Skip to content

Commit 9fe23bd

Browse files
authored
Merge pull request #203149 from janicericketts/roadtothecloud
Adding road to the cloud files, graphics, and updated TOC
2 parents fe6c3a4 + 1712e08 commit 9fe23bd

9 files changed

+721
-0
lines changed
161 KB
Loading
117 KB
Loading
139 KB
Loading
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Road to the cloud - Establish a footprint for moving identity and access management from AD to Azure AD
3+
description: Establish an Azure AD footprint as part of planning your migration of IAM from AD to Azure AD.
4+
documentationCenter: ''
5+
author: janicericketts
6+
manager: martinco
7+
ms.service: active-directory
8+
ms.topic: how-to
9+
ms.subservice: fundamentals
10+
ms.date: 06/03/2022
11+
ms.author: jricketts
12+
ms.custom: references_regions
13+
---
14+
15+
# Establish an Azure AD footprint
16+
17+
If you're using Microsoft Office 365, Exchange Online, or Teams then you are already using Azure AD. If you do, your next step is to establish more Azure AD capabilities.
18+
19+
* Establish hybrid identity synchronization between AD and Azure AD using [Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) or [Azure AD Connect Cloud Sync](../cloud-sync/what-is-cloud-sync.md).
20+
21+
* [Select authentication methods](../hybrid/choose-ad-authn.md). We strongly recommend password hash synchronization (PHS).
22+
23+
* Secure your hybrid identity infrastructure by following [Secure your Azure AD identity infrastructure - Azure Active Directory](../../security/fundamentals/steps-secure-identity.md)
24+
25+
## Optional tasks
26+
27+
The following aren't specific or mandatory to transforming from AD to Azure AD but are recommended functions to incorporate into your environment. These are also items recommended in the [Zero Trust](/security/zero-trust/) guidance.
28+
29+
### Deploy Passwordless authentication
30+
31+
In addition to the security benefits of [passwordless credentials](../authentication/concept-authentication-passwordless.md), this simplifies your environment because the management and registration experience is already native to the cloud. Azure AD provides different passwordless credentials that align with different use cases. Use the information in this document to plan your deployment: [Plan a passwordless authentication deployment in Azure Active Directory](../authentication/howto-authentication-passwordless-deployment.md)
32+
33+
Once you roll out passwordless credentials to your users, consider reducing the use of password credentials. You can use the [reporting and Insights dashboard](../authentication/howto-authentication-methods-activity.md) to continue to drive use of passwordless credentials and reduce use of passwords in Azure AD.
34+
35+
>[!IMPORTANT]
36+
>During your application discovery, you might find applications that have a dependency or assumptions around passwords. Users of these applications need to have access to their passwords until those applications are updated or migrated.
37+
38+
### Configure hybrid Azure AD join for existing Windows clients
39+
40+
You can configure hybrid Azure AD join for existing AD joined Windows clients to benefit from cloud-based security features such as [co-management](/mem/configmgr/comanage/overview), conditional access, and Windows Hello for Business. New devices should be Azure AD joined and not hybrid Azure AD joined.
41+
42+
To learn more, check: [Plan your hybrid Azure Active Directory join deployment](../devices/hybrid-azuread-join-plan.md)
43+
44+
## Next steps
45+
46+
[Introduction](road-to-the-cloud-introduction.md)
47+
48+
[Cloud transformation posture](road-to-the-cloud-posture.md)
49+
50+
[Implement a cloud-first approach](road-to-the-cloud-implement.md)
51+
52+
[Transition to the cloud](road-to-the-cloud-migrate.md)
Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: Road to the cloud - Implementing a cloud-first approach when moving identity and access management from AD to Azure AD
3+
description: Implement a cloud-first approach as part of planning your migration if IAM from AD to Azure AD.
4+
documentationCenter: ''
5+
author: janicericketts
6+
manager: martinco
7+
ms.service: active-directory
8+
ms.topic: how-to
9+
ms.subservice: fundamentals
10+
ms.date: 06/03/2022
11+
ms.author: jricketts
12+
ms.custom: references_regions
13+
---
14+
15+
# Implement cloud first approach
16+
17+
This is mainly a process and policy driven phase to stop, or limit as much as possible, adding new dependencies to AD and implement a cloud-first approach for new demand of IT solutions.
