You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/decision-guides/identity/index.md
+16-16
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ Jump to: [Determine identity integration requirements](#determine-identity-integ
19
19
20
20
Several options are available for managing identity in a cloud environment. These options vary in cost and complexity. A key factor in structuring your cloud-based identity services is the level of integration required with your existing on-premises identity infrastructure.
21
21
22
-
Azure Active Directory (Azure AD) provides a base level of access control and identity management for Azure resources. If your organization's on-premises Active Directory infrastructure has a complex forest structure or customized organizational units (OUs), your cloud-based workloads might require directory synchronization with Azure AD for a consistent set of identities, groups, and roles between your on-premises and cloud environments. Additionally, support for applications that depend on legacy authentication mechanisms might require the deployment of Active Directory Domain Services (AD DS) in the cloud.
22
+
Microsoft Entra ID provides a base level of access control and identity management for Azure resources. If your organization's on-premises Active Directory infrastructure has a complex forest structure or customized organizational units (OUs), your cloud-based workloads might require directory synchronization with Microsoft Entra ID for a consistent set of identities, groups, and roles between your on-premises and cloud environments. Additionally, support for applications that depend on legacy authentication mechanisms might require the deployment of Active Directory Domain Services (AD DS) in the cloud.
23
23
24
24
Cloud-based identity management is an iterative process. You could start with a cloud-native solution with a small set of users and corresponding roles for an initial deployment. As your migration matures, you might need to integrate your identity solution using directory synchronization or add domains services as part of your cloud deployments. Revisit your identity strategy in every iteration of your migration process.
25
25
@@ -36,34 +36,34 @@ As part of planning your migration to Azure, you will need to determine how best
36
36
37
37
### Cloud baseline
38
38
39
-
Azure AD is the native identity and access management (IAM) system for granting users and groups access to management features on the Azure platform. If your organization lacks a significant on-premises identity solution, and you plan to migrate workloads to be compatible with cloud-based authentication mechanisms, you should begin developing your identity infrastructure using Azure AD as a base.
39
+
Microsoft Entra ID is the native identity and access management (IAM) system for granting users and groups access to management features on the Azure platform. If your organization lacks a significant on-premises identity solution, and you plan to migrate workloads to be compatible with cloud-based authentication mechanisms, you should begin developing your identity infrastructure using Microsoft Entra ID as a base.
40
40
41
41
**Cloud baseline assumptions:** Using a purely cloud-native identity infrastructure assumes the following:
42
42
43
43
- Your cloud-based resources will not have dependencies on on-premises directory services or Active Directory servers, or workloads can be modified to remove those dependencies.
44
-
- The application or service workloads being migrated either support authentication mechanisms compatible with Azure AD or can be modified easily to support them. Azure AD relies on internet-ready authentication mechanisms such as SAML, OAuth, and OpenID Connect. Existing workloads that depend on legacy authentication methods using protocols such as Kerberos or NTLM might need to be refactored before migrating to the cloud using the cloud baseline pattern.
44
+
- The application or service workloads being migrated either support authentication mechanisms compatible with Microsoft Entra ID or can be modified easily to support them. Microsoft Entra ID relies on internet-ready authentication mechanisms such as SAML, OAuth, and OpenID Connect. Existing workloads that depend on legacy authentication methods using protocols such as Kerberos or NTLM might need to be refactored before migrating to the cloud using the cloud baseline pattern.
45
45
46
46
> [!TIP]
47
-
> Completely migrating your identity services to Azure AD eliminates the need to maintain your own identity infrastructure, significantly simplifying your IT management.
47
+
> Completely migrating your identity services to Microsoft Entra ID eliminates the need to maintain your own identity infrastructure, significantly simplifying your IT management.
48
48
>
49
-
> But Azure AD is not a full replacement for a traditional on-premises Active Directory infrastructure. Directory features such as legacy authentication methods, computer management, or group policy might not be available without deploying additional tools or services to the cloud.
49
+
> But Microsoft Entra ID is not a full replacement for a traditional on-premises Active Directory infrastructure. Directory features such as legacy authentication methods, computer management, or group policy might not be available without deploying additional tools or services to the cloud.
50
50
>
51
51
> For scenarios where you need to integrate your on-premises identities or domain services with your cloud deployments, see the directory synchronization and cloud-hosted domain services patterns discussed below.
