You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/road-to-the-cloud-implement.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: martinco
7
7
ms.service: active-directory
8
8
ms.topic: how-to
9
9
ms.subservice: fundamentals
10
-
ms.date: 06/03/2022
10
+
ms.date: 07/27/2023
11
11
ms.author: jricketts
12
12
ms.custom: references_regions
13
13
---
@@ -27,7 +27,7 @@ You can enrich user attributes in Azure AD to make more user attributes availabl
27
27
28
28
* App provisioning: The data source of app provisioning is Azure AD, and necessary user attributes must be in there.
29
29
30
-
* Application authorization: A token that Azure AD issues can include claims generated from user attributes so that applications can make authorization decisions based on the claims in the token.
30
+
* Application authorization: A token that Azure AD issues can include claims generated from user attributes so that applications can make authorization decisions based on the claims in the token. It can also contain attributes coming from external data sources through a [custom claims provider](../develop/custom-claims-provider-overview.md).
31
31
32
32
* Group membership population and maintenance: Dynamic groups enable dynamic population of group membership based on user attributes, such as department information.
33
33
@@ -37,7 +37,7 @@ These two links provide guidance on making schema changes:
37
37
38
38
*[Attributes synchronized by Azure AD Connect](../hybrid/reference-connect-sync-attributes-synchronized.md)
39
39
40
-
These links provide more information on this topic but are not specific to changing the schema:
40
+
These links provide more information on this topic but aren't specific to changing the schema:
41
41
42
42
*[Use Azure AD schema extension attributes in claims - Microsoft identity platform](../develop/active-directory-schema-extensions.md)
43
43
@@ -59,7 +59,7 @@ These links provide more information about groups:
59
59
60
60
*[Restrict guest access permissions in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md)
61
61
62
-
You and your team might feel compelled to change your current employee provisioning to use cloud-only accounts at this stage. The effort is non-trivial but doesn't provide enough business value. We recommend that you plan this transition at a different phase of your transformation.
62
+
You and your team might feel compelled to change your current employee provisioning to use cloud-only accounts at this stage. The effort is nontrivial but doesn't provide enough business value. We recommend that you plan this transition at a different phase of your transformation.
63
63
64
64
## Devices
65
65
@@ -71,6 +71,8 @@ Client workstations are traditionally joined to Active Directory and managed via
71
71
72
72
[Windows Autopilot](/mem/autopilot/windows-autopilot) can help you establish a streamlined onboarding and device provisioning, which can enforce these directives.
73
73
74
+
[Windows Local Administrator Password Solution](../devices/howto-manage-local-admin-passwords.md) (LAPS) enables a cloud-first solution to manage the passwords of local administrator accounts.
75
+
74
76
For more information, see [Learn more about cloud-native endpoints](/mem/cloud-native-endpoints-overview).
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/road-to-the-cloud-migrate.md
+13-9Lines changed: 13 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: martinco
7
7
ms.service: active-directory
8
8
ms.topic: how-to
9
9
ms.subservice: fundamentals
10
-
ms.date: 06/03/2022
10
+
ms.date: 07/27/2023
11
11
ms.author: jricketts
12
12
ms.custom: references_regions
13
13
---
@@ -53,7 +53,7 @@ To transform groups and distribution lists:
53
53
54
54
* For self-managed group capabilities provided by Microsoft Identity Manager, replace the capability with self-service group management.
55
55
56
-
* You can [convert distribution lists to Microsoft 365 groups](/microsoft-365/admin/manage/upgrade-distribution-lists) in Outlook. This is a great way to give your organization's distribution lists all the features and functionality of Microsoft 365 groups.
56
+
* You can [convert distribution lists to Microsoft 365 groups](/microsoft-365/admin/manage/upgrade-distribution-lists) in Outlook. This approach is a great way to give your organization's distribution lists all the features and functionality of Microsoft 365 groups.
57
57
58
58
* Upgrade your [distribution lists to Microsoft 365 groups in Outlook](https://support.microsoft.com/office/7fb3d880-593b-4909-aafa-950dd50ce188) and [decommission your on-premises Exchange server](/exchange/decommission-on-premises-exchange).
59
59
@@ -79,11 +79,15 @@ You can reduce your on-premises footprint by moving the HR provisioning workflow
79
79
80
80
Azure AD cloud HR provisioning can also manage Active Directory accounts for existing employees. For more information, see [Plan cloud HR application to Azure Active Directory user provisioning](../app-provisioning/plan-cloud-hr-provision.md) and [Plan the deployment project](../app-provisioning/plan-auto-user-provisioning.md).
81
81
82
+
### Move lifecycle workflows
83
+
84
+
Evaluate your existing joiner/mover/leaver workflows and processes for applicability and relevance to your Azure AD cloud environment. You can then simplify these workflows and [create new ones](../governance/create-lifecycle-workflow.md) using [lifecycle workflows](../governance/what-are-lifecycle-workflows.md).
85
+
82
86
### Move external identity management
83
87
84
88
If your organization provisions accounts in Active Directory or other on-premises directories for external identities such as vendors, contractors, or consultants, you can simplify your environment by managing those third-party user objects natively in the cloud. Here are some possibilities:
85
89
86
-
* For new external users, use [Azure AD External Identities](../external-identities/external-identities-overview.md), which will stop the Active Directory footprint of users.
