Moving from Physical AD/Data Server to Office365
-
@PhlipElder said in Moving from Physical AD/Data Server to Office365:
@BRRABill said in Moving from Physical AD/Data Server to Office365:
So our company has finally decided to make the jump to all remote.
We are small (let's say 10 people) but we used to be large, so we have a AD domain.
Right now we have a local DC and a local data server. We also use Office365 for e-mail and, of course, Office.
There is no RIGHT answer here, but if you were doing this ... what would you do?
I think there are two parts to look at...
- Keep some sort of AD authentication, or not?
- What to do with data?
For #1 ... I'm not sure.
For #2 ... I am thinking throw the common files onto SharePoint, and put everyone's "home" folder into OneDrive for Business. With 10 people, it won't be hard to do that for each user.
So ... let's hear it, ML ... WWMLD?
1: Yes. AD Sync for on-premises user management works both ways. It does make things simpler to manage.
2: OneDrive for Business is SharePoint on the backend. It's great for setting up things like Check Out/In, Versioning, and Review controls. Permissions based folder and site visibility (think Access-based Enumeration in Windows) are also a big plus.You can do it, but I do suggest keeping a small domain controller on-premises for simplicity in management.
EDIT: BTW, the customer is always responsible for backing up the data in any cloud. I suggest Veeam Backup for O365.
AD Sync does not go both ways, you will need to have sync back licensing which are expensive to get password synchronization and if there is any luck getting the user and group sync back from Office 365 to AD. It is just an additional layer of complexity that while it has its cases is not needed for a company this size.
-
Are you using any local (apps on your PC) that explicitly use your on-prem AD for authentication and/or other data?
No.
Okay, so you already have licensing and already have that whole thing going on. I'd keep using it. Do you have your local AD synchronizing users, passwords, etc. via AADConnect to Azure AD for your use of Office 365, email, etc.? Or, are you using local AD for logging into your Windows devices and AAD for O365 authentication?
Correct. Local AD for machines and data security. Then we log onto O365 separately. (Which is what I am assuming you mean by Azure AD (AAD).)
Some would answer your questions, others would veer off outside of contexts and dive into other assumptions to discredit others based off of un-dotted i's and un-crossed t's.
But that is every post.
What SaaS are you using, or apps are you using that uses authentication besides O365?
Nothing, really.Unless I am misunderstanding your question.
-
@BRRABill said in Moving from Physical AD/Data Server to Office365:
What SaaS are you using, or apps are you using that uses authentication besides O365?
Nothing, really.Unless I am misunderstanding your question.
Well, for example... HR or Accounting may be using some 3rd party SaaS app (like Paylocity) and everyone in the company may be logging into Paylocity that is using AAD SSO (as an example), or any other possible SaaS.
Or, maybe your Windows PCs and O365 are absolutely the only systems and services you use that require authentication?
I mean, if the company plans on being ~10 users, there's nothing wrong with setting everyone up with LastPass for all services.
-
For your local devices, you can use only Azure AD for logging in to your PCs. You don't need local AD for that. You also don't need Intune or anything for just basic oversight.
-
@Obsolesce said in Moving from Physical AD/Data Server to Office365:
For your local devices, you can use only Azure AD for logging in to your PCs. You don't need local AD for that. You also don't need Intune or anything for just basic oversight.
Yeah I didn't even think about that ... logging in after the local DC goes away.
-
@IRJ said in Moving from Physical AD/Data Server to Office365:
@scottalanmiller said in Moving from Physical AD/Data Server to Office365:
@IRJ said in Moving from Physical AD/Data Server to Office365:
With office 365, Basic AD is included
I thought Azure AD was, not AD? Is AD included, too?
No. I meant Azure AD. It is a SaaS service so I just figured that was already assumed.
Oh sure, but that's different than AD. That might be useful to keep.
-
@BRRABill said in Moving from Physical AD/Data Server to Office365:
@scottalanmiller Mainly just generic Office files. A little media here and there, but nothing intensive, if that is what you mean.
Sharepoint might be best for most of that.
-
@BRRABill said in Moving from Physical AD/Data Server to Office365:
I guess the question is ... do we just scrap our AD, and use our Office365 accounts to log in. Do we really need anything more than that?
I don't see why not. What is AD providing for you?
-
@dbeato said in Moving from Physical AD/Data Server to Office365:
@PhlipElder said in Moving from Physical AD/Data Server to Office365:
@BRRABill said in Moving from Physical AD/Data Server to Office365:
So our company has finally decided to make the jump to all remote.
We are small (let's say 10 people) but we used to be large, so we have a AD domain.
Right now we have a local DC and a local data server. We also use Office365 for e-mail and, of course, Office.
There is no RIGHT answer here, but if you were doing this ... what would you do?
I think there are two parts to look at...
- Keep some sort of AD authentication, or not?
- What to do with data?
For #1 ... I'm not sure.
For #2 ... I am thinking throw the common files onto SharePoint, and put everyone's "home" folder into OneDrive for Business. With 10 people, it won't be hard to do that for each user.
