{"id":6137,"date":"2023-03-27T09:57:35","date_gmt":"2023-03-27T13:57:35","guid":{"rendered":"https:\/\/www.jumpcloud.com\/blog\/?p=6137"},"modified":"2024-11-14T17:53:21","modified_gmt":"2024-11-14T22:53:21","slug":"on-prem-domain-controller-to-the-cloud","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/on-prem-domain-controller-to-the-cloud","title":{"rendered":"Is There a Cloud Domain Controller Alternative to AD?"},"content":{"rendered":"\n
Domain controllers (DC) have been the workhorse of Microsoft-centric networks for over 20 years, but the IT landscape has shifted as technologies and how we work have evolved. Cloud-based alternatives to domain controllers<\/a> and Active Directory\u00ae<\/sup> became available to solve modern IT challenges by positioning devices, not the network, as the gateway to resources. Microsoft offers a virtual infrastructure of services through its Azure platform<\/a>, but still has dependencies on Windows Server roles to provide authentication and authorization into every IT resource. Azure also introduced a complicated licensing scheme that cordons off key features.<\/p>\n\n\n\n 黑料海角91入口 is another option that takes a different approach via its open directory platform that eliminates the need for many on-prem systems. Its open directory consumes external identities and has workflow-based pricing. This article overviews how each of these cloud platforms makes it possible to reduce or eliminate dependence on DCs for a domainless enterprise<\/a>.<\/p>\n\n\n\n Domain controllers were predicated on the concept of a network serving as the perimeter. Microsoft\u2019s approach was to create a \u201cdomain\u201d where all of an organization\u2019s IT assets would live. These would all be Microsoft assets<\/a>, and would all be located on-prem as well.<\/p>\n\n\n\n This enclosed area or \u201cdomain\u201d was thought to be more secure than the more open network alternative. Plus, once a user was within the domain, a directory service such as Active Directory\u00ae<\/sup><\/a> could control what a user had access to. This approach made it simple to appoint one central identity management platform<\/a> as the control point for user access.<\/p>\n\n\n\n The IT landscape has changed with the inclusion of non-Windows resources and remote work. The original concept of the domain no longer satisfies requirements for many small and medium-sized enterprises (SMEs). Microsoft originally provided add-ons for DCs, such as AD FS<\/a>, to include single-sign on (SSO) for web applications. It\u2019s since embraced the new normal that Android, Apple, Linux, and Windows devices are all being used to perform work beyond traditional network boundaries. Organizations that use DCs require an assortment of AD add-on solutions such as identity bridges, web app SSO platforms, multi-factor authentication (MFA) solutions, and more. All of this increases IT management overhead and network expenses.<\/p>\n\n\n\n However, it\u2019s now possible to utilize a combination of Azure Active Directory (AAD), Entra, and Intune<\/a> to manage identities and devices that aren\u2019t part of the Microsoft stack. Let\u2019s explore those options in more detail, because usage is dependent upon a gated licensing model.<\/p>\n\n\n\n Azure Active Directory Domain Services, coupled with Intune for device management and Entra to manage external identities, is the Microsoft-centric answer to cloud domain controllers. Azure was built with the enterprise in mind with complex<\/a>, but extensive, deployment options. It spawned an ecosystem of consultants and add-on services for compliance, security, and more. It continues to build out its cloud offerings. For instance: Microsoft has shipped Azure AD certificate-based authentication (CBA), which eliminates the need to run AD FS for CBA. However, many of the services that a DC once provided for free are now being monetized.<\/p>\n\n\n\n AAD is a cloud-based identity and access management service that was originally created to ferry users into Office 365. Its capabilities are heavily dependent upon which licensing tier you\u2019re paying for. Microsoft gates off features into three tiers: free, Premium 1, and Premium 2. The tier that\u2019s available to you is dependent upon which Microsoft 365 package you\u2019ve purchased, but it\u2019s also possible to add Premium tiers to your Office 365 services at an additional cost per head. Every AAD tier obligates paying more to govern and authenticate external identities with Entra. In addition, only AAD licensing that\u2019s Premium 1 and above will permit you to work with it.<\/p>\n\n\n\nDomain Controllers at Large<\/h2>\n\n\n\n
Microsoft\u2019s Cloud Domain Solutions<\/h2>\n\n\n\n
Azure AD\u2019s Role<\/h3>\n\n\n\n