18+
19+
It's key at this point to identify the internal processes that would lead to adding new dependencies on AD. For example, most organizations would have a change management process that has to be followed before new scenarios/features/solutions are implemented. We strongly recommend making sure that these change approval processes are updated to include a step to evaluate whether the proposed change would add new dependencies on AD and request the evaluation of Azure AD alternatives when possible.
20+
21+
## Users and groups
22+
23+
You can enrich user attributes in Azure AD to make more user attributes available for inclusion. Examples of common scenarios that require rich user attributes include:
24+
25+
* App provisioning - The data source of app provisioning is Azure AD and necessary user attributes must be in there.
26+
27+
* Application authorization - Token issued by Azure AD can include claims generated from user attributes.
28+
29+
* Application can make authorization decision based on the claims in token.
30+
31+
* Group membership population and maintenance - Dynamic groups enables dynamic population of group membership based on user attributes such as department information.
32+
33+
These two links provide guidance on making schema changes:
34+
35+
* [Understand the Azure AD schema and custom expressions](../cloud-sync/concept-attributes.md)
36+
37+
* [Attributes synchronized by Azure AD Connect](../hybrid/reference-connect-sync-attributes-synchronized.md)
38+
39+
These links provide additional information on this topic but are not specific to changing the schema:
40+
41+
* [Use Azure AD schema extension attributes in claims - Microsoft identity platform](../develop/active-directory-schema-extensions.md)
42+
43+
* [What are custom security attributes in Azure AD? (Preview) - Azure Active Directory](../fundamentals/custom-security-attributes-overview.md)
44+
45+
* [Tutorial - Customize Azure Active Directory attribute mappings in Application Provisioning](../app-provisioning/customize-application-attributes.md)
46+
47+
* [Provide optional claims to Azure AD apps - Microsoft identity platform](../develop/active-directory-optional-claims.md)
48+
49+
* [Create or edit a dynamic group and get status - Azure AD](../enterprise-users/groups-create-rule.md)
50+
51+
* Use dynamic groups for automated group management
52+
53+
* Use self-service groups for user-initiated group management
54+
55+
* For application access, consider using [scope provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md) or [entitlement management](../governance/entitlement-management-overview.md)
56+
57+
For more information on group types, see [Compare groups](/microsoft-365/admin/create-groups/compare-groups).
58+
59+
* Use external identities for collaboration with other organizations - stop creating accounts of external users in on-premises directories
60+
61+
You and your team might feel compelled to change your current employee provisioning to use cloud-only accounts at this stage. The effort is non-trivial and doesn't provide enough business value to warrant the effort. We recommend you plan this transition at a different phase of your transformation.
62+
63+
## Devices
64+
65+
Client workstations are traditionally joined to AD and managed via group policy (GPO) and/or device management solutions such as Microsoft Endpoint Configuration Manager (MECM). Your teams will establish a new policy and process to prevent newly deployed workstations from being domain-joined going forward. Key points include:
66+
67+
* Mandate [Azure AD join](../devices/concept-azure-ad-join.md) for new Windows client workstations to achieve "No more domain join"
68+
69+
* Manage workstations from cloud by using Unified Endpoint Management (UEM) solutions such as [Intune](/mem/intune/fundamentals/what-is-intune)
70+
71+
[Windows Autopilot](/mem/autopilot/windows-autopilot) is highly recommended to establish a streamlined onboarding and device provisioning, which can enforce these directives.
72+
73+
For more information, see [Get started with cloud native Windows endpoints - Microsoft Endpoint Manager](/mem/cloud-native-windows-endpoints)
74+
75+
## Applications
76+
77+
Traditionally, application servers are often joined to an on-premises Active Directory domain so that they can utilize Windows Integrated Authentication (Kerberos or NTLM), directory queries using LDAP and server management using Group Policy or Microsoft Endpoint Configuration Manager (MECM).
78+
79+
