Azure Active Directory Domain Services (AD DS) is managed domain service suite that offers full compatibility with Windows Server Active Directory and supports Kerberos/NTLM, domain join, group policy, and LDAP authentication. You can use an AD domain service without manually deploying, managing, or patching domain controllers.
You can integrate Azure AD DS with your existing Azure AD tenant. This integration allows users to log in to services and applications connected to the managed domain using their existing credentials. You can also leverage existing group and user accounts to restrict access and protect your resources. These features enable seamless promotion and transfer of on-premise resources to Azure.
When you create an Azure AD DS–managed domain, you must define your own namespace. This namespace is your company’s domain name. Then, you deploy two Windows Server domain controllers (DCs) in the Azure region of your choice. This deployment is called a replica set.
There is no need to configure, manage, or update the DCs. The Azure platform treats DCs as part of a managed domain, which automatically performs backups and encrypts data via Azure Disk Encryption.
Managed domains can perform one-way synchronization in Azure AD to grant access to a set of credentials, users, and groups. You can create a resource directly in a managed domain, but it will not be synchronized with Azure AD. Azure applications, services, and virtual machines that connect to a managed domain can use AD DS features like domain join, Kerberos/NTLM, group policy, and LDAP authentication.
In hybrid environments with on-prem AD DS, you can use Azure AD Connect to synchronize identity information with your cloud-based Azure AD environments. In turn, Azure AD synchronizes the identity information with the managed domain.
Azure AD DS replicates the identity information from Azure AD, so it works with a cloud-only Azure AD tenant or an Azure AD tenant that’s synchronized with your on-premises AD DS environment. Both environments have the same Azure AD DS feature set:
You can extend the managed domain to have multiple replica sets for each Azure AD tenant. You can add replica sets to peer-to-peer virtual networks in any Azure region that supports Azure AD DS. Adding a replica set to another Azure region can provide geo-disaster recovery for legacy applications when an Azure region goes offline.
There are five main options for managing domain services:
AD DS has four main benefits compared to other options:
There are three popular ways to use Azure AD-based services to provide access to the central identity of an application, service, or device. This choice of identity solution gives you the flexibility to use a directory that best fits your organization’s needs.
For example, building and running your AD DS identity solution may be unnecessary if you primarily manage cloud-only users on mobile devices. Alternatively, you can use Azure AD.
Although these three identity solutions share the same basic Active Directory concepts and technology, each offers different services to meet diverse customer needs. Each identity solution has distinct features:
Pathlock is the leader in Access Governance for business-critical applications. Staying compliant with Sarbanes-Oxley is a critical business requirement, and Pathlock Control helps to automate the compliance process. As a MISA member, Pathlock can bring these capabilities to users of Azure Active Directory, with tight integration between the solutions.
Customers rely on Pathlock to streamline critical processes like fine-grained provisioning, separation of duties, and detailed user access reviews. Pathlock can connect to a wealth of applications hosted both on-premise and in the cloud.
With Pathlock’s out-of-the-box integration to Azure Active Directory, customers can enjoy the great features they are used to with deeper control over their enterprise applications, including:
Interested to learn more about the winning combination of Pathlock and Azure Active Directory? Request a demo today to see the solution in action!
Share