www.sqltattoo.com Open in urlscan Pro
35.204.93.134  Public Scan

URL: https://www.sqltattoo.com/blog/2020/11/azure-ad-domain-services-replica-sets/
Submission: On April 28 via manual from GB — Scanned from NL

Form analysis 2 forms found in the DOM

GET https://www.sqltattoo.com/

<form role="search" method="get" class="searchform" action="https://www.sqltattoo.com/">
  <div> <input type="text" value="" name="s" class="s" placeholder="Type and hit enter"> <input type="submit" class="searchsubmit" value="Search"></div>
</form>

POST #

<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-4">
  <div id="subscribe-text">
    <p>Enter your email address to subscribe to this blog and receive notifications of new posts by email.</p>
  </div>
  <p id="subscribe-email"> <label id="jetpack-subscribe-label" class="screen-reader-text" for="subscribe-field-blog_subscription-4"> Email Address </label> <input type="email" name="email" required="required" value=""
      id="subscribe-field-blog_subscription-4" placeholder="Email Address"></p>
  <p id="subscribe-submit"> <input type="hidden" name="action" value="subscribe"> <input type="hidden" name="source" value="https://www.sqltattoo.com/blog/2020/11/azure-ad-domain-services-replica-sets/"> <input type="hidden" name="sub-type"
      value="widget"> <input type="hidden" name="redirect_fragment" value="subscribe-blog-blog_subscription-4"> <button type="submit" class="wp-block-button__link" name="jetpack_subscriptions_widget"> Subscribe </button></p>
</form>

Text Content

Skip to content
Open toolbar

Accessibility Tools

 * Increase Text
 * Decrease Text
 * Grayscale
 * High Contrast
 * Negative Contrast
 * Light Background
 * Links Underline
 * Readable Font
 * Reset

‡ Living in a hybrid world ‡
 * home
 * about
 * contact
 * blog categories
   * Azure
   * SQL Server
   * Networking
   * Event
   * Learning
   * News & announcements
   * PowerShell
   * Monitoring
   * DevOps
 * blog archive


AZURE AD DOMAIN SERVICES REPLICA SETS

 * 2020-11-07
 * Comments Off on Azure AD Domain Services replica sets
 * By Vassilis Ioannidis

Facebook Twitter LinkedIn Email
Reading Time: 4 minutes

You’ve been assigned a task to design architecture a new cloud service
deployment that should be elastic, scalable, resilient with global coverage
while keeping the cost in control. Two things that make it even more
challenging: first it should be used by applications that do not speak
cloud-ready auth protocols and second give user-access to external SaaS public
offerings without recreating users to any external directory by leveraging Azure
AD features.

Let’s have a closer look.




BUSINESS CASE

We need the following to satisfy the business needs for identity:

 1. It should talk Kerberos, NTLM
 2. Access to external SaaS applications
 3. Be a global and resilient solution
 4. Lower overall maintenance cost




WINDOWS AD DS VS AZURE AD

Azure AD is not the traditional Windows AD DS but just on the cloud. They are
completely different. They talk different protocols (SAML and OAuth2, vs
Kerberos and NTLM, etc.) and they operate significantly differently. Azure AD is
a cloud-based identity solution that helps you manage users and applications.
Active Directory or Windows Active Directory if you will, manages objects, like
devices and users, on your on-premises network.

Azure AD came to bridge the gap between users in any identity provider (IdP)
like Active Directory and SaaS applications without the need to replicate the
users and maintain different user databases.

Windows AD and Azure AD

So that is a good thing, Azure AD can take the existing user base and make them
leverage direct access to 3rd party SaaS offerings. But we are still missing at
least one thing: the backward compatible auth protocols.




WHERE NEXT? AZURE AD DS

Azure AD DS is an Azure PaaS offering and the closest thing to Windows Server
Active Directory on Azure without you managing the domain controller (DC)
infrastructure. In few words, instead of you deploying 2 Azure VMs to hold your
DCs and then maintaining (= secure, patch, monitor, backup, and troubleshoot)
them, you can deploy one Azure AD DS resource on your Azure tenant that will act
almost identical to your “old-school” Windows Server Active Directory.

When you deploy an Azure AD DS instance, Azure in the back scene it deploys to
domain controllers to satisfy fault tolerance and high availability. If the
Azure region you deploy supports availability zones then the DCs are distributed
across zones. If not, then the domain controllers are deployed across
availability sets.

On-premises AD could be your AD living inside Azure VMs

Azure AD DS integrates with your existing Azure AD tenant. This integration lets
users sign in to service and applications connected to the managed domain using
their existing credentials. You can also use existing groups and user accounts
to secure access to resources.

Fast facts about Azure AD DS:

 * it can only be one per Azure AD tenant
 * once you deploy it you cannot change its location, virtual network (vnet), or
   just about anything else related to underlying infrastructure services
 * guest users on your Azure AD tenant cannot be synced
 * you don’t have direct access -desktop- on the domain controllers
 * Domain Administrator and Enterprise Administrator privileges aren’t available
   for you to use within the domain
 * Distributed File System (DFS) is not supported
 * Once deployed you can stop or otherwise pause the service

Note: To manage an Azure AD DS instance you need to deploy an Azure VM in the
same vnet and install the Remote Server Administration Tools of the Windows
Server features. Then you can manage the “managed” AD domain by using the tool
“Active Directory Administration Center”.



From the comparison table above we see that it all seems to check out fine apart
from one: geo-distributed deployment.

OK, we are getting somewhere but we need to tackle the global presence point
because if our domain controllers live in West Europe Azure region and we have
deployments in other Azure regions i.e. Brazil South, UAE Central, South India,
etc. there can be quite a network latency to authenticate and authorize users
and applications.




