- Hybrid (common) identity = Cloud + On Premises identity
- Connection is done through Azure AD connect
- Unified Development and DevOps
- A common approach to building applications, and full flexibility to deploy in the cloud or on-premises
- Integrated management and security
- Built-in management and security solutions across full operational lifecycle from cloud to on-premises
- Common Identity
- Enable end-user productivity with single sign on to cloud and on premises applications while protecting corporate data
- Single identity
- Create and manage a single identity for each user across your hybrid enterprise, keeping users, groups and devices in sync
- Single Sign-on
- Provide single sign-on access to your application including thousands of pre-integrated SaaS apps
- Conditional Access
- Protect identities by enforcing risk-based conditional access policies and multi-factor authentication for both on-premises and cloud applications
- Remote Access
- Provide secure remote access to on-premises web applications through Azure AD Application Proxy
- Self Service
- Self service password reset and application access requests for directories in the datacenter an the cloud
- High Availability
- Collaboration
- Enable vendors, contractors and partners to get risk-free access to in-house resources
- Consistency
- Truly consistent capabilities
- Consistent Data Platform
- Seamlessly distribute data between cloud and on-premises
- Enrich with analysis and deep learning
- Integrate your on-premises AD or LDAP directory to the cloud
- Establish a single identity for your us ers to access on-premises and cloud-based resources
- Connect your users to thousands of SaaS applications published through Azure
- Manage in Azure AD Connect → Synchronization Service
- Adjust to business changes after Azure AD Connect is installed.
- Change the service accounts
- Add the Managers OU to be included in the synchronization
- Create a new user in Azure AD as Global Administrator
- Download Azure AD Connect and install it.
- You need > Windows Server 2008
- Installation settings
- Initially
- Custom or Express installation
- Installation location
- Create an express SQL or use an existing SQL instance
- Provide a service account or create a new one
- Service account for SQL server
- Custom sync groups
- Fill: Administrators group, operators group, browser group, password reset groups
- AD Connect groups not domain groups!
- Then
- How users will sign-in
- One of them: Password synchronization, Pass-through authentication, Federation with AD FS
- Enable sign on → Yes, No
- Forest and Azure credentials
- Global administration username password
- Select directory type (AD or LDAP)
- Then type Forest name
- Create new AD account or use existing AD account
- Type domain username and password
- 💡 Recommended to enter Enterprise Admin credentials
- Select UPN for sign-in
- E.g.
azure-contoso.com
- Select user name: e.g.
userPrincipalName
,treeName
,unicodePwd
- E.g.
- How users will sign-in
- Then
- Choose what domains and OUs get synchronized to the cloud
- Sync all domains and OUs or sync selected domains and OUs
- How to uniquely identify users
- Identification:
- Users are represented only once across all directories.
- User identities exist across multiple directories.
- Match using: mail attribute, specific attribute, etc.
- Source anchor (ID)
- Let Azure manage the source anchor for me
- Specific attribute: objectGUID, pager, objectSid etc.
- Identification:
- Filter users and devices by group
- Synchronize all users and devices
- Synchronize selected
- Optional features
- Exchange hybrid deployment
- Exchange mail public folders
- Azure AD app and attribute filtering
- Password synchronization
- Password writeback
- Group writeback
- Device writeback
- Directory extension attribute sync.
- Enable single sign on
- ❗ Requires domain administrator account
- Choose staging mode or install it
- Staging mode: Synchronization won't synchronize any data to Azure AD
- Choose what domains and OUs get synchronized to the cloud
- Post installation
- Install AzureAD powershell module
- 💡 Then enable Azure AD recycle bin
- Initially
- What'll be synced in the next synchronization
- Connectors to and from on-premises Active Directory
- Connectors to and from Azure Active Directory
- Controls what attributes from what objects from what location are available for synchronization
- Authentication and Authorization
- How do users typically login to their on-premises environment?
- How will users sign-on to the cloud?
- Will you be allowing workers from partner networks access to cl oud and on-premises resources?
- Multi Factor Authentication
- Do you currently implement multi-factor authentication?
- What are the key scenarios that you want to enable MFA for?
- Will you use MFA to secure Microsoft Apps?
- Will you use MFA to secure remote access to on-premises apps?
- Delegation and Administration
- Does your company have more than one user with elevated privilege to manage your identity system?
- Does your company need to delegate access to users to manage specific resources?
- Does each delegated user need the same access?
- Directory synchronization
- Do you have a disaster recovery plan for the synchronization server?
- Where will the synchronization server be located?
- E.g. if it's behind a firewall, you'll need to open up some ports
- Do you have any other directory on-premises like LDAP or an HR database?
- Does your company use Microsoft Exchange?
- Multi Forest synchronization
- Are the UPNs unique in your organization?
- More than one forest → You can call people same thing as other people → You won't be able to do that in single Azure AD as they need unique UPNs.
- Will the Azure AD Connect server be able to get to each forest?
- Do you have an account with the correct permissions for all forests you want to synchronize with?
- Are the UPNs unique in your organization?
- Password synchronization
- Do you have restrictions on storing passwords in the cloud?
- Will your employees be able to reset their own passwords?
- *What account lockout policy does your company require?
- Applications
- Will users be accessing on-premises applications? In the cloud? Or both?
- Are there plans to develop new applications that will use cloud authentications?
- If so, then make sure that authentication can use OAuth, certificates e.t.c.
- Will cloud users be accessing applications on-premises?
- Will on-premises users be accessing applications in the cloud?