52
52
53
53
### Directory synchronization
54
54
55
-
For organizations with existing on-premises Active Directory infrastructure, directory synchronization is often the best solution for preserving existing user and access management while providing the required IAM capabilities for managing cloud resources. This process continuously replicates directory information between Azure AD and on-premises directory services, allowing common credentials for users and a consistent identity, role, and permission system across your entire organization.
55
+
For organizations with existing on-premises Active Directory infrastructure, directory synchronization is often the best solution for preserving existing user and access management while providing the required IAM capabilities for managing cloud resources. This process continuously replicates directory information between Microsoft Entra ID and on-premises directory services, allowing common credentials for users and a consistent identity, role, and permission system across your entire organization.
56
56
57
57
> [!NOTE]
58
-
> Organizations that have adopted Microsoft 365 might have already implemented [directory synchronization](/microsoft-365/enterprise/set-up-directory-synchronization) between their on-premises Active Directory infrastructure and Azure Active Directory.
58
+
> Organizations that have adopted Microsoft 365 might have already implemented [directory synchronization](/microsoft-365/enterprise/set-up-directory-synchronization) between their on-premises Active Directory infrastructure and Microsoft Entra ID.
59
59
60
60
**Directory synchronization assumptions:** Using a synchronized identity solution assumes the following:
61
61
62
62
- You need to maintain a common set of user accounts and groups across your cloud and on-premises IT infrastructure.
63
-
- Your on-premises identity services support replication with Azure AD.
63
+
- Your on-premises identity services support replication with Microsoft Entra ID.
64
64
65
65
> [!TIP]
66
-
> Any cloud-based workloads that depend on legacy authentication mechanisms provided by on-premises Active Directory servers and that are not supported by Azure AD will still require either connectivity to on-premises domain services or virtual servers in the cloud environment providing these services. Using on-premises identity services also introduces dependencies on connectivity between the cloud and on-premises networks.
66
+
> Any cloud-based workloads that depend on legacy authentication mechanisms provided by on-premises Active Directory servers and that are not supported by Microsoft Entra ID will still require either connectivity to on-premises domain services or virtual servers in the cloud environment providing these services. Using on-premises identity services also introduces dependencies on connectivity between the cloud and on-premises networks.
67
67
68
68
### Cloud-hosted domain services
69
69
@@ -79,25 +79,25 @@ It's likely that your existing directories and domain services will continue to
79
79
- Your workload virtual machines need to be domain-joined for management or application of Active Directory group policy purposes.
80
80
81
81
> [!TIP]
82
-
> While a directory migration coupled with cloud-hosted domain services provides great flexibility when migrating existing workloads, hosting virtual machines within your cloud virtual network to provide these services does increase the complexity of your IT management tasks. As your cloud migration experience matures, examine the long-term maintenance requirements of hosting these servers. Consider whether refactoring existing workloads for compatibility with cloud identity providers such as Azure Active Directory can reduce the need for these cloud-hosted servers.
82
+
> While a directory migration coupled with cloud-hosted domain services provides great flexibility when migrating existing workloads, hosting virtual machines within your cloud virtual network to provide these services does increase the complexity of your IT management tasks. As your cloud migration experience matures, examine the long-term maintenance requirements of hosting these servers. Consider whether refactoring existing workloads for compatibility with cloud identity providers such as Microsoft Entra ID can reduce the need for these cloud-hosted servers.
83
83
84
84
### Active Directory Federation Services
85
85
86
86
Identity federation establishes trust relationships across multiple identity management systems to allow common authentication and authorization capabilities. You can then support single sign-on capabilities across multiple domains within your organization or identity systems managed by your customers or business partners.
87
87
88
-
Azure AD supports federation of on-premises Active Directory domains using [Active Directory Federation Services (AD FS)](/azure/active-directory/hybrid/how-to-connect-fed-whatis). For more information about how this can be implemented in Azure, see [Extend AD FS to Azure](/azure/architecture/reference-architectures/identity/adfs).
88
+
Microsoft Entra ID supports federation of on-premises Active Directory domains using [Active Directory Federation Services (AD FS)](/azure/active-directory/hybrid/how-to-connect-fed-whatis). For more information about how this can be implemented in Azure, see [Extend AD FS to Azure](/azure/architecture/reference-architectures/identity/adfs).
