{"id":29828,"date":"2023-06-20T10:00:29","date_gmt":"2023-06-20T14:00:29","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=29828"},"modified":"2024-11-08T16:07:30","modified_gmt":"2024-11-08T21:07:30","slug":"active-directory-faq","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/active-directory-faq","title":{"rendered":"Microsoft Active Directory: The Ultimate AD FAQ"},"content":{"rendered":"\n

This is the ultimate FAQ for Microsoft Active Directory \u2014 built to answer all of the most frequently asked questions about the legacy, on-prem directory service. We\u2019ll get into the what, when, why, who, and how of Microsoft Active Directory \u2014 otherwise known as AD. <\/p>\n\n\n\n

AD is both widely used and widely misunderstood. Developed by Microsoft in the late 1990s, AD is the world\u2019s most well-known on-prem directory service and is often referred to as an identity provider (IdP). AD ushered in the era of modern identity management in the early 2000s, but with today\u2019s shifting IT landscape there are a number of questions that IT admins and organizations have about what AD is, how it works, and why it matters. <\/p>\n\n\n\n

Microsoft has extended AD, which it now considers to be a legacy product, from the LAN to the web with an assortment of services for user, device management, and security. This hybrid cloud paradigm expands its ecosystem with an emphasis on directing users to even more Microsoft\u2019s technologies while retrofitting its local LAN solution for the WAN.<\/p>\n\n\n\n

We\u2019ve identified some of the most common questions about Microsoft\u2019s approach to Active Directory device management<\/a> identity management and answer them below. It includes guidance on how to modernize AD to meet new requirements.<\/p>\n\n\n\n

\"graphic<\/figure>\n\n\n\n

Modernize Your Infrastructure<\/p>\n\n\n\n

See why an open directory platform can help you to unify your environment<\/a>.<\/p>\n\n\n\n

Read More<\/a><\/p>\n\n\n\n

Active Directory Basics<\/h2>\n\n\n\n
What Is Active Directory?<\/a>
\n

Active Directory is a directory service\/identity provider that enables administrators to connect users to Windows-based IT resources. Further, with AD, IT can manage and secure their Windows-based systems and applications. AD stores information about network objects (e.g., users, groups, systems, networks, applications, digital assets, and many other items) and their relationship to one another.<\/p>\n\n\n\n

Admins can use AD to create users and grant them access to Windows laptops, servers, and applications. They can also use AD to control groups of systems simultaneously, enforcing security settings and software updates.<\/p>\n\n\n\n

Access and controls are enabled using the concept of a domain. The domain concept is essentially a concept of inclusion and exclusion. Traditionally, this approach was leveraged for physical locations. Historically, many IT resources were hosted on-prem and were a part of the domain \u2014 i.e., internal network \u2014 and when a user was in the physical location they would have access to all of their requisite resources on-prem. If a user was off-prem, they would need a VPN to make it appear that they were on-prem. This approach worked well when IT resources and people were in the same physical proximity.<\/p>\n\n\n\n

AD is part of the wider identity and access management (IAM) space and is often supplemented with single sign-on (SSO) or mobile device management (MDM) solutions among many others. JumpCloud Directory Platform is a cloud-based alternative<\/a> to Active Directory.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

How Does AD Terminology Translate to the Cloud?<\/a>
\n

Check out our AD to Cloud “translation” guide<\/a>. The guide is a Rosetta stone to help you understand the concepts and terms that are specific to AD and the cloud.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

When Was Active Directory Released?<\/a>
\n

Microsoft first introduced the world to Active Directory in 1999 and released it alongside Windows\u00ae<\/sup> 2000 Server edition. <\/p>\n<\/div><\/div><\/div>\n\n\n\n

What Protocols Does AD Use?<\/a>
\n

Active Directory takes advantage of the networking protocols for DNS\/DHCP and the Lightweight Directory Access Protocol (LDAP), alongside Microsoft\u2019s proprietary version of Kerberos<\/a> for authentication within internal networks (LANs). Kerberos was considered secure when it was introduced during the late 1990s, but it\u2019s now vulnerable to attack methods involving Kerberoasting<\/a>, forged tickets, and stolen tickets. That means spending a lot of time and resources for mitigations and security controls to improve security. Failure to do so may place valid account credentials at risk.<\/p>\n\n\n\n

