Identity Services (part 1)

 



Active Directory Domain Services (AD DS)

AD DS is widely known for providing a variety of business-related and technological benefits by serving as an identity as well as access management solution for on-premises, independently managed isolated environments and the most of its characteristics reflects this underlying premise. There are three main scenarios that involves AD DS and Azure VMs:
  • AD DS deployed to Azure VMs without cross-premises connectivity- This deployment results in the creation of a new forest, with all domain controllers residing in Azure. You can use this approach if you plan implement the Azure-resident workloads hosted on Azure VMs that rely on Kerberos authentication or GROUP Policy but have no on-premises dependencies.

  • Existing on-premises AD DS deployment with cross-premises connectivity to an Azure virtual network where the Azure VMs reside- This scenario uses an existing on-premises AD environment to provide authentication for Azure VM-resident workloads. When considering this design, you should also the latency associated with cross-premises network traffic.

  • Existing on-premises AD DS deployment with cross-premises connectivity to an Azure virtual network hosting additional domain controller on Azure VMs- The main objective of this scenario is to optimize the workload performance by localizing authentication traffic. 

If you are planning to deploy AD DS domain controllers to Azure VMs, you should also consider the following points: 

  • Cross-premises connectivity- If you intend to extend your existing AD DS environment to Azure, then the key design element will be cross-premises connectivity between your on-premises environment and the Azure virtual network. You can set up either the site-to-site Virtual Private Network (VPN) Microsoft Azure ExpressRoute. 

  • Active Directory Topology- In cross-premises scenarios, you should also configure AD DS sites to reflect your cross-premises network infrastructure which readily allows you to localize the authentication traffic and controls the replication traffic between on-premises as well as Azure VM-based domain controllers. Besides, a proper site design also ensures that the domain controllers on the given site handle authentication requests originating from that site.

  • Read-Only Domain Controllers (RODCs)- Some of the customers worry about deploying the writeable domain controllers to Azure VMs due to the security concerns which can be easily mitigated by deploying RODCs instead. RODCs and the writeable domain controllers offers similar user experiences. Although, RODCs lowers the volume of egress traffic and the corresponding charges, but, it is a good option an Azure resident workload does not require frequent write access to AD DS. 

  • Global Catalog Placement- Regardless of your domain topology, you should configure all your Azure VM-based controllers as global catalog servers preventing global catalog lookups from traversing the cross-premises network links, which would negatively affect performance. 

Integrating Linux with AD DS 

There are several ways to integrate Linux VMs with Active Directory and the following three options are based on built-in or freely available components:
  • LDAP Authentication / Authorization- It leverages the compliance of AD with LDAP standards. LDAP Authentication does not allow the users to change their passwords from the Linux client. So, to overcome this short coming, you can initiate a password change process that confirms to your password expiration policy either by providing users an alternative method to change their password or by having an automated password refresh mechanism in place. 

  • Kerberos 5 Authentication / LDAP Authorization- In Kerberos Authentication, NSS (Name Service Switch) still uses LDAP, an dworks the same as with LDAP  Authentication, but PAM (Plugable Authentication Module) makes use of the pam_krb5 module to authenticate against the Kerberos Key Distribution Center (KDC) implemented in AD. This is a popular configuration, because it works with out-of-the box components in a secure way while providing password changing capabilities. 

  • Windbind Authentication / Authorization- It is a more complex solution, requiring a Windbind deamon to run on the Linux systems while providing more advanced technical capabilities, such as support for RPC and NTLM, and does not require any specific components to be installed aon authenticating AD DS domain controllers. Windbind is a part of Samba interoperability suite, which also offers file sharing capabilities using the SMB protocol. If you plan to use SMB, Windbind is a logical choice. 






Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Project Resourcing (Part 2)