Active Directory Contact Sync Tool (ADCST)

I ran into a scenario recently where two companies had been sharing the same Office365 Exchange tenant for >2 years, one of the two companies was now big enough to warrant its own Exchange online instance, however the two companies still needed to be able to seamlessly contact one another [Lync(Skype For Business)/Exchange Mail/Share Calendars/etc].

We could  easily share calendar information between 365 accounts, however the problem of “finding” a user in the sister-company became an issue;  How does a user in “company A” find a user in “company B” if they don’t know them before hand? By splitting user out of the original Office 365 tenant they loose visibility to search for people in the Global Address List (GAL) to look-up job titles/user locations/phone-numbers etc (This was desired).

One option was to create contact objects in “Company A’s” active directory for users in “Company B” (and vice-versa) and have these sync to Office 365 via Directory Sync… Good-idea, however this is manual and is not a function of Office 365 “out of the box”.

…It turned out this problem wasn’t tremendously hard to solve with the improvements that Microsoft have recently made to Office 365, specifically around the ability to access and [now] query the Azure Active Directory that comes with Office 365 with the Graph API.

Introducing ADCST – A little tool written in C# to help resolve this problem by facilitating the Sync of address books between Office 365 tenants (GAL Address book syncing / federation)

How it works:

The concept is fairly trivial really – Each company delegates Read-Only access to their Azure active directory to a custom application; this is no different to allowing a Standard Application for something like Jira (from Atlassian) access to your Active Directory in Azure for authentication… The corresponding company cannot retrieve anything other than standard AD attributes nor can they attempt to authenticate as you (Allowing read-only access will generate a certificate that can be exchanged to the other company; and can be revoked at any time).

Once each company has established application access to their AzureAD Instance, the relevant details are exchanged and loaded into the ADCST tool.

ADCST Flow

Now, when the application is invoked user objects from Company A that were previously synced to Office365/AzureAD via Directory Sync are retrieved as objects by ADCST. They are then added to Company B’s on-premise Active Directory as contact objects and synced to their instance of Office365 to later appear in the GAL. If a user was to leave Company A and their account to be deleted, the corresponding contact object will be removed Company B’s GAL.

  • Objects to be synced are determined by a membership of a group (that is, users in Company A must be in a specified group otherwise they will not be synced and created)
  • Objects will only be created in a Target OU as specified in configuration.
  • Only the following attributes are synced (if they exist):
    • givenName
    • Mail
    • sn
    • displayName
    • title
    • l
    • co & c
    • st
    • streetAddress
    • department

Phew, okay… how to set it up:

How to set it up:

  1. Download a copy ADCST or go and grab the source from GITHUB 🙂
  2. Access your Azure active Directory and complete the following:
    1. Access your Office365 Portal, select AzureAD from the left hand bar of the Admin portal
      AzureAD
    2. Once tha Azure Portal loads, Click on Active Directory in the left hand nav.
    3. Click the directory tenant where you wish to register the sample application.
    4. Click the Applications tab.
    5. In the drawer, click Add.
    6. Click “Add an application my organization is developing”.
    7. Enter a friendly name for the application, for example “Contoso ADCST”, select “Web Application and/or Web API“, and click next.
    8. For the Sign-on URL, enter a value (NOTE: this is not used for the console app, so is only needed for this initial configuration): “http://localhost”
    9. For the App ID URI, enter “http://localhost”. Click the checkmark to complete the initial configuration.
    10. While still in the Azure portal, click the Configure tab of your application.
    11. Find the Client ID value and copy it aside, you will need this later when configuring your application.
    12. Under the Keys section, select either a 1-year or 2-year key – the keyValue will be displayed after you save the configuration at the end – it will be displayed, and you should save this to a secure location. NOTE: The key value is only displayed once, and you will not be able to retrieve it later.
    13. Configure Permissions – under the “Permissions to other applications” section, you will configure permissions to access the Graph (Windows Azure Active Directory). For “Windows Azure Active Directory” under the first permission column (Application Permission:1″), select “Read directory data”. Notes: this configures the App to use OAuth Client Credentials, and have Read access permissions for the application.
    14. Select the Save button at the bottom of the screen – upon successful configuration, your Key value should now be displayed – please copy and store this value in a secure location.
    15. You will need to update the ADCST.exe.config of ADCST with the updated values.
      1. AzureADTenantName = Update your tenant name for the authString value (e.g. example.onMicrosoft.com)
      2. AzureADTenantId = Update the tenantId value for the string tenantId, with your tenantId. Note: your tenantId can be discovered by opening the following metadata.xml document: https://login.windows.net/GraphDir1.onmicrosoft.com/FederationMetadata/2007-06/FederationMetadata.xml – replace “example.onMicrosoft.com”, with your tenant’s domain value (any domain that is owned by the tenant will work). The tenantId is a guid, that is part of the sts URL, returned in the first xml node’s sts url (“EntityDescriptor”): e.g. “https://sts.windows.net/”
      3. AzureADClientId = This is the ClientID noted down previously
      4. AzureADClientSecret = This is the certificate Value noted down previously
      5. AzureADUserGroup = This group contains all of the user accounts in the Remove Azure AD that you with to pull into your Active Directory on-prem as contact objects.
      6. FQDomainName = FQDN of your on-prem Active Directory Domain
      7. DestinationOUDN = The distinguished name of the Target OU that you with to create the Contact objects in
      8. ContactPrefix = This string will populate the Description field in Active Directory
      9. AllowCreationOfADObjects = Self Explanitory, Allow ADCST to create Contact objects in AD
      10. AllowDeletionOfADObjects = Self Explanitory, Allow ADCST to delete Contact objects in AD when they are no longer required
      11. VerboseLogUserCreation = Log contact creation to Debug Log
      12. VerboseLogUserDeletion = Log contact deletion to Debug log
  3. Create a Service Account to run this as and Delegate it Create/Delete rights on the OU Container on your on-prem Active Directory (see this post for some pretty good instructions – We want to be able to create/delete user accounts [even though these will be contact objects])
  4. Create a Scheduled task to call the ADCST executable on a regular basis as the Service Account that you just created.

