|
| 1 | +--- |
| 2 | +title: Road to the cloud - Implementing a cloud-first approach when moving identity and access management from AD to Azure AD |
| 3 | +description: Implement a cloud-first approach as part of planning your migration if IAM from AD to Azure AD. |
| 4 | +documentationCenter: '' |
| 5 | +author: janicericketts |
| 6 | +manager: martinco |
| 7 | +ms.service: active-directory |
| 8 | +ms.topic: how-to |
| 9 | +ms.subservice: fundamentals |
| 10 | +ms.date: 06/03/2022 |
| 11 | +ms.author: jricketts |
| 12 | +ms.custom: references_regions |
| 13 | +--- |
| 14 | + |
| 15 | +# Implement cloud first approach |
| 16 | + |
| 17 | +This is mainly a process and policy driven phase to stop, or limit as much as possible, adding new dependencies to AD and implement a cloud-first approach for new demand of IT solutions. |
| 18 | + |
| 19 | +It's key at this point to identify the internal processes that would lead to adding new dependencies on AD. For example, most organizations would have a change management process that has to be followed before new scenarios/features/solutions are implemented. We strongly recommend making sure that these change approval processes are updated to include a step to evaluate whether the proposed change would add new dependencies on AD and request the evaluation of Azure AD alternatives when possible. |
| 20 | + |
| 21 | +## Users and groups |
| 22 | + |
| 23 | +You can enrich user attributes in Azure AD to make more user attributes available for inclusion. Examples of common scenarios that require rich user attributes include: |
| 24 | + |
| 25 | +* App provisioning - The data source of app provisioning is Azure AD and necessary user attributes must be in there. |
| 26 | + |
| 27 | +* Application authorization - Token issued by Azure AD can include claims generated from user attributes. |
| 28 | + |
| 29 | +* Application can make authorization decision based on the claims in token. |
| 30 | + |
| 31 | +* Group membership population and maintenance - Dynamic groups enables dynamic population of group membership based on user attributes such as department information. |
| 32 | + |
| 33 | +These two links provide guidance on making schema changes: |
| 34 | + |
| 35 | +* [Understand the Azure AD schema and custom expressions](../cloud-sync/concept-attributes.md) |
| 36 | + |
| 37 | +* [Attributes synchronized by Azure AD Connect](../hybrid/reference-connect-sync-attributes-synchronized.md) |
| 38 | + |
| 39 | +These links provide additional information on this topic but are not specific to changing the schema: |
| 40 | + |
| 41 | +* [Use Azure AD schema extension attributes in claims - Microsoft identity platform](../develop/active-directory-schema-extensions.md) |
| 42 | + |
| 43 | +* [What are custom security attributes in Azure AD? (Preview) - Azure Active Directory](../fundamentals/custom-security-attributes-overview.md) |
| 44 | + |
| 45 | +* [Tutorial - Customize Azure Active Directory attribute mappings in Application Provisioning](../app-provisioning/customize-application-attributes.md) |
| 46 | + |
| 47 | +* [Provide optional claims to Azure AD apps - Microsoft identity platform](../develop/active-directory-optional-claims.md) |
| 48 | + |
| 49 | +* [Create or edit a dynamic group and get status - Azure AD](../enterprise-users/groups-create-rule.md) |
| 50 | + |
| 51 | +* Use dynamic groups for automated group management |
| 52 | + |
| 53 | +* Use self-service groups for user-initiated group management |
| 54 | + |
| 55 | +* For application access, consider using [scope provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md) or [entitlement management](../governance/entitlement-management-overview.md) |
| 56 | + |
| 57 | +For more information on group types, see [Compare groups](/microsoft-365/admin/create-groups/compare-groups). |
| 58 | + |
| 59 | +* Use external identities for collaboration with other organizations - stop creating accounts of external users in on-premises directories |
| 60 | + |
| 61 | +You and your team might feel compelled to change your current employee provisioning to use cloud-only accounts at this stage. The effort is non-trivial and doesn't provide enough business value to warrant the effort. We recommend you plan this transition at a different phase of your transformation. |