89
89
90
90
## Learn more
91
91
92
92
For more information about identity services in Azure, see:
93
93
94
-
-[Azure AD](/azure/active-directory/fundamentals/active-directory-whatis). Azure AD provides cloud-based identity services. It allows you to manage access to your Azure resources and control identity management, device registration, user provisioning, application access control, and data protection.
95
-
-[Azure AD Connect](/azure/active-directory/hybrid/whatis-hybrid-identity). The Azure AD Connect tool allows you to connect Azure AD instances with your existing identity management solutions, allowing synchronization of your existing directory in the cloud.
94
+
-[Microsoft Entra ID](/azure/active-directory/fundamentals/active-directory-whatis). Microsoft Entra ID provides cloud-based identity services. It allows you to manage access to your Azure resources and control identity management, device registration, user provisioning, application access control, and data protection.
95
+
-[Microsoft Entra Connect](/azure/active-directory/hybrid/whatis-hybrid-identity). The Microsoft Entra Connect tool allows you to connect Microsoft Entra instances with your existing identity management solutions, allowing synchronization of your existing directory in the cloud.
96
96
-[Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview). Azure RBAC efficiently and securely manages access to resources in the management plane. Jobs and responsibilities are organized into roles, and users are assigned to these roles. Azure RBAC allows you to control who has access to a resource along with which actions a user can perform on that resource.
97
-
-[Azure AD Privileged Identity Management (PIM)](/azure/active-directory/privileged-identity-management/pim-configure). PIM lowers the exposure time of resource access privileges and increases your visibility into their use through reports and alerts. It limits users to just-in-time privileges, assigning their privileges for a limited duration then revoked those privileges automatically.
98
-
-[Integrate on-premises Active Directory domains with Azure Active Directory](/azure/architecture/reference-architectures/identity/azure-ad). This reference architecture provides an example of directory synchronization between on-premises Active Directory domains and Azure AD.
97
+
-[Microsoft Entra Privileged Identity Management (PIM)](/azure/active-directory/privileged-identity-management/pim-configure). PIM lowers the exposure time of resource access privileges and increases your visibility into their use through reports and alerts. It limits users to just-in-time privileges, assigning their privileges for a limited duration then revoked those privileges automatically.
98
+
-[Integrate on-premises Active Directory domains with Microsoft Entra ID](/azure/architecture/reference-architectures/identity/azure-ad). This reference architecture provides an example of directory synchronization between on-premises Active Directory domains and Microsoft Entra ID.
99
99
-[Extend Active Directory Domain Services (AD DS) to Azure](/azure/architecture/reference-architectures/identity/adds-extend-domain). This reference architecture provides an example of deploying AD DS servers to extend domain services to cloud-based resources.
100
-
-[Extend Active Directory Federation Services (AD FS) to Azure](/azure/architecture/reference-architectures/identity/adfs). This reference architecture configures Active Directory Federation Services (AD FS) to perform federated authentication and authorization with your Azure AD directory.
100
+
-[Extend Active Directory Federation Services (AD FS) to Azure](/azure/architecture/reference-architectures/identity/adfs). This reference architecture configures Active Directory Federation Services (AD FS) to perform federated authentication and authorization with your Microsoft Entra directory.
Copy file name to clipboardExpand all lines: docs/get-started/how-azure-resource-manager-works.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -54,15 +54,15 @@ Azure Resource Manager requires the client to specify an identifier for both the
54
54
55
55
Once you understand how Azure Resource Manager works, you can learn how to associate an Azure subscription with the Azure Resource Manager controls. Before Azure Resource Manager can execute any resource management request, review the following a set of controls.
56
56
57
-
The first control is that a validated user must make a request. Also, Azure Resource Manager must have a trusted relationship with [Azure Active Directory (Azure AD)](/azure/active-directory/) to provide user identity functionality.
57
+
The first control is that a validated user must make a request. Also, Azure Resource Manager must have a trusted relationship with [Microsoft Entra ID](/azure/active-directory/) to provide user identity functionality.
58
58
59
-

59
+

60
60
61
-
In Azure AD, you can segment users into tenants. A *tenant* is a logical construct that represents a secure, dedicated instance of Azure AD that someone typically associates with an organization. You can also associate each subscription with an Azure AD tenant.
