Hybrid Identity Architecture

Hybrid Identity with Microsoft Entra ID Connect

Executive Summary

This project documents the successful deployment and configuration of Microsoft Entra ID Connect (formerly Azure AD Connect) to establish a unified Hybrid Identity solution for a mid-sized enterprise environment. The primary goal was to seamlessly synchronize on-premises Active Directory Domain Services (AD DS) user accounts and groups to Microsoft Entra ID, enabling Single Sign-On (SSO) and centralizing identity management to improve security and operational efficiency.

Background

CloudTech Solutions previously managed all identities locally on their domain controller. This limited remote work capabilities and created password management challenges. The IT team also struggled with inconsistent account provisioning and manual user creation for cloud applications.

Project Overview

The Challenge

The client lacked a unified identity solution, requiring users to maintain separate passwords for on-premises resources and cloud services (e.g., Microsoft 365). This led to:

  • Inefficient user provisioning/deprovisioning.
  • Increased help desk costs due to password resets.
  • Security risk from inconsistent password policies and lack of centralized control.
  • No MFA or modern authentication policies.

The Goal

To implement a Hybrid Identity solution using Microsoft Entra ID Connect to:

  • Synchronize all on-premises user accounts and groups to Microsoft Entra ID (the cloud directory).
  • Establish Single Sign-On (SSO) capability for all cloud applications.
  • Centralize identity management to improve security and operational efficiency.

Implementation Steps and Configuration Details

CloudTech Solutions currently operates with a single Windows Server 2022 domain controller for the cloudtech.local domain. The Active Directory Domain Services (AD DS) structure is organized into four main Organizational Units (OUs), reflecting the four departments: HR, IT, Sales, and Marketing. Each of these OUs contains three user accounts and one security group, as seen below.

AD Users Structure
OUs representing the 4 departments in the organization

To begin, download the Microsoft Entra Connect Sync application. You will find the download link within the Microsoft Entra Connect blade of the Microsoft Entra Admin Center. The application should then be installed on the Windows Server 2022 instance.

Using Express Settings

We will start by utilizing the Express Settings, which is the default and recommended installation option for the majority of organizations operating with a single forest topology. This will synchronize all attributes in the forest. We plan to use the more advanced Custom Settings later on, as this option provides more granular control over the installation and synchronization process.This allows for precise control over which users and groups sync to the cloud, in addition to enabling other configuration choices.

AD Users Structure
Express Settings in Microsoft Entra Connect Sync

Presently, the Entra ID tenant contains only the Global Administrator account. This role is the most powerful and highly privileged built-in role available in Microsoft Entra ID, granting unlimited access to all administrative features within Entra ID and any integrated services that rely on Entra identities (such as Microsoft 365, Exchange, and SharePoint).

After the synchronization process is established, this area will be populated with the users and groups from your on-premises Active Directory.

AD Users Structure
Entra ID Tenant before synchronization

Enter the Global Administrator credentials for your Microsoft Entra ID tenant, and then click Next.

AD Users Structure
Global Administrator Credentials

Provide the Enterprise Administrator credentials for your Active Directory Domain Services (AD DS), and then click Next.

AD Users Structure
Enterprise Administrator Credentials

Select the option to continue without matching all User Principal Name (UPN) suffixes to verified domains, and click Next.

AD Users Structure
Tick to match all UPN suffixes to verified domains

Click Install to begin the synchronization setup. This process will install necessary components, such as the Microsoft Entra Connect Health agent.

AD Users Structure
Ready to install

After the installation process is complete, navigate to the Microsoft Entra ID users and groups section to verify the newly synchronized objects.

AD Users Structure
Entra ID shows all synced users from cloudtech.local active directory
AD Users Structure
Entra ID shows all synced groups from cloudtech.local active directory

Using Custom Settings

Select Customize Synchronization Options and click next.

AD Users Structure
Customise Synchronization Options

Enter the credentials for both the Global Administrator (for Microsoft Entra ID) and the Enterprise Administrator (for Active Directory Domain Services), and then proceed by clicking Next.

Connect the cloudtech.local forest, click Next, and then select the specific Organizational Units (OUs) that you wish to synchronize to Microsoft Entra ID.

AD Users Structure
Add Forest (cloudtech.local)
AD Users Structure
Select Organizational Units (OUs) to be synchronized to Microsoft Entra ID

Enable below optional features:

  • Password Hash Synchronization (PHS): Allows users to sign into Azure using their on-premises passwords without the need for additional Single Sign-On (SSO) infrastructure.
  • Password Writeback: Enables password changes that originate in Microsoft Entra ID to be securely written back to your on-premises Active Directory.
  • Group Writeback: Allows groups configured for writeback in Microsoft Entra ID to be written back to your on-premises directory.
AD Users Structure
Select the optional features to include in the synchronization process

Once the configuration is complete, log back into Microsoft Entra ID groups to verify the synchronization results. You should see that only the groups within the selected Organizational Units (OUs) have been synchronized, while the existing user list in Entra ID remains the same.

AD Users Structure
Entra ID shows all synced groups selected from the OUs

Outcome and Achievements

By implementing Microsoft Entra ID Connect:

  • 100% of employees now access both on-prem and cloud resources via SSO.
  • IT support tickets for password resets dropped by 65%.
  • CloudTech achieved simplified IT management through centralized password and policy controls.
  • CloudTech achieved enhanced security posture with MFA and Conditional Access.
  • CloudTech successfully met industry compliance requirements for data protection.