90
+
* For new external users, use [Azure AD External Identities](../external-identities/external-identities-overview.md), which stops the Active Directory footprint of users.
87
91
88
92
* For existing Active Directory accounts that you provision for external identities, you can remove the overhead of managing local credentials (for example, passwords) by configuring them for business-to-business (B2B) collaboration. Follow the steps in [Invite internal users to B2B collaboration](../external-identities/invite-internal-users.md).
89
93
@@ -161,7 +165,7 @@ There are three main ways to categorize your apps:
161
165
162
166
***Legacy apps**: These applications use legacy protocols such as Kerberos, LDAP, Radius, Remote Desktop, and NTLM (not recommended).
163
167
164
-
Azure AD can be used with each type of application to provide levels of functionality that will result in different migration strategies, complexity, and trade-offs. Some organizations have an application inventory that can be used as a discovery baseline. (It's common that this inventory isn't complete or updated.)
168
+
Azure AD can be used with each type of application to provide levels of functionality that results in different migration strategies, complexity, and trade-offs. Some organizations have an application inventory that can be used as a discovery baseline. (It's common that this inventory isn't complete or updated.)
165
169
166
170
To discover modern authentication apps:
167
171
@@ -217,13 +221,13 @@ Use the following table to determine what Azure-based tools you can use to repla
217
221
218
222
Here's more information that you can use for application server management:
219
223
220
-
*[Azure Arc](https://azure.microsoft.com/services/azure-arc/) enables Azure features for non-Azure VMs. For example, you can use it to get Azure features for Windows Server when it's used on-premises or on Amazon Web Services.
224
+
*[Azure Arc](https://azure.microsoft.com/services/azure-arc/) enables Azure features for non-Azure VMs. For example, you can use it to get Azure features for Windows Server when it's used on-premises or on Amazon Web Services, or [authenticate to Linux machines with SSH](/azure/azure-arc/servers/ssh-arc-overview?tabs=azure-cli).
221
225
222
226
*[Manage and secure your Azure VM environment](https://azure.microsoft.com/services/virtual-machines/secure-well-managed-iaas/).
223
227
224
228
* If you must wait to migrate or perform a partial migration, you can use GPOs with [Azure AD DS](https://azure.microsoft.com/services/active-directory-ds/).
225
229
226
-
If you require management of application servers with Microsoft Configuration Manager, you can't achieve this by using Azure AD DS. Microsoft Configuration Manager isn't supported to run in an Azure AD DS environment. Instead, you'll need to extend your on-premises Active Directory instance to a domain controller running on an Azure VM. Or, you'll need to deploy a new Active Directory instance to an Azure IaaS virtual network.
230
+
If you require management of application servers with Microsoft Configuration Manager, you can't achieve this requirement by using Azure AD DS. Microsoft Configuration Manager isn't supported to run in an Azure AD DS environment. Instead, you need to extend your on-premises Active Directory instance to a domain controller running on an Azure VM. Or, you need to deploy a new Active Directory instance to an Azure IaaS virtual network.
227
231
228
232
### Define the migration strategy for legacy applications
229
233
@@ -241,7 +245,7 @@ To reduce or eliminate those dependencies, you have three main approaches.
241
245
242
246
In the most preferred approach, you undertake projects to migrate from legacy applications to SaaS alternatives that use modern authentication. Have the SaaS alternatives authenticate to Azure AD directly:
243
247
244
-
1. Deploy Azure AD DS into an Azure virtual network.
248
+
1. Deploy Azure AD DS into an Azure virtual network and [extend the schema](/azure/active-directory-domain-services/concepts-custom-attributes) to incorporate additional attributes needed by the applications.
245
249
246
250
2. Lift and shift legacy apps to VMs on the Azure virtual network that are domain-joined to Azure AD DS.
247
251
@@ -313,9 +317,9 @@ Here are key points about usage of Azure AD for VPN authentication:
313
317
314
318
### Move remote access to internal applications
315
319
316
-
To simplify your environment, you can use [Azure AD Application Proxy](../app-proxy/application-proxy.md) or [secure hybrid access](../manage-apps/secure-hybrid-access.md) partners to provide remote access. This will allow you to remove the dependency on on-premises reverse proxy solutions.
320
+
To simplify your environment, you can use [Azure AD Application Proxy](../app-proxy/application-proxy.md) or [secure hybrid access](../manage-apps/secure-hybrid-access.md) partners to provide remote access. This allows you to remove the dependency on on-premises reverse proxy solutions.
317
321
318
-
It's important to mention that enabling remote access to an application by using the preceding technologies is an interim step. You'll need to do more work to completely decouple the application from Active Directory.
322
+
It's important to mention that enabling remote access to an application by using the preceding technologies is an interim step. You need to do more work to completely decouple the application from Active Directory.
319
323
320
324
Azure AD DS allows you to migrate application servers to the cloud IaaS and decouple from Active Directory, while using Azure AD Application Proxy to enable remote access. To learn more about this scenario, check [Deploy Azure AD Application Proxy for Azure Active Directory Domain Services](../../active-directory-domain-services/deploy-azure-app-proxy.md).
0 commit comments