61
+
In Microsoft Entra ID, you can segment users into tenants. A *tenant* is a logical construct that represents a secure, dedicated instance of Microsoft Entra ID that someone typically associates with an organization. You can also associate each subscription with a Microsoft Entra tenant.
62
62
63
-

63
+

64
64
65
-
Each client request to manage a resource in a particular subscription requires that the user has an account in the associated Azure AD tenant.
65
+
Each client request to manage a resource in a particular subscription requires that the user has an account in the associated Microsoft Entra tenant.
66
66
67
67
The next control is a check that the user has sufficient permission to make the request. Permissions are assigned to users using [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/).
Copy file name to clipboardExpand all lines: docs/get-started/whats-new.md
+20-4
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
2
title: What's new in the Microsoft Cloud Adoption Framework
3
3
description: Learn about recent updates to the Microsoft Cloud Adoption Framework for Azure.
4
-
author: martinekuan
5
-
ms.author: martinek
6
-
ms.date: 10/04/2023
4
+
author: Zimmergren
5
+
ms.author: tozimmergren
6
+
ms.date: 10/06/2023
7
7
ms.topic: conceptual
8
-
ms.custom: internal, UpdateFrequency.5
8
+
ms.custom: UpdateFrequency.5
9
9
---
10
10
11
11
# What's new in the Microsoft Cloud Adoption Framework for Azure
@@ -16,6 +16,12 @@ Partner with us in our ongoing effort to develop the Cloud Adoption Framework.
16
16
17
17
## September 2023
18
18
19
+
### Plan for IP addressing
20
+
21
+
Article updated with relevant information about IPv4 exhaustion, and IPAM (IP Address Management) tools.
22
+
23
+
-[Plan for IP addressing](/azure/cloud-adoption-framework/ready/azure-best-practices/plan-for-ip-addressing).
24
+
19
25
### Guidance for documenting and deploying alerts
20
26
21
27
To support the imminent general availability of Azure Monitor baseline alerts for the Azure landing zone, we have created some Cloud Architecture Framework documentation about baseline alerts. Find out what baseline alerts are and where to go for more information about how to enhance your Azure platform by using Azure Monitor alerts.
@@ -40,6 +46,16 @@ To support the imminent general availability of Azure Monitor baseline alerts fo
40
46
41
47
## July 2023
42
48
49
+
### Landing zone regions
50
+
51
+
This article explains how landing zones use Azure regions. It also explains how to add a region to an existing landing zone, and some considerations when you migrate your Azure estate to a different region.
52
+
53
+
-[Landing zone regions](/azure/cloud-adoption-framework/ready/considerations/regions)
54
+
55
+
### Enhanced migration guidance
56
+
57
+
-[Readying your landing zone for migration](/azure/cloud-adoption-framework/migrate/azure-migration-guide/ready-alz)
58
+
43
59
### New best practices for SAP LZA security on Azure
44
60
45
61
-[SAP data integration example architecture](/azure/cloud-adoption-framework/scenarios/sap/sap-lza-data-example-architecture)
Copy file name to clipboardExpand all lines: docs/govern/deployment-acceleration/deployment-consistency-repeatability.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -39,9 +39,9 @@ Implement zero-trust access control at the control plane level. Limit the abilit
39
39
40
40
- Read and understand the design considerations and consider the design recommendations in [Azure identity and access for landing zones](../../ready/landing-zone/design-area/identity-access-landing-zones.md)
41
41
- If the Azure built-in roles don't meet your needs, consider the [suggested role definitions](../../ready/landing-zone/design-area/identity-access-landing-zones.md#rbac-recommendations) listed in Azure identity and access for landing zones.
42
-
- Use Azure AD managed identities for Azure resources to avoid credential-based authentication. When secrets, keys or certificates are required, store them in Azure Key Vault.
42
+
- Use Microsoft Entra managed identities for Azure resources to avoid credential-based authentication. When secrets, keys or certificates are required, store them in Azure Key Vault.
43
43
- Apply fully automated key-rotation processes that run periodically within each required solution.
44
-
- Use Azure AD Privileged Identity Management (PIM) to establish zero-trust and least privilege access.
44
+
- Use Microsoft Entra Privileged Identity Management (PIM) to establish zero-trust and least privilege access.
0 commit comments