AD DS from the Cloud

Microsoft®’s Active Directory® Domain Services (AD DS) has proven to be extremely popular. In fact, most organizations have leveraged the legacy domain controller for their Windows®-based networks for the past two decades. As IT networks change and morph, however, IT organizations and MSPs are looking for an AD DS from the cloud to better match recent changes in the IT landscape. So, how did on-prem AD DS go from the leading approach for user and system management to being replaced with AD DS from the cloud, if possible?

The Rise and Fall of AD DS

When Active Directory Domain Services was launched, most IT networks at the time were dominated by other Microsoft resources. And, for these Windows-based networks, the concept of the domain and the execution of the domain controller by Microsoft was nothing short of brilliant. An end user would login to their Windows laptop or desktop and then have access to whatever Windows-based applications and servers they needed without having to re-login. Essentially, through the magic of the domain controller and the Kerberos protocol, Microsoft made it seamless for end users to get access to what they needed. As a Windows-centric solution in a Windows-centric IT world, AD DS worked very well.

Then the IT landscape changed: end users started to prefer macOS® and Linux® systems, data centers shifted to the cloud with AWS®, web applications became more popular, Windows File Servers changed to Samba file servers / NAS appliances, and WiFi networks overtook wired.  All of these new IT resources meant the concept of the domain completely changed. No longer were IT resources on-prem and Windows-based, which is what the domain controller preferred.

What’s an IT Admin to Do?

Well, many MSPs and IT admins started to search for an AD DS from the cloud. Of course, Microsoft’s Azure® AD DS platform immediately came to mind. As IT organizations quickly realized, though, Azure AD DS is really a solution to create a domain at Azure. What IT organizations actually have in mind is a solution (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 122 posts and counting.See all posts by natalie-bluhm