Many people ask why AD doesn\u2019t natively support more modern protocols, such as SAML, OIDC, and RADIUS. We won\u2019t speculate on their reasoning, but we do believe that a multi-protocol approach is the future of cloud IAM architecture<\/a>. Support for protocols such as SAML, OIDC, and RADIUS can be accomplished through Microsoft add-on solutions as well as third-party solutions.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Why Is Active Directory Called Active?<\/a>
\n

Our best guess is that AD is called \u201cActive\u201d Directory because it actively updates information stored in the directory. For example, when an administrator adds or subtracts a user from the organization, Active Directory automatically replicates the change to all of the directory servers. This happens at a regular interval so that the information always remains up to date and synchronized.<\/p>\n\n\n\n

Today, this \u201cactive\u201d type of behavior is expected in IT systems. But, before the era of computerized directory services, the concept of a directory that kept itself up to date was pretty innovative. Keep in mind that when the Active Directory moniker was coined, physical encyclopedias were still commonly used and the \u201cactive\u201d Wikipedia hadn\u2019t yet launched.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Who Uses Active Directory?<\/a>
\n

Generally speaking, when an organization leverages Active Directory, every single employee uses Active Directory every day without even knowing it. People use Active Directory when they log in to their work machines and when they access apps, printers, and file shares.<\/p>\n\n\n\n

But the primary users of Active Directory are the admins who operate, manage, and configure AD. AD admins likely include all of the IT team and may also include members of the organization\u2019s security, DevOps, or engineering teams.<\/p>\n\n\n\n

Virtually all organizations around the world use a solution such as Active Directory or other identity provider. Enabling and controlling access to IT resources is one of the most important aspects of operating and securing an organization. Solutions such as directory services enable organizations to be productive.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Why Does Active Directory Matter?<\/a>
\n

Whether people realize it or not, Active Directory has been making the business world go \u2018round since the turn of the century. AD is in place at almost every large organization and many small ones. It\u2019s a legacy foundational tool that hums away quietly in the background, so many people who use AD every day don\u2019t even realize what it is \u2014 the secure access key to their laptops, applications, network, and files. In short, a directory service is what connects users to their IT resources, and AD has done that for users to their Windows resources for almost two decades.<\/p>\n\n\n\n

Looking for a more in-depth answer? We have a blog that covers the purpose of Active Directory<\/a>. <\/p>\n<\/div><\/div><\/div>\n\n\n\n

Active Directory Definitions<\/h2>\n\n\n\n
What Are Active Directory Objects?<\/a>
\n

An object is the generic term for any unit of information stored within Active Directory\u2019s database. Objects can include users, laptops, servers, and even groups of other objects (explained below). <\/p>\n<\/div><\/div><\/div>\n\n\n\n

What Are Active Directory Groups?<\/a>
\n

AD enables admins to manage sets of multiple objects known as groups. Using GPOs (group policy objects)<\/a>, an admin can make a change to one group and have that change apply to all objects within that group. They\u2019re often used to segment users or systems by department or clearance.<\/p>\n\n\n\n

That convenience comes at the cost of IT security. Nested groups can be very useful if they\u2019re used wisely. However, they can also be the source of over-provisioned users, putting at risk data confidentiality, integrity, and insurance. AD\u2019s group management is manually driven, which offers the least mature level of entitlements management. Controls and measures are manual and ad hoc, entitlements are identified but need regular oversight, least privilege is policy driven, and remediation is manual.<\/p>\n\n\n\n

The bottom line is that group-based management makes IT administration more efficient, but efficiency comes at the cost of security if admins don\u2019t carefully manage identities and entitlements. Active Directory, developed nearly two decades ago, wasn\u2019t designed with Zero Trust concepts as a guiding principle or for the web.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

What Are Forests, Trees, and Domains in Active Directory?<\/a>
\n

A forest is at the top of Active Directory\u2019s logical structure, which also includes objects, trees, domains, and organizational units (OU). A forest describes a collection of trees, which denote a collection of domains. So, what are trees and domains? <\/p>\n\n\n\n

