blog

Azure AD – Removing Inactive Azure AD Pass-through Agent

If you remove a server that previously hosted a Pass-through Authentication agent, the Microsoft Entra admin center can keep showing that agent as Inactive for a while. At first glance it looks like a cleanup problem, but in most cases it is expected behavior rather than a failed uninstall.

Azure AD Connect Pass-through authentication page showing one inactive authentication agent among active ones

Quick answer

You usually do not remove the inactive entry manually from the portal. Once the Authentication Agent is uninstalled, the stale record can stay visible for some time and then disappear on its own.

What to check before you ignore it

Make sure all of the following are true:

  • The old server really has both components removed:
    • Microsoft Entra Connect Authentication Agent
    • Microsoft Entra Connect Agent Updater
  • You still have at least one other active authentication agent if the tenant is using Pass-through Authentication.
  • Sign-ins are working before you retire the last server involved in authentication.

Why this happens

The portal tracks registered agents separately from the local server state. After uninstall, the tenant can still remember the old agent identity for a while, so the blade shows it as inactive until the service ages that record out.

Current note

This post was originally written when the product was called Azure AD. As of April 22, 2026, the current Microsoft documentation refers to the service as Microsoft Entra ID and states that an uninstalled Pass-through Authentication agent is automatically removed from the list after 10 days.

If you are migrating from AD FS or replacing Entra Connect servers, treat an inactive entry as expected unless it is your only agent or users are actively failing to sign in.