What is our primary use case?
We provide single sign-on, app syncing, and API seamless access to more than 2,000 users with the syncs into Azure. We provide access to email, SharePoint Online, Skype, and other services on the cloud to half of those users. We have services in the cloud, such as app registration and documents for SharePoint Online.
What is most valuable?
The single sign-on is the most valuable aspect of the solution. It allows for storing passwords in secure vaults. For developers, we use a vault for SSH. Mainly, we have replication from all services on-prem to the cloud.
With a single sign-on, in the case something happens on-premises, users can still use a single sign-on to a PC to access the cloud.
We can deploy policies, which improves our security posture. It's mainly very similar to on-premises, however, some new features can be used on the cloud as well, such as labs and password rotation. Some features have improved, which has been great.
The solution improves the way our organization functions. I can deploy a policy that will search for unused accounts, for example, and delete or just move them to a different organization unit that handles unused accounts. We can change unsecured passwords. We can detect intrusion and inform a security group on how to disable that account immediately. We can also perform security checks on services.
We can easily migrate services and improve the quality and improvement of bandwidth of the service. It's easy to scale.
There are some searches, such as a global search, which have powerful query capabilities if you configure it in a certain way.
It's easy to use. The portal experience provides a dashboard of what's happening. With the dashboard, you can see what's happening with the service faster. Of course, I’m talking about the cloud. On-prem you don't have that dashboard.
Active Directory has affected our end-user experience. It has improved it as we have centralized management now and we have centralized administration, and things can be automated easily. You can have most tasks automated. It's good.
What needs improvement?
The security needs to be improved. For example, in terms of changing from one version to the latest, meaning going from 2008 to 2012, or 2016 to 2019, you need to get rid of all the operating systems and they need to ensure the security is upgraded and improved.
They need to bring BitLocker into the VMs and the servers.
LAPS could also be improved. LAPS are used to rotate passwords on a server. That can be improved upon to increase security levels.
Protocols SSL 2.0 and SSL 3.0 need to be removed and they should change my TLS 1.2 for every application.
For how long have I used the solution?
I've been using Azure for about 13 years. However, I've used Active Directory for 25 years. It's been a long time.
What do I think about the stability of the solution?
We have found some servers do not have enough CPU or memory which meant there was not enough stability. I scaled up the service to ESX, to a virtual host, and I installed multiple DCs, virtualized. As the solution has physical machines, CPU and memory were not enough. However, the scaling provided much more stability.
What do I think about the scalability of the solution?
The scalability is good now, and I find it to be more stable and faster since scaling up to ESX.
We tend to increase usage every month. We have five countries with multiple forests. Currently, we have 200 users or so on the solution.
How are customer service and support?
The technical support is not so bad, however, it's lacking in faster response times sometimes.
Which solution did I use previously and why did I switch?
We did not previously use a different product.
How was the initial setup?
The initial setup was complex. It has several forests connected to multiple domains in several countries, and it's going through multiple data centers. Typically, we have a solution for the VPN. It's different in every country sometimes. On top of that, centralized services are not so easy to manage in different forests.
The initial deployment was set initially for six months, and then we’ve been doing improvements for the last six months as well. It’s been a year in total.
Our initial implementation strategy was to sync a forest with multiple domains.
We have ten to 15 people who are capable to handle maintenance on the product. These include a cloud architect to Active Directory architect engineers, help desk engineers to deploy and manage solutions, and engineers to manage the servers.
What about the implementation team?
We did not use an integrator, reseller, or consultant for the deployment. We handled it in-house. That is my understanding.
What was our ROI?
We have seen a bit of an ROI.
What's my experience with pricing, setup cost, and licensing?
The solution is not the cheapest in the market. It could be improved and possibly lowered slightly.
Which other solutions did I evaluate?
We moved right into Active Directory, however, as a cloud architect, I am familiar with other solutions. I advised the client to go right to Active Directory based on my past experience. Due to the complexity of services they offered, I knew integration would be easy.
What other advice do I have?
We are a Microsoft partner.
We use several versions of the product, including 2016 and 2019. For one customer, they're running 2008, which is the old version, and I just upgraded them to 2012. The domain controller is 2012 R2 and has the latest patches.
I'd advise new users to do an original design with an architect, and think about scaling up while considering services you will be adding in the future. It's important to plan the security tightly and do a neat design and consider services such as BitLocker and other resources that will be needed.
I'd rate the solution at an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner