Planning Azure AD Connect for multi-forest scenarios

more complex organizations it is common to have more than one Active Directory forest on-premises. For example, if an organization wants to implement account-resource forest topology, they will need to have two Active Directory forests. Another example for having two Active Directory forests is after there is a merger between an organization or acquisition.

Implementing directory synchronization between an on-premises environment with more than one Active Directory forest and an Azure AD tenant is a bit more complex than a scenario with only one Active Directory forest. However, Azure AD Connect supports connecting multiple forests to a single Azure AD tenant. A server that runs Azure AD Connect does not have to be joined to any domain locally, however, it must be able to access domain controllers in both forests.

In some cases, you can choose to place the Azure AD Connect server in a demilitarized zone (DMZ), especially if you do not have a direct network connection to all forests that you would like to include in the synchronization.

When planning for multi-forest scenarios, you need to consider the following:

  • If you have two or more forests, one instance of Azure AD Connect must be used to synchronize all forests to Office 365.
  • Only one instance of Azure AD Connect can be connected to an Office 365 tenant. You cannot connect multiple Azure AD Connect instances to one tenant.
  • If you want to synchronize one or more forests to multiple Office 365 tenants, you need to use multiple Azure AD Connect instances, one for each tenant. However, you must consider whether user objects are represented once, or multiple times across the connected forests.

When you have more than one Active Directory forest locally, you must configure directory synchronization so that a single object in Azure AD represents each user. When you run the Azure AD Connect Setup Wizard with an option to customize the configuration, you can configure options for this on the Uniquely identifying your users page.

On this page, you can select between several options. The default option is that users are represented only once across all directories. This scenario assumes that each user has only one account in the forest where the user is authenticated during sign in. Additionally, if you implement Exchange Server, this scenario assumes that the user has only one mailbox in the forest that has the best data quality for attributes published to a GAL.

Another option is to select that user identities exist across multiple directories. In this case, you must choose how to perform user matching. You can do it by using a mail attribute or by using the ObjectSID and msExchangeMasterAccountSID attributes for example.



要查看或添加评论,请登录

Mo . ????的更多文章

  • Tips for azure Monitor

    Tips for azure Monitor

    In the ever-evolving landscape of cloud computing, efficient monitoring is the key to maintaining optimal performance…

    2 条评论
  • Monitoring in Azure

    Monitoring in Azure

    If your organization asked you to design a monitoring strategy to cover all of its teIf your organization asked you to…

  • Sustainability and IT

    Sustainability and IT

    Over the past several years, organizations have had to adjust quickly to unprecedented, unpredictable pressures…

  • EU-U.S. data agreement an important milestone for data protection, Microsoft is committed to doing our part

    EU-U.S. data agreement an important milestone for data protection, Microsoft is committed to doing our part

    The newly announced Trans-Atlantic Data Privacy Framework between the EU and U.S.

  • Scrum : the Basics - Part 1

    Scrum : the Basics - Part 1

    the Agile Method Allow teams to self -Organize they will do a much better job working on the design and tests from the…

  • Azure Infra

    Azure Infra

    1-Azure Monitor collects two types of data: metrics and logs. Metrics are numerical values that describe some aspect of…

  • tips on hardening security with Azure security

    tips on hardening security with Azure security

    1-Classifying data that should be encrypted is commonly based on the impact it can have on customers if it is exposed…

    1 条评论
  • Connecting a local FortiGate to an Azure VNet VPN

    Connecting a local FortiGate to an Azure VNet VPN

    This recipe provides a sample configuration of a site-to-site VPN connection from a local FortiGate to an Azure VNet…

  • What is Azure AD Identity Protection?

    What is Azure AD Identity Protection?

    Microsoft claims that 60% of all successful attacks rely on compromised credentials, so extra care needs to be taken to…

  • History of the deployment models (Azure)

    History of the deployment models (Azure)

    #Azure originally provided only the classic deployment model. In this model, each resource existed independently; there…

社区洞察

其他会员也浏览了