ENTERS THE REPLICA SETS CONCEPTS OF AZURE AD DS

In the previous section, we described that the creation of an Azure AD DS
managed domain creates in the back 2 domain controllers. This is called a
replica set.

There is a concept in Azure AD DS replica sets for expanding a managed domain to
have more than one replica set per Azure AD tenant. This is currently in preview
but the word is that it will go GA in Q1 of 2021.

You create each replica set in a virtual network located in the region that is
closest to your country deployment and then you need to setup vnet peering
between any virtual network that hosts the Azure AD DS replica set. This
configuration creates a mesh network topology and enables for directory
replication. Also, there is the option of deploying different replica sets in
the same virtual network but in different subnets.

This diagram shows a managed domain with two replica sets. The first replica set
is created with the domain namespace. A second replica set is created after
that.

Replica sets ensure availability of authentication services in regions where a
replica set is configured.

To support multiple Azure AD Domain Services replica sets, the managed domain
service SKU must be either Enterprise or Premium.

While in preview, it is limited to a maximum of four replica sets – the initial
replica set for the managed domain, plus three additional replica sets.

In a next blog post, I will walk you through the complete process of creating a
managed domain, a management VM and creating multiple replication sets to ensure
local resiliency for authentication to your regional solutions.

And with that, we covered all the business case points.

Hope you enjoyed it and feel free to comment below.

Cheers!

 
 * 
 * 
 * 
 * 
 * 

Rate this (1 Vote)

Facebook Twitter LinkedIn Email

I’m speaking at Global Azure!2021-04-16In "Azure"

Azure network round trip latency statistics2020-03-12In "Azure"

A simple app to alert you and log your home router’s public IP when your ISP
renews it!2021-02-20In "Networking"

 * Azure Azure AD
 * Tagged: architecture Azure AD azure ad ds talesFromTheTrenches

 * Previous
 * Next

POST BYVASSILIS IOANNIDIS

Vassilis Ioannidis holds the role of Microsoft Technical Trainer, part of the
Worldwide Learning organization at Microsoft. He's an Azure Cloud Solutions
Architect, a Microsoft SQL Server SME, a technical trainer, and a speaker at
community events revolving around Microsoft Azure and Microsoft SQL Server.
Vassilis has a degree in Computer Programming and numerous Microsoft
certifications. He is result-driven, and a lifelong learner.

Twitter Facebook Github Website

SOME RELATED POSTS

CONSTRAINED VCPU CAPABLE AZURE VMS

 * 2020-05-26

AZURE NETWORK SECURITY GROUPS

 * 2020-05-08

I’M SPEAKING AT GLOBAL AZURE!

 * 2021-04-16


COMMENTS (0)



Comments are closed.

SEARCH



SUBSCRIBE & STAY UP2DATE

Enter your email address to subscribe to this blog and receive notifications of
new posts by email.

Email Address

Subscribe

TAGS

Announcement (12) application security groups (2) ARM Templates (7) Azure (26)
Azure AD (2) azure data studio (3) azure portal (2) azuresql (2) C# (2) CU (19)
deployment (2) DevOps (5) event (8) extension (2) feature (2) features (6)
Global Azure (3) IaaS (4) itprodevgreece (3) latency (2) learning (3)
maintenance (18) management (8) monitoring (4) networks (12) PASS (2) patching
(16) performance (2) powershell (10) presentation (2) preview (2) Public Preview
(3) release (18) retirement (2) security (4) snippet (2) SQL Server (17)
sqlserver (26) tips (3) tools (3) troubleshooting (4) tsql (2) updates (3)
virtual (2) VS Code (4)
© 2020 sqltattoo blog - Vassilis Ioannidis
Twitter facebook linkedin github rss
Top




sqltattoo.com


We believe your data is your property and support your right to privacy and
transparency.
Select a Data Access Level and Duration to choose how we use and share your
data.
SilverGoldPlatinum
1 month6 months12 months

Highest level of privacy. Data accessed for necessary basic operations only.
Data shared with 3rd parties to ensure the site is secure and works on your
device

Balanced experience. Data accessed for content personalisation and site
optimisation. Data shared with 3rd parties may be used to track you and store
your preferences for this site.

Highest level of personalisation. Data accessed to make ads and media more
relevant. Data shared with 3rd parties may be use to track you on this site and
other sites you visit.

Consent Preferences
Use the toggles below to specify your data sharing purposes for this website.
Basic Operations
This type of sharing is necessary for us to access the data we need to make sure
the website is secure and working properly.
Data Accessed:
 * Anonymous data like browser name and version
 * Pseudonymous data like authentication token

Content Personalization
When enabled, you allow us to save your preferences and create a profile about
you so we can deliver personalized content.
Data Accessed:
 * Anonymous data like device type, model and operating system
 * Pseudonymous data like site browsing preferences
 * Personal data like your IP address and location

Site Optimization
When enabled, you allow us to monitor your behavior so we can analyze and
improve the services on our website for all visitors.
Data Accessed:
 * Anonymous data like the address of the previously visited website (HTTP
   Referer)
 * Pseudonymous data like website activity identifiers
 * Personal data like content, search and purchase history

Ad Personalization
When enabled, you allow us access to share data with our advertising partners
that build profiles about you across multiple websites.
Data Accessed:
 * Anonymous data like affiliate referral links
 * Pseudonymous data like identifiers used to track and profile users
 * Personal data like your age, gender and demographics

Protection & Metrics
View your consent record, and the list of 3rd parties blocked and allowed based
on your settings.
Consent Metrics

Consent ID—Date of Consent—Data Access Level—Purpose Categories—Duration of
Consent—

Privacy Protection
Services Blocked
 * Google Tag Manager

Services Allowed
 * —

Save my preferences
Customize