on 04-18-2024 07:21 AM
This is an edited transcript of the 03.22.24 IT Hour
Rodger: Hi everybody, I appreciate the warm welcome to my inaugural IT Hour. So the question really is about shutting off Active Directory - decommissioning the domain controllers and disconnecting Active Directory from JumpCloud. The intention here is that you’ve migrated from Active Directory to JumpCloud but Active Directory is still connected to your JumpCloud environment and you have to figure out the process to deprecate Active Directory once and for all.
We have a lot of documentation about how to incorporate Active Directory, how to extend Active Directory to JumpCloud but we don’t have a ton of documentation about this last step. So we’re here today to help you through that last step.
There’s a fairly typical journey from Active Directory to JumpCloud:
So how do you actually cut that cord? What do you actually do? Here’s a few things to consider:
If you’re using Entra Connect, you’re propagating users from JumpCloud up to Entra using this tool. When we sever the connection between JumpCloud and JumpCloud , there’s going to be an issue because your users sitting in Entra are actually JumpCloud sync users that are controlled by JumpCloud. So prior to cutting the cord you absolutely must migrate your Entra users from JumpCloud to JumpCloud. We’re going to assume you’ve already configured your JumpCloud Cloud Directory connector for Entra. There’s a prescribed process from MS and this is how MS wants you to do it. So in your Entra Connect tool you’re monitoring specific OUs which are inside of your JumpCloud domain, that are determining the propagation of users to Entra.
My most stern recommendation is to test this and understand these steps before you actually process your entire user directory. So what the looks like is:
If you’ve deployed JumpCloud ADI with the Sync Agent installed, there’s a couple of options. Note - if you have only the Sync Agent, JumpCloud has total control over the password. If you have Import & Sync, we have shared control.
The Easy Way
The easy off button is that you literally just turn off your Domain Controllers (DC) and you’re done. It’ll work and nothing will happen to your environment. It’s not very pretty inside your environment though. You’re still going to see an ADI setup. You’ll still see the little “Active Directory” moniker on your users, but you know that you’ve shut the Active Directory DCs off.
The Clean Way
The cleaner way is a little bit more of a lift. And that is actually removing Active Directory from JumpCloud completely. You get Active Directory out of JumpCloud and then change the “Externally Managed” flag for that user with Powershell. We have to tell JumpCloud that that user is now just a straight JumpCloud user. There’s more information on how to to change the “Externally Managed” flag via Powershell here.
In this case your passwords are managed by Active Directory. JumpCloud doesn’t own that password. So you have to go through this process - You must remove Active Directory from JumpCloud and you must change the Externally Managed flag for those users. This is what the technical procedure looks like:
There’s a Help Center Article that has these commands and tells you how to do this. And you can find information about our Powershell Module and connecting to your org through Powershell.
And now we’ve cut the cord from Active Directory. Once you understand what the process is, it becomes a very simple thing to do. If you ever need to reincorporate Active Directory you would just go through the same process that you did the first time.
Q: But JumpCloud is super limited on attributes that it can sync, which can lead to issues where you may still need to use manual processes to set up accounts..
A: We are actively working on Active Directory synchronization. Fingers crossed for Q2 deployment of being able to do all attributes, including custom attributes, between Active Directory and JumpCloud. Um, this is the one environment that we are the most limited in our attributes today. Any SAS app that supports SCIM provisioning, the world is our oyster. It's specifically with the Active Directory Integration, where we have this limited set of attributes. But very, very soon you will see support for a significantly larger portion, including custom attributes.
Q: What about device management?
A: The Active Directory Integration is about user management and the ability to sync users. Part of the process to shrink the Active Directory footprint is to move the end user devices to JumpCloud device management. So that would probably come before you pulled the plug on user synchronization. We even have an Active Directory Migration Utility (Active DirectoryMU) that programmatically converts the Active Directory user on the machine to a local user, removes the machines from Active Directory, installs the JumpCloud Agent, and then associates a jumpcloud user to that local user, which binds the machine to a user inside JumpCloud.
Q: There’s a gap that I hope JumpCloud can cover - the concept of shared devices, being able to log into any device on the domain.
A: I think what you’re talking about is roaming profiles. Roaming profiles are really an aspect specifically of Active Directory from an era where we primarily had physical servers, pre virtualization. Everybody had wired connections. Wifi was rare and everybody had desktop machines, or if they had a laptop, it was a big clunky laptop, right? And the idea of being on the same broadcast domain and everybody being physically in one space made a ton of sense and still to this day roaming profiles are really an aspect of Active Directory specifically.
So JumpCloud’s method for this is really more about auto binding users to all devices. We have lots of customers who are running medical facilities and whatnot. And they have 20 people, 20 machines. Everybody logs into whatever machine they want. So the intention here is you can easily set up a user group that's called “All Users”. And then you can set up a device group that's called “All Windows Devices”, and you can cross bind those two groups together. And now all the users from that user group will automatically be bound to all devices.
Then users can now log into each device. Of course, this is not a roaming profile. So they're Desktop isn't necessarily following them, but this works really well in the modern era where everything is done online. The vast majority of companies are just starting a browser. So if all you need to do is authenticate a user to a device and enforce MFA to log into that device and then let them start a browser, right? Having this individual profile on each machine is a really viable solution. We call it hot desking. That's kind of the new-ish term. The idea with hot desking is you just set this up automatically.
Nowadays, with JumpCloud, we have dynamic groups. You can have a dynamic group that's “All Windows Machines”. You set up a dynamic group that's “All Users” or all users of a certain department. That user can automatically be assigned to a group and then will automatically be provisioned to all 500 machines that you have. And then when you decommission that user, when you suspend that user within 60 seconds or so, they are suspended on every single one of those computers that cannot log in, their account is disabled.
So we have a solution. It doesn't exactly mirror roaming profiles, but I think as Active Directory becomes less and less prevalent, at some point, Active Directory will go away, and then the older concept of roaming profiles will go away as well.