{"id":47869,"date":"2020-10-03T09:00:00","date_gmt":"2020-10-03T13:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=47869"},"modified":"2024-02-02T13:26:20","modified_gmt":"2024-02-02T18:26:20","slug":"how-remote-systems-communicate-with-active-directory","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/how-remote-systems-communicate-with-active-directory","title":{"rendered":"How Remote Systems Communicate with Active Directory"},"content":{"rendered":"\n
Throughout 2020 many of us have had new challenges managing an organization and the resources needed to Make Work Happen\u00ae. Organizations using Microsoft Active Directory\u24c7<\/sup> (AD or MAD) to manage their identities, systems, and access may run into frictions impacting manageability. In this article, we\u2019ll look at the various ways that some fundamental characteristics of AD have caused many organizations to look for a more cloud-forward approach to management.<\/p>\n\n\n\n Active Directory is developed to be primarily an on-premises solution, creating a security perimeter for the resources, identities, and devices it manages. This perimeter is called the domain.<\/em> AD\u2019s primary service, Active Directory Domain Services\u24c7<\/sup> (AD DS), manages and controls the users, policies, access, permissions, roles, and auxiliary integrated services within the domain. For well over two decades, Active Directory was the backbone of many organizations across the globe. With the introduction of state and local legislation for work from home mandates due to the COVID-19 pandemic, Active Directory developed friction for organizations moving to this style of environment.\u00a0<\/p>\n\n\n\n Primarily it comes down to communications. Active Directory was built to have all devices and users operating on the same network on-prem, whether that be LAN or WiFi. The devices and users would be domain-bound<\/em>, meaning that in order for devices and users to be verified and working, there would need to be a continual connection between them and the local Domain Controller <\/em>(DC). Domain Controllers can be akin to an operations manager \u2014 always ensuring that the environment remains up, running, and workflow is uninterrupted.<\/p>\n\n\n\n AD natively and primarily supports devices installed with Windows\u24c7<\/sup>. These devices connect to the Domain Controller through an associated binding<\/em> where the DC running AD DS pushes down policies, identities, credential changes, and more. Paired with Microsoft’s Kerberos Authentication Protocol, legacy Active Directory architecture is built around the idea of a constant connection being the norm not the exception.<\/p>\n\n\n\n To ensure that remote domain joined devices have continual connections to the DC, organizations would have to have a dedicated VPN connection between employee devices and the office network to ensure that secure channel, Kerberos sessions, and updates continue to work uninterrupted. Herein lies one of the primary issues running AD for work from home employees.<\/p>\n\n\n\n A real world example of an issue created by this would be during revoking employee access. The example organization lacks the network infrastructure for a distributed workforce. Windows devices bound to a DC require constant connections. Changes made to either the employee user account, device, group policy objects, or attributes in the domain would not be reflected on the employee\u2019s device until a connection is established.\u00a0<\/p>\n\n\n\n An admin needs to revoke an employee\u2019s access due to leaving the company while the DC cannot contact the device to make the disablement changes. Essentially the former employee can still use the system with the cached credentials with the current user account. This creates a major security risk during an employee\u2019s offboarding.<\/p>\n\n\n\n Reflecting on the requirements that maintaining Active Directory in a distributed environment takes some extra considerations. Having constant communication between employee devices and the domain is critical to ensure workflow is uninterrupted. Organizations who are currently struggling with maintaining a domain in the current landscape may want to consider alternatives to their current architecture. As more organizations migrate to become fully cloud based, there needs to be a platform that can cover many of the fundamental tools Active Directory brings, without the major fallbacks — the answer may be JumpCloud\u24c7<\/sup>.<\/p>\n\n\n\n JumpCloud is a directory platform born in the cloud — no hardware, no VPN, no Domain Controllers. Imagine your organization running distributed across the globe in either offices or from home. Now imagine a platform where IT admins can easily authenticate to a single platform and manage the organization’s user identities, devices, cloud services, SSO applications, RADIUS networks, LDAP, and\u00a0 more. Now imagine that you could migrate from your current Active Directory domain to JumpCloud directory platform seamlessly.\u00a0<\/p>\n\n\n\n 2020 has shown all of us in technology the upsides and downsides to managing organizations of any size. Manageability, unification, and security are baked into the JumpCloud directory platform making it easier on admins and their employees to continue to work wherever they are.\u00a0<\/p>\n\n\n\n Many of us here at JumpCloud come from IT roles and backgrounds and understand the frictions performing duties within legacy infrastructures. At the intersection of device, identity, and access, JumpCloud blurs the lines between MDM, EMM, UEM, SSO, and directory to allow users to authenticate to any resource anywhere while admins have a central portal to manage and monitor everything. <\/p>\n\n\n\nConstant Communication<\/h2>\n\n\n\n
Imagine There\u2019s No Server<\/h2>\n\n\n\n
Try JumpCloud Free<\/h2>\n\n\n\n