- Access Control
- Does your a company need to limit access to resources according to some conditions?
- Does your company have any application that needs custom control access to some resources?
- Does your company need to integrate access control capabilities between on-premises and cloud resources?
- Does each user need the same access level?
- Domain Name
- What name will your organization use for your domain in the cloud?
- Does your organization have a custom domain name?
- Is your domain public and easily verifiable via DNS?
- Directory Structure
- How many AD forests do you have?
- How many Azure AD directories?
- Will you filter what user accounts are synchronized with the Azure AD?
- Do you have multiple Azure AD Connect servers planned?
- Do you have different directory that users authenticate against?
- Federation
- Will you use the Azure Federation or on-premises AD FS?
- An option is moving on-premises AD FS to Azure Federation.
- More federation services for identities are provided now through Azure
- Does your organization use smart cards for Multi Factor Authentication
- Will you use the Azure Federation or on-premises AD FS?
- ❗ Restrictions
- One to one relation between Azure AD and AD Connect
- Multiple AD Connect can not connect to Single azure AD
- Azure AD Connect cannot connect to multiple Azure AD directories
- The same user account cannot sync to multiple Azure AD directories
- Users in one Azure AD cannot appear as contacts in another Azure AD directory
- One to one relation between Azure AD and AD Connect
- Single Forest to Single Azure AD
- Single Forest → Single AD Connect → One Multiple AD
- Most common topology
- 💡 Recommended by Microsoft
- Expected topology when using Azure AD Connect Express installation
- Supports multiple domains
- Single Forest to Multiple Azure AD
- Single Forest → Multiple AD Connects → One Multiple AD
- Useful when e.g. some users passwords cannot be written back to the cloud but another department can do it.
- ❗ Azure AD Connect sync servers must be configured for mutually exclusive filtering.
- ❗ Users in one Azure AD will only be able to see users from their own Azure AD instance.
- ❗ A DNS domain can only be registered in a single Azure AD directory.
- ❗ Some write-back features not supported with this topology
- No group / device writeback
- Multiple Forest to Single Azure AD
- Multiple Forest → One AD Connect → One Azure AD
- ❗ Users must have only one identity across all forests
- The user authenticates to the forest in which their identity is located.
- All forests are accessible by Azure AD Connect
- ❗ Users have only one mailbox
- Multiple Forest to Multiple Azure AD
- Multiple Forest → Multiple AD Connects → Multiple Azure ADs
- Useful especially if you need isolation for different forests.
- For each instance of Azure AD, you'll need an installation of Azure AD Connect
- Users in one Azure AD will only be able to see users from their AAD instance.
- Add Azure AD Domain Name
- Create directory where organization name is
contoso.local
. - Add domain name
azure-contoso.com
and verify through TXT DNS entry.
- Create directory where organization name is
- Add UPN Suffix
- On-prem resources has
[email protected]
but you'll need[email protected]
to allow e.g. SSO. - Flow:
- Add
azure-contoso.com
as an alternative UPN Suffix through Active Directory Domains and Trusts - Add
azure-contoso.com
to all user accounts as the preferred UPN suffix.
- Add
- On-prem resources has
- Password synchronization
- A copy of password and usernames is synchronized to the cloud.
- Pass through authentication
- You don't store passwords in cloud
- User is authenticated using pass through authentication agent that connects with on-premises AD
- Works seamlessly with Azure Multi-Factor authentication
- Seamless SSO
- Works with Azure AD Join or the desktop is previously joined to your AD domain
- Requires Azure service endpoints to be added to the client browser's Intranet zone.
- This way the browser can send the Kerberos ticket to the website.
- Flow:
- Client from a joined device tries to access to a resource in cloud.
- Local client goes to AD DC and gets an access token.
- Client forwards access token to Azure AD.
- If MFA is enabled, it'll prompt user.
- Azure AD → Enterprise Applications
- 4 categories
- Gallery applications
- Applications you're developing, integrated with Azure AD
- On-premises applications with Azure AD Application Proxy
- Azure AD Application Proxy
- Allows Azure to reach on-premises resources.
- Consistent access to private resources without a VPN.
- Install App Proxy & Connector on-premises
- ❗ Cannot be installed on a server with the Pass Through Authentication connector
- ❗ You need to configure a CNAME on DNS for the particular domain work for it to work.
- Set-up on Azure
- Add applications
- Assign to users
- Configure SSO
- Provision just like any SaaS app
- Flow for Azure user reaching on-premises resource:
- Azure AD gives a token to user
- User sends that token to Azure App Proxy
- Proxy takes UPN and SPN and gives it to connector
- Connector goes to on-prem AD and gets Kerberos ticket.
- It forwards it to actual on-prem application, it verifies the ticket and ticket is assigned to the cloud user.
- Azure AD Application Proxy
- Non-gallery applications
- Manage permission
- Azure AD → Enterprise Applications → In application → Users and groups
- Configure SSO
- Configure SSO for the new application
- Manage permission
- Azure AD → Enterprise Applications → In application → Single sign-on
- Sign-on types:
- Password-based Sign-on
- Linked Sign-on
- SAML
- Provides step by step guide for federation between application and Azure AD manually
- Manage permission
- Click on the new application new in the Azure AD MyApps access panel
- Access panel is reached at
myapps.microsoft.com
- It prompts you to install a browser extension
- Access panel is reached at
- Install Access Panel Extension
- Log into application so that password is stored for SSO
- Configure SSO for the new application