{"id":42727,"date":"2022-12-05T10:52:31","date_gmt":"2022-12-05T15:52:31","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=42727"},"modified":"2024-11-08T16:45:14","modified_gmt":"2024-11-08T21:45:14","slug":"active-directory-without-a-server","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/active-directory-without-a-server","title":{"rendered":"Active Directory Without a Server"},"content":{"rendered":"\n
Active Directory (AD)<\/a> is a directory service introduced by Microsoft that runs on a Windows server to centrally manage user access to resources on the LAN. The server role in Active Directory is run by Active Directory Domain Services<\/a> (AD DS), and the server running AD DS is called a domain controller. The domain controller performs two important functions:<\/p>\n\n\n\n That is why Active Directory remains an important system of record for many small and medium-sized enterprises (SMEs), even though it can only reside on servers within a network. However, IT infrastructure and workplace trends have changed dramatically since its introduction over two decades ago. It\u2019s common to have a heterogeneous mix of devices with employees working remotely at least some of the time (or even indefinitely). Microsoft has responded by extending AD to the WAN<\/a>, but devices and users can now be managed without AD, or Microsoft.\u00a0<\/p>\n\n\n\n Identity has become the new perimeter and IT teams must look beyond standalone AD to manage identities and all corresponding devices, wherever they exist. Devices are the gateway to your IT assets and shouldn\u2019t go unmanaged because they\u2019re not Windows. Cloud directories are filling the gap by providing the access control, device management, portability, and security that AD cannot. This has brought forward the option for a new paradigm: the domainless enterprise<\/a>.<\/p>\n\n\n\n This article examines AD\u2019s benefits, and when it\u2019s necessary to look beyond it. That\u2019s accomplished by integrating with cloud directory services to extend it, or even a domainless enterprise.<\/p>\n\n\n\n AD DC manages local network elements, such as systems and users, by organizing them into a structured hierarchy. The domain controller is then responsible for authorizing user authentication requests within the network. The next section outlines its core capabilities.<\/p>\n\n\n\n Active Directory Users and Computers<\/a> manages local contacts, devices, and users in your fleet: from PCs to printers. Admins create and organize groups within organizational units (OUs) to logically separate resources. OUs reside within a \u201cforest,\u201d which is the highest level of organization in AD. It may include service accounts for network services, apps that run on your servers, and integrations with SaaS apps. Service accounts can run locally on machines or across the domain. This tool also configures permissions for objects within your directory.<\/p>\n\n\n\n Global catalog is an AD feature that stores replicas of the attributes of an object<\/a> within a forest (or domain tree), even if the object (such as a user) resides within a separate domain. This enables organizations to centralize IT even if they have multiple locations and data centers, but users and devices must either exist within the confines of those facilities or utilize a VPN.<\/p>\n\n\n\n There are two built-in options to query AD attributes. The Active Directory schema snap-in enables admins to index attributes. PowerShell is another option to specify a query string to retrieve AD objects. Many organizations purchase third-party reporting tools for compliance purposes and to gain visibility into their AD environment, but it\u2019s vital to trust all software that\u2019s installed on a DC. Attackers may gain entry into networks through the supply chain, and DCs hold the \u201ckeys to the kingdom.\u201d<\/p>\n\n\n\n Every domain controller is a server object in AD DS. High availability is automatic whenever there\u2019s more than one DC. This makes it possible to shut down a server for maintenance without impacting your end users. Objects are automatically replicated throughout the server cluster. Administration is more complex: e.g., add-on apps must be installed and updated on each DC. Adding servers may increase licensing<\/a>, management, server infrastructure costs<\/a>.<\/p>\n\n\n\n Admins have deep control over how AD operates. Schemas can be customized to control (through rules) objects that can be stored within the directory and their related attributes. Templates can be configured to automate the creation of objections and associated policies. Admins use the Group Policy Editor to create and edit ADMX and ADML template files. Templates may also be imported into Microsoft\u2019s Endpoint Manager, a new subscription cloud service.<\/p>\n\n\n\n Now, let\u2019s explore what AD isn\u2019t capable of doing.<\/p>\n\n\n\n The domain controller serves an important role, but the modern workplace has shifted to the cloud. Legacy management solutions like the domain controller struggle to manage the disparate, non-Windows-based identities that have become commonplace in the IT landscape. Managing identities also entails managing devices and access to SaaS apps external to the Microsoft ecosystem. The next section examines those constraints in further detail.<\/p>\n\n\n\n The widespread shift toward web applications means that end users can no longer leverage single sign-on (SSO) through AD for all resources. Twenty years ago, when the IT landscape consisted entirely of Windows applications and desktops, AD connected every user to just about every resource they required. AD no longer grants that level of authorization, forcing admins to adopt additional tooling to manage authentication and authorization for all of their IT assets.<\/p>\n\n\n\n Microsoft introduced an Identity-as-a-Service (IDaaS) solution with Azure Active Directory (AAD), but AAD can make identity management complex, time-consuming, and costly for IT admins by forcing them to keep on-prem AD in conjunction with it. There\u2019s a free tier of AAD<\/a> that makes it possible to access apps such as Microsoft 365 (M365), but a Premium 1 (P1) or greater subscription to AAD is necessary to have SSO for domain-bound apps and the cloud.<\/p>\n\n\n\n Additionally, if IT professionals wanted to leverage SSO for their users without AAD, they would have to add Active Directory Federation Services (AD FS) to their on-prem AD. That would need to be housed on-prem. AD FS has high management overhead and can be difficult to implement<\/a>. Microsoft requires the NPS server role to be installed, configured, and managed to access network devices. There are multiple options for SSO within the Microsoft portfolio, but extending AD for roles it wasn\u2019t designed for dramatically increases complexity and overhead.<\/p>\n\n\n\n Multi-factor authentication<\/a> (MFA) isn\u2019t built into AD. SMEs must purchase solutions that integrate with it. Microsoft offers MFA to access Windows apps, but only through its AAD P1, P2 SKUs. Additionally, conditional access (CA) policies aren\u2019t available without those integrations.<\/p>\n\n\n\n The domain controller struggles with providing access to IT resources outside of the on-prem Windows networks, so AWS and GCP infrastructures can be difficult to integrate, such as Google Workspace. <\/p>\n\n\n\n Third-party solutions, such as JumpCloud\u2019s open directory, manage identities from other identity providers (IdPs) such as Google or Okta. Microsoft has introduced the capacity to manage external identities through Entra, for an additional monthly fee per user. It also charges for every single instance of an MFA authentication for those external IDs.<\/p>\n\n\n\n Substantial work is required to harden Active Directory through specialized configurations. It\u2019s not secure by default, and attackers have cultivated a strong understanding of AD\u2019s default settings. Hardening AD is mandatory to secure your infrastructure. <\/p>\n\n\n\n IT teams should always follow best practices to limit how they run as domain administrators. It\u2019s advisable to use Microsoft\u2019s ATA (Advanced Threat Analytics) or Defender for Identity to detect anomalous user behaviors. Security best practices for AD can take several full days of work to implement.<\/p>\n\n\n\n User identity lifecycle and entitlement management is a manual process in AD. Serious and costly breaches, including the Colonial Pipeline<\/a> ransomware attack, have occurred when domain users were \u201cforgotten.\u201d Forgotten accounts are still able to access assets. It\u2019s important to actively manage users and privileges to safeguard against insider and external threats.<\/p>\n\n\n\n Third-party tools\/services are necessary for reporting, especially when your users are accessing confidential and protected information or your industry is subject to compliance or regulatory requirements.<\/p>\n\n\n\n Systems must be directly bound to the AD to deploy Group Policy Objects (GPOs) which are registry settings, configurations, or tasks that need to be executed. Mac and Linux systems\u2019 commands and scripts<\/a> (i.e., no GPOs) cannot be managed from the Windows domain controller, meaning that IT admins must manually configure each system if they choose not to implement add-ons. Even Windows systems must be connected to a VPN to receive policy updates from AD or PowerShell commands, complicating your capacity to effectively manage remote users.<\/p>\n\n\n\n Microsoft\u2019s paid subscription Intune<\/a> service fills this gap, but Microsoft services aren\u2019t mandatory. An open directory platform, such as JumpCloud integrates with AD<\/a> to perform this function, but could also manage devices without a domain controller being present.<\/p>\n\n\n\n\n\n
What Does Active Directory Do?<\/h2>\n\n\n\n
Manages Devices, Services, and Users<\/h3>\n\n\n\n
Global Catalog of Domains<\/h3>\n\n\n\n
Querying and Indexing Directory Objects<\/h3>\n\n\n\n
High Availability<\/h3>\n\n\n\n
Schemas and Templates<\/h3>\n\n\n\n
What Doesn\u2019t Active Directory Do?<\/h2>\n\n\n\n
Single Sign-On (SSO) and Multi-factor Authentication (MFA)<\/h3>\n\n\n\n
Securing and Managing External Identities <\/h3>\n\n\n\n
Strong Security Defaults<\/h3>\n\n\n\n
Automation of Identity Lifecycle and Entitlements<\/h3>\n\n\n\n
Integrated Reporting<\/h3>\n\n\n\n
Cross-OS Device Management<\/h3>\n\n\n\n