Well, a domain is a collection of users, computers, and devices that are part of the same Active Directory database. If an organization has multiple locations, they may have a separate domain for each one. For example, an international organization could have a domain for their London office, another one for their New York office, and a third one for their Tokyo office. IT admins also sometimes isolate their user accounts into a separate forest to maximize security. These configurations aren\u2019t rudimentary and oftentimes require hiring external resources to set up.<\/p>\n\n\n\n

A tree could be used to group all three of those domains as branches belonging to the same tree, so to speak. An organization that has multiple trees could then group them into a forest.<\/p>\n\n\n\n

This is a core concept of Active Directory and it can be complicated. If you have questions, drop us a note<\/a> and we\u2019d be happy to help you work through what type of AD structure makes the best sense for your organization. Meanwhile, check out the Active Directory to cloud translation guide<\/a> for additional context and definitions.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

What Is a Domain Controller?<\/a>
\n

A domain controller<\/a> (DC) is any server that is running Active Directory Domain Services (AD DS). At least one domain controller is necessary to use Active Directory, though most organizations have at least two per location. Large, multinational organizations may require dozens of domain controllers across each of their physical locations in order to ensure high availability for their AD instance. <\/p>\n\n\n\n

Generally, DCs are thought of as being tied to a physical office, which in the current remote work environment can be challenging. IT teams that are AD centric must connect remote users to their LANs through VPNs or alternatives including a software-defined WAN (SD-WAN) and secure access service edge (SASE). Otherwise, purpose-driven cloud services can more easily manage remote endpoints and identities with less infrastructure and overhead. <\/p>\n\n\n\n

Individual users and their systems are connected to the domain controller through the internal network. When users request access to objects within the Active Directory database, AD processes that request and either authorizes or prevents access to the object. <\/p>\n\n\n\n

Once within the domain, a user doesn\u2019t need to input another username and password to gain access to the domain-bound resources that they have rights to. The authentication and access occurs seamlessly. That\u2019s the beauty of the domain. But this concept begins to fall apart as non-Windows resources are introduced. It also struggles if users are remote and not physically attached to the domain \u2014 in this case, the end user will need a VPN to the network and be authenticated by the DC in order to gain access to their on-prem, Windows-based resources.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Entra ID \/ Azure AD (AAD) \u2014 An Active Directory Alternative?<\/a>
\n

Note that Microsoft has also extended the concept of a domain to Azure. Organizations can create a separate domain at Azure through Active Directory Domain Services (AD DS). This domain is separate and distinct from the on-prem domains, although the two can be bridged through a variety of connective technology including Azure AD Connect and Azure AD. AAD is, however, a separate directory service from the legacy on-premises directory. It\u2019s not possible to access Microsoft services such as Microsoft 365\u2122 (M365) without AAD if your existing directory resides in AD. <\/p>\n\n\n\n

Microsoft has also branched into mobile device management (MDM) and premium identity management services through its SKUs. Likewise, those are dependent upon AAD.<\/p>\n\n\n\n

Gated Licensing Structure<\/strong><\/p>\n\n\n\n

Microsoft has implemented a gated licensing scheme for AAD services. For instance, there are two distinct subscription levels for AAD Premium; and other services for MDM, advanced identity management, and Zero Trust security policies are either included or available as separate subscriptions.<\/p>\n\n\n\n

IT organizations often work with partners to navigate this web. We should also note that there is a new concept called the Domainless Enterprise<\/a>, which takes the approach of eliminating the domain concept, but still retains the idea of securely and frictionlessly accessing IT resources wherever they may be through an open directory platform. This concept is especially helpful for organizations that leverage web applications, cloud infrastructure, and non-Windows platforms (e.g., macOS, Linux).<\/p>\n<\/div><\/div><\/div>\n\n\n\n

What Is Active Directory Domain Services (AD DS)?<\/a>
\n

AD DS basically sets up the database of objects that serves as the foundation for AD management. AD DS isn\u2019t the only server role associated with Active Directory, but you could argue that it\u2019s the server role that corresponds most directly to the core functionality that people associate with AD. <\/p>\n<\/div><\/div><\/div>\n\n\n\n