I suggest you do some solid-testing prior to rolling this into Production (with read-only acccess you wont be able to do any damage to the Azure AD… The on-prem AD is the one you dont wanna screw-up)

The above implementation certainly wont appeal to everybody, and it could be argued that this is a specific edge-case, but it appears to do the job nicely for what was required. Let me know if you have any thoughts or suggestions.

-Patrick

The fine print: The use of this software is at your own risk – No warrantee is expressed or implied.

EDIT #1 (7/06/15): I’ve gone ahead and refactored a few things on this project. The following has changed:

  • ADCST will now Sync nominated Group’s to  Active Directory as contact Objects (I want to change this to normal Group objects with members expanded from source groups). (Synced Group [Distinguished name] destination defined using the “GroupsDestinationOUDN” App.Config Value + Source Group defined using AzureADGroupsGroup App.Config Value).
  • Users that are synced are now added to a nominated security group – This can be used to lock down groups/resources in Exchange to Internal users as well as contact objects contained in this new security group to prevent spam. (Group [distinguished named] defined using the “PermittedSendersGroupDN” App.Config Value).

14 thoughts on “Active Directory Contact Sync Tool (ADCST)

  1. Awesome tool, thanks! I’ve forked it to get it to recurse through sub groups.
    Would be awesome if it could sync Photos too…

    -Adam

  2. Hi Patrick,

    Any idea why I would be getting:
    2017-03-21 15:25:52.9860 | UTC: 2017-03-21 15:25:52.9860 | ERROR | 1 | Error when Creating user contact A constraint violation occurred.

    I get a few of those, but not many.

    I also get this error at the end of a run:
    2017-03-21 15:25:53.1579 | UTC: 2017-03-21 15:25:53.1579 | ERROR | 1 | Could not find Group in Azure (All Staff (Dynamic) to enumerate users from |
    2017-03-21 15:25:53.2048 ************************ Shutdown ************************

    Any suggestions would be awesome. Thanks for the tool.

    • Hi Robert sorry for the late reply.

      This usually means that the account you’re trying to create is missing something or has something that cant be used when creating a contact object. Is there anything special about the user its being based off – perhaps its missing a property that AD On-prem requires?

      How is the tool working for you otherwise – I’d love to rebuild it at some stage…the code is pretty messy 🙁

      -Patrick

    • Hi Tito,

      This would certainly work from Customer B to Company A as the application retrieves user information and creates contacts by fetching them from an API that Microsoft expose for Azure Active Directory.
      The inverse could be achieved by getting Azure Active Directory and syncing your on-prem AD to Azure Active Directory – This could still be accomplished without ditching your on-prem exchange. You could sign up for office 365 (pay for one user only which will give you Azure AD) and install Directory Sync to push user information to Azure AD then use ADSCT to sync from Company A to customer B.

      Please let me know if you have any further questions – Hope this helps.

  3. Hi Patrick,

    I am currently using this tool and it is quite good. however i have 3 notes:

    1. Syncing of telephone/mobile data would be huge for us. office location would also be good
    2. When updating a users address (city is specific field we care about), it doesnt seem to be enough to update the contact. We need to delete and resync for the change to take effect. But that causes even bigger issues with sending them emails (as they are a new object.
    3. the option to create them as a mail-enabled contact would be huge. i currently run a script to update the users, but if this was possible with the app it would be great.

    Cheers and Thankyou!

  4. Hey Justin,

    You’re right – this project needs some love. I’m going to kick off a new version of this tonight and try incorporate your changes.
    I do have a branch of the existing code base that creates mail enabled users (so that we can grab their photo from Office365) – The mail enabled users are unable to login, they are effectivly disabled , would you agree that’s the right approach?

    Cheers,
    Patrick

    • Patrick-
      I love the idea of you adding some development to this; I too have a need for some of the changes you are proposing to make to the project. Do you have any general idea what your time frame is?

      I need to sync a few thousand users between 2 companies with disparate O365 tenants as part of a merger and would love to incorporate your latest efforts into the planned close of the deal in early October.

      Let me know….thx!

      • Thanks you.

        I’m still chipping away at it in my spare time so its a little way aways yet – it is looking good however.

        -Patrick

  5. Hi Patrick,
    Excellent tool, saved me a lot of headaches! Successfully configured to sync between 3 Tenants, running two instances on each on-premise AD.
    Agree with previous comments with regards to additional attributes, telephone numbers would be a real bonus.
    Also, I had the “Error when Creating user contact A constraint violation occurred” and after some investigation found that removing the country code from the object allowed it to sync without error. To debug I had to manually find what contacts were missing – would be useful if the error log identified what object it failed on.
    Many Thanks
    Martin

  6. Patrick,
    Could we commission your work to provide a solution to our need?
    We have multiple 365 tenants that need their GALs synchronized. What are you able to do for us?

  7. These instructions don’t seem to be up to date anymore. Is this project still alive? Will it work with the latest Azure AD?

Leave a Reply

Your email address will not be published. Required fields are marked *