The organization has a process to evaluate Azure AD alternatives when considering new services/apps/infrastructure. Directives for a cloud-first approach to applications should be as follows (new on-premises/legacy applications should be a rare exception when no modern alternative exists):
80+
81+
* Provide recommendation to change procurement policy and application development policy to require modern protocols (OIDC/OAuth2 and SAML) and authenticate using Azure AD. New apps should also support [Azure AD App Provisioning](../app-provisioning/what-is-hr-driven-provisioning.md) and have no dependency on LDAP queries. Exceptions require explicit review and approval.
82+
83+
> [!IMPORTANT]
84+
> Depending on anticipated demand of application that require legacy protocols, when more current alternatives are not feasible you can choose to deploy [Azure AD Domain Services](../../active-directory-domain-services/overview.md).
85+
86+
* Provide a recommendation to create a policy to prioritize use of cloud native alternatives. The policy should limit deployment of new application servers to the domain. Common cloud native scenarios to replace AD joined servers include:
87+
88+
* File servers
89+
90+
* SharePoint / OneDrive - Collaboration support across Microsoft 365 solutions and built-in governance, risk, security, and compliance.
91+
92+
* [Azure Files](../../storage/files/storage-files-introduction.md) offers fully managed file shares in the cloud that are accessible via the industry standard SMB or NFS protocol. Customers can use native [Azure AD authentication to Azure Files](../../virtual-desktop/create-profile-container-azure-ad.md) over the internet without line of sight to a DC.
93+
94+
* Azure AD also works with third party applications in our [Application Gallery](/security/business/identity-access-management/integrated-apps-azure-ad)
95+
96+
* Print Servers
97+
98+
* Mandate to procure [Universal Print](/universal-print/) compatible printers - [Partner Integrations](/universal-print/fundamentals/universal-print-partner-integrations)
99+
100+
* Bridge with [Universal Print connector](/universal-print/fundamentals/universal-print-connector-overview) for non-compatible printers
101+
102+
## Next steps
103+
104+
[Introduction](road-to-the-cloud-introduction.md)
105+
106+
[Cloud transformation posture](road-to-the-cloud-posture.md)
107+
108+
[Establish an Azure AD footprint](road-to-the-cloud-establish.md)
109+
110+
[Transition to the cloud](road-to-the-cloud-migrate.md)
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: Road to the cloud - Introduction to moving identity and access management from AD to Azure AD
3+
description: Introduction to planning your migration if IAM from AD to Azure AD.
4+
documentationCenter: ''
5+
author: janicericketts
6+
manager: martinco
7+
ms.service: active-directory
8+
ms.topic: how-to
9+
ms.subservice: fundamentals
10+
ms.date: 06/03/2022
11+
ms.author: jricketts
12+
ms.custom: references_regions
13+
---
14+
15+
# Introduction
16+
17+
This content provides guidance to move:
18+
19+
* **From** - Active Directory (AD) and other non-cloud based services, either hosted on-premises or Infrastructure-as-a-Service (IaaS), that provide identity management (IDM), identity and access management (IAM) and device management.
20+
21+
* **To** - Azure Active Directory (Azure AD) and other Microsoft cloud native solutions for identity management (IDM), identity and access management (IAM), and device management.
22+
23+
>[!NOTE]
24+
> In this content, when we refer to AD, we are referring to Windows Server Active Directory Domain Services.
25+
26+
Some organizations set goals to remove AD, and their on-premises IT footprint. Others set goals to take advantage of some cloud-based capabilities, but not to completely remove their on-premises or IaaS environments. Transformation must be aligned with and achieve business objectives including increased productivity, reduced costs and complexity, and improved security posture. To better understand the costs vs. value of moving to the cloud, see [Forrester TEI for Microsoft Azure Active Directory](https://www.microsoft.com/security/business/forrester-tei-study) and other TEI reports and [Cloud economics](https://azure.microsoft.com/overview/cloud-economics/).
27+
28+
## Next steps
29+
30+
[Cloud transformation posture](road-to-the-cloud-posture.md)
31+
32+
[Establish an Azure AD footprint](road-to-the-cloud-establish.md)
33+
34+
[Implement a cloud-first approach](road-to-the-cloud-implement.md)
35+
36+
[Transition to the cloud](road-to-the-cloud-migrate.md)

0 commit comments

Comments
 (0)