Can Active Directory Work with Macs?<\/a>
\n

Technically, yes, Active Directory can work for Macs<\/a>. But the user and system management capabilities of AD are curtailed with Macs when compared to the functionality with Windows systems. Deep, automated control over Mac systems has conventionally been achieved only with the help of third-party directory extensions or MDMs (mobile device managers). Tight control over users including provisioning, deprovisioning, and permission modifications are also challenging on Macs when using AD. Microsoft provides Mac MDM for an additional cost.<\/p>\n\n\n\n

We\u2019ve put together a resource on this topic called best practices for integrating Macs with Active Directory<\/a>.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Why Learn Active Directory?<\/a>
\n

Knowing how to use AD is a valuable skill \u2014 and one that\u2019s broadly applicable at organizations worldwide. Learning AD is particularly valuable if you want to work in IT supporting Windows devices, Azure cloud services, SharePoint, and many other enterprise softwares and platforms. <\/p>\n\n\n\n

However, it is possible to advance a career in IT without ever learning AD. 
Modern, cloud-forward organizations are bypassing on-prem AD altogether and going straight to cloud-based directory services. You can practice with directory services by taking advantage of a
free JumpCloud Directory Platform <\/a>account. JumpCloud University<\/a> can also help you learn the concepts around a cloud directory platform and the domainless enterprise.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

\n
\n \"JumpCloud\"\n <\/div>\n
\n

\n <\/p>\n

\n Securely connect to any resource using Google Workspace and JumpCloud. <\/p>\n <\/div>\n

\n Learn More<\/a>\n <\/div>\n<\/div>\n\n\n\n\n

How Does Active Directory Work?<\/h2>\n\n\n\n
How Does Active Directory Work?<\/a>
\n
\"screenshot<\/figure>\n\n\n\n

When Active Directory Domain Services<\/a> is installed on a server, it becomes known as a domain controller. This server stores the Active Directory database, which contains a hierarchy of objects and their relationship to one another.<\/p>\n\n\n\n

Active Directory is managed by an admin through a thick-client GUI (graphical user interface) that resembles the file manager in Windows (pictured above). This application runs on a Windows server and is not a modern browser-based application. Admins can point, click, and drag objects within AD and adjust their settings with a right-click via the mouse to access the dropdown menu.<\/p>\n\n\n\n

AD can also be controlled via the command line and through tools that leverage PowerShell, Microsoft\u2019s language for automation and API-level tasks.<\/p>\n\n\n\n

Management Applications, Integrations, and Interfaces<\/h3>\n\n\n\n

Active Directory is managed on premises by several different applications. Many organizations opt to license third-party applications and snap-ins to simplify the experience, make workflows more accessible, and improve reporting. Applications also exist to integrate AD with Azure AD. AAD and Microsoft\u2019s endpoint management products also have separate interfaces. <\/p>\n\n\n\n

A change or workflow made in AD cannot be executed on AAD (and vice versa), so you have two different management paradigms, two different security paradigms, and two different interfaces and workflow potentials.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

What Is Entra ID (Azure Active Directory)?<\/h2>\n\n\n\n
What is Entra ID?<\/a>
\n

The biggest misconception around Azure AD<\/a> is that it\u2019s Active Directory in the cloud. But the truth is that Azure AD wasn\u2019t built to be a standalone AD in the cloud<\/a>. Instead, Azure AD is designed to extend an existing Active Directory instance to the cloud.<\/p>\n\n\n\n

To better understand the AD and AAD relationship, Microsoft\u2019s reference architecture diagram is helpful.<\/p>\n\n\n\n

\"Azure<\/figure>\n\n\n\n

The concept has a lot of moving parts: you can synchronize your on-prem AD with Azure AD Connect and connect your existing database of user identities and groups to Azure cloud-based resources. Of course, you need Azure AD and then if you would like to create a domain within Azure, the Azure AD DS product as well.

