Skip to content

Commit 4d0775b

Browse files
committed
Update compare-identity-solutions.md
1 parent f08d119 commit 4d0775b

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,6 @@ When you deploy and run a self-managed AD DS environment, you have to maintain a
5454
Common deployment models for a self-managed AD DS environment that provides identity to applications and services in the cloud include the following:
5555

5656
* **Standalone cloud-only AD DS** - Azure VMs are configured as domain controllers and a separate, cloud-only AD DS environment is created. This AD DS environment doesn't integrate with an on-premises AD DS environment. A different set of credentials is used to sign in and administer VMs in the cloud.
57-
* **Resource forest deployment** - Azure VMs are configured as domain controllers and an AD DS domain that's part of an existing forest is created. A trust relationship is then configured to an on-premises AD DS environment. Other Azure VMs can domain-join to this resource forest in the cloud. User authentication runs over a VPN / ExpressRoute connection to the on-premises AD DS environment.
5857
* **Extend on-premises domain to Azure** - An Azure virtual network connects to an on-premises network using a VPN / ExpressRoute connection. Azure VMs connect to this Azure virtual network, which lets them domain-join to the on-premises AD DS environment.
5958
* An alternative is to create Azure VMs and promote them as replica domain controllers from the on-premises AD DS domain. These domain controllers replicate over a VPN / ExpressRoute connection to the on-premises AD DS environment. The on-premises AD DS domain is effectively extended into Azure.
6059

0 commit comments

Comments
 (0)