Extend Azure® AD Identities To GCP

By George Lattimore Posted May 17, 2019

Bridge signifying extension of Azure AD to Google Cloud Platform

IT admins and managed service providers (MSPs) are asking, “Is it possible to extend Azure® AD identities to Google® Cloud Platform (GCP)?” In other words, can Microsoft® and Google actually work together in the identity management space? Well, the short answer is no, not really, but there’s another way.

Unless you leverage a cloud directory service to mediate between Microsoft and Google, they’re going to be at odds with each other and will need to be operated separately. Thankfully however, using a cloud directory connected with Office 365™, you can now extend Azure AD identities to GCP (Google Cloud Platform).

You Don’t Have to Choose Sides

Make no mistake about it—both Microsoft and Google are competing to own your identity and your business. Unsurprisingly, each wants you to leverage their solutions (exclusively, if possible). For those IT organizations that use solutions from both sides, however, getting caught in this tug-of-war can tangle up the decision-making process. Should Microsoft be authoritative over Google, or the other way around? What’s the best approach for your organization? What are the pros and cons?

Before you go down that rabbit hole and start building out flow charts, take a step back and look at the bigger picture. Are you considering all the options? There’s a Directory-as-a-Service® solution from JumpCloud that can extend Azure AD identities to GCP and much more:

  • Mac®, Linux®, and Windows® systems
  • Servers either on-prem or in the cloud (including AWS®)
  • Applications via SAML 2.0 and LDAP
  • WiFi and VPN networks through RADIUS

In reality, implementing Directory-as-a-Service can simplify your IT management process while expanding your capabilities.

More Options + More Control

In a sense, IT organizations can enable their users to leverage their O365 credentials elsewhere, such as on their Macs or with their GCP cloud servers and more. This approach also gives IT admins and DevOps engineers more control over the IT resources they want to leverage and secure without being tied to Azure or GCP.

Okay, but how does this look once it takes flight? The process works by tightly integrating JumpCloud’s cloud directory service with Azure Active Directory. IT admins can then quickly and easily import all of their users into JumpCloud’s directory and then extend those identities to the IT resources those end users need. Once the dots are connected, this process works virtually, regardless of protocol, platform, provider, and location.

Ready to Try a Cloud Directory Service?

If you’d like to understand more regarding how you can extend Azure AD identities to GCP and beyond, send us a note. If you’d rather try out the platform for yourself and see how the integration would play out, go right ahead and dig in with a free account. The first 10 users are completely free of charge so you can try out all the features and functionality.

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and an MS in Public Communications and Technology, George enjoys writing about how the IT landscape is adapting to a diversified field of technology.

Recent Posts