Azure AD can do many things that AD can\u2019t (e.g., it has an integrated web application single sign-on component) \u2014 and the wider umbrella of Microsoft\u2019s Azure platform spans functionality so broad that it may be considered a competitor to
Amazon Web Services<\/a>. But don\u2019t be fooled into thinking that means that Azure AD can do everything that on-prem Active Directory can.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

What Is Azure AD Connect?<\/a>
\n

Azure AD Connect is a tool used to federate on-prem Active Directory identities to resources that are hosted within the Azure platform through integrations with Entra. Features such as password write-back and group syncing are limited to premium SKUs. AAD does the \u201cheavy lifting\u201d to federate identities, and AD serves as an entry point to AAD. These resources could include M365 and Azure systems, servers, and applications. Users could experience limitations when accessing resources outside of the Microsoft ecosystem.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

What AD Is and Isn\u2019t<\/h2>\n\n\n\n
Is Active Directory Single Sign-On (SSO)?<\/a>
\n

You could say that Active Directory was SSO<\/a> before SSO existed. By that, we mean that AD provided a single sign-on experience for users by centralizing access to all Windows-based resources within the database. Further, those resources were all on-prem or at minimum connected to the domain.<\/p>\n\n\n\n

That said, what the industry conventionally considers to be SSO (web app SSO)<\/a> is very different from AD \u2014 and in fact, conventional SSO arose out of AD\u2019s inability to authenticate users into web apps during the mid-2000s. Today, many organizations still supplement their Active Directory with a browser-based web application SSO tool.<\/p>\n\n\n\n

Azure AD is Microsoft’s attempt at web SSO, but it\u2019s optimized for the Microsoft ecosystem. Its interoperability starts to break down as you expand beyond Microsoft services \u2014 particularly to things that don’t support SAML or OIDC.<\/p>\n\n\n\n

However, new business requirements have driven the concept of SSO to now extend to devices, networks, file servers, and more, so the modern concept of SSO<\/a> goes beyond just access to Windows resources or even web applications. The concept of True SSO<\/a> is even more expansive and highly relevant for modern organizations where users and their IT resources may be all over the world.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Is Active Directory Software?<\/a>
\n

Yes, Active Directory is software developed by Microsoft that is installed, maintained, and updated on Windows-based server hardware. The AD software is licensed through a concept called CALs (client access licenses) among other mechanisms. Licensing for AD software can be quite complex, so discussing your options with a Microsoft reseller is your best bet.<\/p>\n\n\n\n

Further, the AD software and hardware is not a complete solution. You need to procure other components to help make AD run including solutions for security, high availability, backup, VPN, and more. <\/p>\n<\/div><\/div><\/div>\n\n\n\n

Is Active Directory a Server?<\/a>
\n

Not exactly. Active Directory requires a Windows server in order to function. A server running Active Directory Domain Services software is known as a domain controller \u2014 whether that server is physical hardware located on-prem or virtualized. <\/p>\n<\/div><\/div><\/div>\n\n\n\n

Is Active Directory a Database?<\/a>
\n

It would be more accurate to say that Active Directory contains a database. The Active Directory database stores all the users, groups, systems, printers, and policies within the network. These are known as objects and can be manipulated by admins using Active Directory.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Is Active Directory Open Source?<\/a>
\n

No. Active Directory was developed privately by Microsoft and its code has not been made available to the public like an open source tool. The primary open source alternative to Active Directory is OpenLDAP (others include FreeIPA, Samba, 389 Directory, and others). You can learn more about OpenLDAP vs Active Directory<\/a>.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Is Active Directory LDAP?<\/a>
\n

<\/p>\n\n\n\n

Active Directory isn\u2019t LDAP, but it uses LDAP. AD is a directory service that is capable of communicating through the LDAP protocol and managing access to LDAP-based resources. AD\u2019s primary protocol is a Microsoft proprietary version of Kerberos.<\/p>\n<\/div><\/div><\/div>\n\n\n\n

Active Directory Functionality<\/h2>\n\n\n\n
What Do You Need to Operate Active Directory?\u00a0<\/a>
\n

Generally, to operate AD you need a server, a backup, data center space, and VPNs. That\u2019s just to get through the basics, but for most organizations you also need to figure out security, load balancing\/high availability, data backup, and much more. You also need an IT admin who is technically adept enough to install, manage, and maintain AD.<\/p>\n\n\n\n

Note that the hardware and software requirements necessary to operate Active Directory are unique to each organization. Some aspects to consider when determining what you need to operate AD include the following:<\/p>\n\n\n\n