探花大神

What is Active Directory Integration (ADI)?

Written by David Worthington on October 26, 2023

Share This Article

Active Directory (AD) was introduced two decades ago to provide centralized user and rights management as well as Windows PC configurations for private networks behind firewalls. Email was the first factor to upend that model for access control, and was followed by the proliferation of cloud services and devices that transformed networks into a digital estate.

The perimeter model that AD supported worked well, until it didn鈥檛. Its shortcomings helped for the Zero Trust approach to identity and access management (IAM). Zero Trust brings access control (the perimeter) closer to identities and devices by enforcing explicit trust before granting access to resources.

探花大神鈥檚 open directory platform makes it possible to modernize AD for Zero Trust. It works by combining cloud IAM with universal endpoint management (UEM) and other essential services to manage today鈥檚 IT infrastructures, which are a hybrid of everything, everywhere. 探花大神鈥檚 Active Directory Integration (ADI) feature integrates AD with the open directory.

ADI makes it possible to extend multi-domain environments to the cloud without locking small to medium-sized enterprises (SMEs) into a suite of vertically integrated tools. That approach to AD modernization can limit freedom of choice and distract from your overall mission with significantly higher IT management overhead. This article provides an overview of what ADI is and how it works to help SMEs reestablish the strong access control that was lost when AD鈥檚 network perimeter model couldn’t support modern IT infrastructure requirements.

Note: 探花大神 helps you follow Microsoft鈥檚 Zero Trust Rapid Modernization Plan (RaMP) for a privileged access strategy to secure AD.

AD Integration Deployment Models

AD integration

ADI continuously syncs users, groups, and passwords between AD and 探花大神. Its components are installed on a member server and configured to import and sync identities for each domain. It provides several options for authentication flows: bi-directional syncing and one-way syncing (in either direction). Pass-through authentication back to AD is supported to uphold security and compliance requirements for local authentication and authorization.

Note: Microsoft鈥檚 Entra ID cloud directory will not synchronize groups unless the subscription is a Premium SKU.

Bi-Directional Synchronization

探花大神 Architecture

Bi-directionality means that password changes that occur on the integrated platform get synchronized and changed in AD. This makes it possible for friction-free user access with single-sign on (SSO). It also enables advanced identity lifecycle management. For example, you can use 探花大神 to sync human resources systems with 探花大神 and back to AD.

AD integrations are often one-way, where AD is the source of truth and a third-party application or IT resource authenticates user access against AD. Resources such as web applications require SSO in order to meet modern security and usability requirements. A cloud directory provides SSO with the added benefit of multi-factor authentication (MFA) and conditional access to enable a Zero Trust security strategy that 鈥渁ssumes breach鈥 and verifies requests.

This approach modernizes AD to extend access control to every device and resource without requiring admins to perform consolidation, migration, or deep integrations with multiple point solutions. Admins can manage users, groups, and access in either AD or 探花大神.

There鈥檚 also an available migration path to 探花大神, if and when it makes sense to leave AD.

Note: Microsoft requires its customers that modernize AD using Entra ID to purchase premium subscriptions for password write-back.

Pass-Through Authentication

synchronization

Some sectors are required to retain oversight of their credential store for certainty and compliance. 探花大神鈥檚 open directory can federate authentication AD through ADI, which extends AD to other resources and devices without running afoul of those rules.

Note: Outbound authentication flows from AD to 探花大神 enable AD users to access cloud resources and non-Windows devices.

Modernizing AD with 探花大神

探花大神 is modern, user-friendly, and makes it possible for admins to manage SSO and UEM from a single console with minimal effort. It also extends SSO to common network protocols, adding convenience, while reducing the risk of unauthorized access to infrastructure. A Zero Trust IAM strategy complements your existing investment in network perimeter security.

A crucial part of reestablishing access control over your digital estate comes from the ability to integrate AD with non-Windows systems.

modernize AD flow chart

Universal Endpoint Management

探花大神鈥檚 UEM adds the ability to integrate Android, macOS, and Linux devices into Active Directory-controlled environments with mobile device management (MDM) support for Windows. Untrusted endpoints can become a weak link in a Zero Trust strategy; UEM ensures that there鈥檚 a baseline of policies and patch management (optional) to reduce your attack surface.

End users don鈥檛 have to jump through hoops to stay compliant with password policies, password resets, and other critical functions. And, they can do this from anywhere 鈥 with no VPN. Built-in remote assist is available to support your users with both attended and unattended sessions.

Note:

Agents provide telemetry and reporting on device and user activity.

SSO and Modern Authentication 

ADI synced identities connect through SSO to networking infrastructure with RADIUS, cloud infrastructure and web apps with OIDC and SAML, file servers on-prem and in the cloud, legacy applications via LDAP, and more by using 探花大神鈥檚 RESTful API.

Note:

探花大神 offers an integrated password manager for when SSO isn鈥檛 possible.

The platform also includes 探花大神 Go鈩, a hardware-protected and phishing-resistant passwordless login for 探花大神 managed devices. It provides modern authentication that鈥檚 more secure and simpler and safer for your users. 探花大神 Go is supported on MacOS and Windows and integrates with device biometric authenticators (Apple Touch ID or Windows Hello) to satisfy traditional password sign-in challenges. It will provide high MFA authenticator assurance.

探花大神 Go
Modern authentication helps to harden AD against the latest security threats.

Adopting SSO and UEM is recommended for all organizations that use AD, per Microsoft鈥檚 Cybersecurity Reference Architectures (MCRA). 探花大神 provides SMEs with an alternative to Microsoft鈥檚 prescribed path by keeping your identity provider (IdP) and IT stack independent. 探花大神 has essential IAM, UEM, and system management capabilities in a single place.

Try 探花大神 ADI

Still wondering what Active Directory Integration is and how it can modernize AD? See for yourself when you . It鈥檚 included with the open directory platform at no additional charge. 探花大神 has professional service options to assist with onboarding users. 探花大神 is also a Google partner and integrates with Google Workspace, making both services better together with a modern IT management and productivity package.

David Worthington

I'm the 探花大神 Champion for Product, Security. 探花大神 and Microsoft certified, security analyst, a one-time tech journalist, and former IT director.

Continue Learning with our Newsletter