So ... let's hear it, ML ... WWMLD?
1: Yes. AD Sync for on-premises user management works both ways. It does make things simpler to manage.
2: OneDrive for Business is SharePoint on the backend. It's great for setting up things like Check Out/In, Versioning, and Review controls. Permissions based folder and site visibility (think Access-based Enumeration in Windows) are also a big plus.You can do it, but I do suggest keeping a small domain controller on-premises for simplicity in management.
EDIT: BTW, the customer is always responsible for backing up the data in any cloud. I suggest Veeam Backup for O365.
AD Sync does not go both ways, you will need to have sync back licensing which are expensive to get password synchronization and if there is any luck getting the user and group sync back from Office 365 to AD. It is just an additional layer of complexity that while it has its cases is not needed for a company this size.
And it's not fully reliable. It's famously fragile, complex and buggy. Even when MS themselves implement it.
-
@BRRABill said in Moving from Physical AD/Data Server to Office365:
Correct. Local AD for machines and data security.
AD is for management convenience. It provides no security.
-
-
@BRRABill said in Moving from Physical AD/Data Server to Office365:
Just
a) logging into our machines
b) network securityAD provides NO security. Not a thing.
-
@BRRABill said in Moving from Physical AD/Data Server to Office365:
a) logging into our machines
You don't need AD to log into your machines. In fact, it only makes that harder.
AD is only useful if you are maintaining central creds to log into multiple machines. And at just 10 users, that's considered not to make sense, even by MS standards. So even when that functionality is needed, AD isn't considered a good option for that.
So for logins, AD is considered to work against you, not for you, till you get another user or two. And just break even at that point.
-
@Obsolesce said in Moving from Physical AD/Data Server to Office365:
uses Office365 email and Office suite. Nothing more than that, at all. Only going by that, then sure, if you want to keep using
Personally, I'd ditch AD (the stuff you get from on-prem Windows Server - or colo'ed and likely VPN connected server) - you don't need it anymore.
If everyone is working from home, you don't even need to bother with people logging their machines themselves into AAD unless you want to manage those machines - then, might be worth while. Plus, but logging Windows10 into an AAD account, using O365 services all just go, no extra logons required.
Definitely push all personal files to ODfB, and shared to Sharepoint.
Now for the backup solution.
Yes, we know that AD does not provide security - But AD does provide the user list that other things like NTFS or share permissions do use. Of course those things aren't limited to only using AD for their user list, but it's the most common. -
@scottalanmiller said in Moving from Physical AD/Data Server to Office365:
@BRRABill said in Moving from Physical AD/Data Server to Office365:
a) logging into our machines
AD is only useful if you are maintaining central creds to log into multiple machines. And at just 10 users, that's considered not to make sense, even by MS standards. So even when that functionality is needed, AD isn't considered a good option for that.
Really? then what is? manually maintaining 10 logons on each machine?
-
Now, that said - in this situation I too would ditch AD, it's just extra you don't need.
Since you have O365, you can join the Win10 machines to ADD. then your users can log into their machines using their ADD accounts. You do get some level of control from the free version of ADD included in O365, but nothing like GPO on AD.
-
@Dashrender said in Moving from Physical AD/Data Server to Office365:
Now, that said - in this situation I too would ditch AD, it's just extra you don't need.
Since you have O365, you can join the Win10 machines to ADD. then your users can log into their machines using their ADD accounts. You do get some level of control from the free version of ADD included in O365, but nothing like GPO on AD.
The one caveat that I don't think is resolved as of yet:
Local PC set up. User logs on first time with Azure AD. PC is Azure AD joined. User then has MFA. User can then log on and work without MFA prompts going forward.
Catch #1: User will not be able to remote into that PC using RDP. Third party yes, but not RDP.
Catch #2: The PC is tattooed to Azure AD. One cannot join a local AD anymore (IIRC).Managing more than one or two PCs without AD/Group Policy is pure PITA. No peer-to-peer here. No way.
-
@Dashrender said in Moving from Physical AD/Data Server to Office365:
@scottalanmiller said in Moving from Physical AD/Data Server to Office365:
@BRRABill said in Moving from Physical AD/Data Server to Office365:
a) logging into our machines
AD is only useful if you are maintaining central creds to log into multiple machines. And at just 10 users, that's considered not to make sense, even by MS standards. So even when that functionality is needed, AD isn't considered a good option for that.
Really? then what is? manually maintaining 10 logons on each machine?
FFS.. Why the fuck would there be 10 local users on each machine?
-
@Dashrender said in Moving from Physical AD/Data Server to Office365:
but it's the most common.
Which alone means you should question it heavily, because "most common" means "everyone who doesn't do a good job defaults to this". That doesn't make it wrong to use, but should mean that it is highly suspect and requires serious vetting to consider.
-
@PhlipElder said in Moving from Physical AD/Data Server to Office365:
tattooed to Azure AD. One cannot join a local AD anymore (IIRC).
But they will be all working remote, not need to be tied to AD anymore.