shown in the portal. No extra toggle is required here, unless you intend to disable SSPR for admins via Graph/PowerShell.

Test And Verify SSPR Setup

  • Test with a pilot user
    • Ask a pilot user from your selected group (or create a test account) to go to https://aka.ms/sspr and run the reset flow. Confirm registration, chosen authentication methods, notifications, and (if applicable) that writeback is reflected on‑premises (or that the portal shows writeback failure messages when the on‑premise agent is down).
    • Also test the password reset for an administrator account.
  • Rollout and monitor
    • After testing, adjust the “Properties” setting from Selected to All if you’re ready to roll SSPR out to everyone.
    • Monitor password reset activity and audit logs in the portal for registration and reset events.

Conclusion

SSPR paired with Password Writeback lets users reset passwords themselves from everywhere, reducing helpdesk calls. Start with a small pilot to test all scenarios, including failures and writeback. Make sure privileged accounts are protected, check licensing, and inform users about registration. Measure success by tracking user registration, password resets, and fewer helpdesk tickets. Gradually expand the rollout, and don’t forget to change the SSPR scope to “All”.

Sources

You might also like