(dieser Artikel ist auch auf deutsch verfügbar)
I was curious how you can connect an on-premise domain to multiple clouds, especially to global Azure and Azure Germany. So I tried it, and here is the result…
Maybe a few words at the beginning on why you might want to do this… The Microsoft Cloud Germany comes with a separate Azure Active Directory, so users that exist in the Azure AAD are completely unknown to the AAD of Azure Germany, and vice versa. So any authentication of those (global) users to services in Azure Germany is not possible, and – again – vice versa. Maybe there is a way to have users in both AADs? That was exactly the starting point for this blogpost.
To make that very clear from the beginning: Users cannot have the same username in global Azure and Azure Germany. User names in AAD always consist of the username itself and a domain name, and the domain name is different: For global Azure this is „onmicrosoft.com“ and for Azure Germany it is „onmicrosoft.de„. So the user „email@example.com“ is definitely not part of the Azure Germany AAD…
But how about additional domains? Can I add „demobag.de“ to global Azure? Yes you can, but those domains can only be added to one tenant at the same time. If you add the domain to global Azure, the user „firstname.lastname@example.org“ can login to global Azure, but when you try to add the same domain also to your Azure Germany tenant it will fail. Or the other way round, when you add this domain to Azure Germany, you cannot add it at the same time to global Azure. „email@example.com“ would then be able to login to Azure Germany but not to global Azure. (Just to make it clear here: the „.de“ ending for additional domains can be used in both AADs, same is true for any other top level domain).
From a technical perspective you can have the sync tool „ADConnect“ running on more than one server in your domain. And you can use a filter to define which accounts should be synchronized, for example based on OrganizationalUnits OU. Problem here is that you can’t sync the same user with the same login name to different environments, as stated above. There might be even more than one way to solve this (rename users etc), the one that I tried is to use different UPN suffixes in the local domain.
UPN suffixes? Remember? Quite easy: By default the so called UserPrincipalName (UPN) in an (on-premise) AD aligns to the DNS name of the domain (roughly speaking). So if the AD domain is called „DEMOBAG“ and the DNS name is „demobag.de„, then the login name of a user is „firstname.lastname@example.org„. You can add more UPN suffixes (the part after the „@“) in your local domain, so users within the same domain can have different login name parts after the „@“. It would be possible for example to have some users with a login „@germany.demobag.de“ and other users with „@global.demobag.de„, but all users are part of the „DEMOBAG“ domain. And that’s what I did. For a better overview here is a picture:
As you can see all the users in „OU=germany“ have the UPN suffix „@germany.demobag.de„, and in „OU=global“ users have „@global.demobag.de„. The UPN suffix is assigned per user and does not depend on the OU, this was just easier to handle and easier to define a filter on this (see later).
How does this help me?
By using the UPN suffix we have something that looks like a subdomain (but is still one AD domain). With this trick we can add the two „subdomains“ germany.demobag.de and global.demobag.de to different Azure tenants, for example the germany.demobag.de to the subscription in Azure Germany and global.demobag.de to a different subscription in global Azure.
When we set up a synchronization between local AD and Azure AD (or better: two synchronizations – one for each Azure environment) users from our local domain with a login name like „email@example.com“ can use the same name to login to Azure Germany (and even the same password if you chose to sync those, too).
And of course other users of our local domain with a name like „firstname.lastname@example.org“ can also use the same name to login to Azure global. But keep in mind that we still have this restriction that a user can only exist in one of the two AAD directories, and that the login doesn’t work for the ‚other‘ environment, so „email@example.com“ can’t login to Azure and „firstname.lastname@example.org“ can’t login to Azure Germany.
Just do it
Now for the details. I’ll use the domain demobag.de (because I can manage the DNS server for that domain, which is important for later…).
Step 1: Subscriptions
We need two subscriptions, one in global Azure and one in Azure Germany. For this example I created „demobag.onmicrosoft.com“ on the page https://account.windowsazure.com/organization, and the second tenant „demobag.onmicrosoft.de“ on https://account.windowsazure.de/organization (please note that both links have only a different ending .com vs. .de!).
Step 2: The DNS thing
For the DNS management we need the two DNS subdomains „germany“ and „global„, and our always helpful and friendly DNS master can do this hopefully (I’m skipping this step since there are so many different tools to do this and I’m sure your DNS admin knows what and how to do). Just to make clear: We are only creating DNS subdomains, no AD domain, we will continue to use only „DEMOBAG“ or „demobag.de„.
Step 3: Add DNS domains to AAD
I did this before in another blogpost, here is the short form: Login to global Azure, add the domain „global.demobag.de„, and Azure will give us a test DNS record that we have to add to our DNS server (and again your friendly DNS master knows how to do this, it’s easy). The idea is that when you can administer the DNS server of a domain, that domain most likely belongs to you. After you entered the test record in your DNS server, initiate the verification in Azure. When Azure finds the expected test record it takes it as a proof that the domain is yours. Do the same with Azure Germany by adding „germany.demobag.de„, edit the DNS server and let Azure Germany verify it. Now you are ready for ADConnect…
Step 4: ADConnect – finally
I also did the setup for ADConnect before in this article so I will skip this here – it’s easy anyways. Be aware that you need two servers in your domain (and please for security reasons don’t use the domain controller): One for ADConnect to Azure, and one for ADConnect to Azure Germany. It’s the same software, but a different configuration. ADConnect picks the right environment based on the login name (onmicrosoft.de or onmicrosoft.com). Make sure that you define a correct filter: The two syncs have to be mutually exclusive, for our example we sync the „OU=global“ to Azure and „OU=germany“ to Azure Germany. Since users can only be in one of the OUs, this makes sure that also the users will by sync’ed only to one of the AAD.
Step 5: Test
After a successfull synchronisation all users of the OU „germany“ with a UPN suffix „germany.demobag.de“ can login to Azure Germany, for example at the Azure Germany Management Portal by using their normal domain user, like „email@example.com„.
Same is true for users of the OU „global“ with the UPN suffix „global.demobag.de„. They can login at the global Azure Management Portal with their normal usernames, like „firstname.lastname@example.org„. I’m sure you noticed that these are different portals…
Step 6: Documentation
Nobody does this anyways, it is here just for completeness 🙂 and an overview picture that hopefully says more than a thousand words…
Using different UPN suffixes enables us to (kind of) simulate subdomains, and to sync a single AD domain into different Azure ADs by using multiple ADConnect instances. Separation of users is done by using filters, for example based on OU.
If you want to test it, you can do this completely in Azure (no matter in which one :-)). Just deploy 3 VMs: A domain controller, 2 member servers for two ADconnects, that’s it. And that’s exactly how I did it…