Active Directory vs Entra ID
Comparison
Users
- Provisioning: users
- Active Directory: Organizations create internal users manually or use an in-house or automated provisioning system.
- Microsoft Entra ID: Adds support to automatically create users from cloud HR systems and provision identities in SCIM-enabled SaaS apps.
- Provisioning: external identities
- Active Directory: Organizations create external users manually as regular users in a dedicated external forest.
- Microsoft Entra ID: Provides a special class of identity to support external identities, managed via Microsoft Entra B2B.
- Entitlement management and groups
- Active Directory: Administrators make users members of groups; app/resource owners give groups access to apps/resources.
- Microsoft Entra ID: Administrators can assign membership to groups manually or dynamically and use Entitlement management for access control.
- Admin management
- Active Directory: Uses domains, organizational units, and groups to delegate administrative rights.
- Microsoft Entra ID: Provides built-in roles with role-based access control (RBAC) and supports Privileged Identity Management (PIM).
- Credential management
- Active Directory: Uses passwords, certificates, and smart card authentication; managed by password policies.
- Microsoft Entra ID: Uses intelligent password protection, multifactor authentication, and passwordless technologies; offers self-service password reset.
Apps
- Infrastructure apps
- Active Directory: Basis for many on-premises components like DNS, DHCP, etc.
- Microsoft Entra ID: New control plane for accessing apps with Conditional Access controls.
- Traditional and legacy apps
- Active Directory: Uses LDAP, NTLM, Kerberos, etc.
- Microsoft Entra ID: Provides access via Microsoft Entra application proxy.
- SaaS apps
- Active Directory: Requires federation systems like AD FS.
- Microsoft Entra ID: Supports OAuth2, SAML, WS-* authentication for SaaS apps.
- Line of business (LOB) apps with modern authentication
- Active Directory: Uses AD FS.
- Microsoft Entra ID: Configurable for modern authentication.
- Mid-tier/Daemon services
- Active Directory: Uses service accounts or group Managed Service Accounts (gMSA).
- Microsoft Entra ID: Provides managed identities for cloud workloads.
Devices
- Mobile
- Active Directory: Doesn’t natively support mobile devices without third-party solutions.
- Microsoft Entra ID: Integrated with Microsoft Intune for mobile device management.
- Windows desktops
- Active Directory: Supports domain join and management via Group Policy, etc.
- Microsoft Entra ID: Supports device join and management with Microsoft Intune.
- Windows servers
- Active Directory: Strong on-premises management capabilities.
- Microsoft Entra ID: Managed with Microsoft Entra Domain Services and managed identities.
- Linux/Unix workloads
- Active Directory: Doesn’t natively support non-Windows without third-party solutions.
- Microsoft Entra ID: Supports managed identities for cloud-based Linux/Unix VMs.
This post is licensed under CC BY 4.0 by the author.