| 62 | + |
| 63 | +## Devices |
| 64 | + |
| 65 | +Client workstations are traditionally joined to AD and managed via group policy (GPO) and/or device management solutions such as Microsoft Endpoint Configuration Manager (MECM). Your teams will establish a new policy and process to prevent newly deployed workstations from being domain-joined going forward. Key points include: |
| 66 | + |
| 67 | +* Mandate [Azure AD join](../devices/concept-azure-ad-join.md) for new Windows client workstations to achieve "No more domain join" |
| 68 | + |
| 69 | +* Manage workstations from cloud by using Unified Endpoint Management (UEM) solutions such as [Intune](/mem/intune/fundamentals/what-is-intune) |
| 70 | + |
| 71 | +[Windows Autopilot](/mem/autopilot/windows-autopilot) is highly recommended to establish a streamlined onboarding and device provisioning, which can enforce these directives. |
| 72 | + |
| 73 | +For more information, see [Get started with cloud native Windows endpoints - Microsoft Endpoint Manager](/mem/cloud-native-windows-endpoints) |
| 74 | + |
| 75 | +## Applications |
| 76 | + |
| 77 | +Traditionally, application servers are often joined to an on-premises Active Directory domain so that they can utilize Windows Integrated Authentication (Kerberos or NTLM), directory queries using LDAP and server management using Group Policy or Microsoft Endpoint Configuration Manager (MECM). |
| 78 | + |
| 79 | +The organization has a process to evaluate Azure AD alternatives when considering new services/apps/infrastructure. Directives for a cloud-first approach to applications should be as follows (new on-premises/legacy applications should be a rare exception when no modern alternative exists): |
| 80 | + |
| 81 | +* Provide recommendation to change procurement policy and application development policy to require modern protocols (OIDC/OAuth2 and SAML) and authenticate using Azure AD. New apps should also support [Azure AD App Provisioning](../app-provisioning/what-is-hr-driven-provisioning.md) and have no dependency on LDAP queries. Exceptions require explicit review and approval. |
| 82 | + |
| 83 | +> [!IMPORTANT] |
| 84 | +> Depending on anticipated demand of application that require legacy protocols, when more current alternatives are not feasible you can choose to deploy [Azure AD Domain Services](../../active-directory-domain-services/overview.md). |
| 85 | +
|
| 86 | +* Provide a recommendation to create a policy to prioritize use of cloud native alternatives. The policy should limit deployment of new application servers to the domain. Common cloud native scenarios to replace AD joined servers include: |
| 87 | + |
| 88 | + * File servers |
| 89 | + |
| 90 | + * SharePoint / OneDrive - Collaboration support across Microsoft 365 solutions and built-in governance, risk, security, and compliance. |
| 91 | + |
| 92 | + * [Azure Files](../../storage/files/storage-files-introduction.md) offers fully managed file shares in the cloud that are accessible via the industry standard SMB or NFS protocol. Customers can use native [Azure AD authentication to Azure Files](../../virtual-desktop/create-profile-container-azure-ad.md) over the internet without line of sight to a DC. |
| 93 | + |
| 94 | + * Azure AD also works with third party applications in our [Application Gallery](/security/business/identity-access-management/integrated-apps-azure-ad) |
| 95 | + |
| 96 | + * Print Servers |
| 97 | + |
| 98 | + * Mandate to procure [Universal Print](/universal-print/) compatible printers - [Partner Integrations](/universal-print/fundamentals/universal-print-partner-integrations) |
| 99 | + |
| 100 | + * Bridge with [Universal Print connector](/universal-print/fundamentals/universal-print-connector-overview) for non-compatible printers |
| 101 | + |
| 102 | +## Next steps |
| 103 | + |
| 104 | +[Introduction](road-to-the-cloud-introduction.md) |
| 105 | + |
| 106 | +[Cloud transformation posture](road-to-the-cloud-posture.md) |
| 107 | + |
| 108 | +[Establish an Azure AD footprint](road-to-the-cloud-establish.md) |
| 109 | + |
| 110 | +[Transition to the cloud](road-to-the-cloud-migrate.md) |
0 commit comments