Many organizations want to take advantage of Azure Virtual Desktop to create environments that have multiple on-premises Active Directory forests.
This article expands on the architecture that's described in the Azure Virtual Desktop at enterprise scale article. It's intended to help you understand how to integrate multiple domains and Azure Virtual Desktop by using Microsoft Entra Connect to sync users from on-premises Active Directory Domain Services (AD DS) to Microsoft Entra ID.
Download a Visio file of this architecture.
In this architecture, the identity flow works as follows:
- Microsoft Entra Connect syncs users from both CompanyA.com and CompanyB.com to a Microsoft Entra tenant (NewCompanyAB.onmicrosoft.com).
- Host pools, workspaces, and app groups are created in separate subscriptions and spoke virtual networks.
- Users are assigned to the app groups.
- Azure Virtual Desktop session hosts in the host pools join the domains CompanyA.com and CompanyB.com by using the domain controllers (DCs) in Azure.
- Users sign in by using either the Azure Virtual Desktop application or the web client with a User Principal Name (UPN) in the following format: user@NewCompanyA.com, user@CompanyB.com, or user@NewCompanyAB.com, depending on their configured UPN suffix.
- Users are presented with their respective virtual desktops or applications. For example, users in CompanyA are presented with a virtual desktop or application in Workspace A, host pool 1 or 2.
- FSLogix user profiles are created in Azure Files shares on the corresponding storage accounts.
- Group Policy Objects (GPOs) that are synced from on-premises are applied to users and Azure Virtual Desktop session hosts.
This architecture uses the same components as those listed in Azure Virtual Desktop at enterprise scale architecture.
Additionally, this architecture uses the following components:
Microsoft Entra Connect in staging mode: The Staging server for Microsoft Entra Connect topologies provides additional redundancy for the Microsoft Entra Connect instance.
Azure subscriptions, Azure Virtual Desktop workspaces, and host pools: You can use multiple subscriptions, Azure Virtual Desktop workspaces, and host pools for administration boundaries and business requirements.
This architecture diagram represents a typical scenario that contains the following elements:
- The Microsoft Entra tenant is available for a new company named NewCompanyAB.onmicrosoft.com.
- Microsoft Entra Connect syncs users from on-premises AD DS to Microsoft Entra ID.
- Company A and Company B have separate Azure subscriptions. They also have a shared services subscription, referred to as the Subscription 1 in the diagram.
- An Azure hub-spoke architecture is implemented with a shared services hub virtual network.
- Complex hybrid on-premises Active Directory environments are present with two or more Active Directory forests. Domains live in separate forests, each with a different UPN suffix. For example, CompanyA.local with the UPN suffix CompanyA.com, CompanyB.local with the UPN suffix CompanyB.com, and an additional UPN suffix, NewCompanyAB.com.
- Domain controllers for both forests are located on-premises and in Azure.
- Verified domains are present in Azure for CompanyA.com, CompanyB.com, and NewCompanyAB.com.
- GPO and legacy authentication, such as Kerberos, NTLM (Windows New Technology LAN Manager), and LDAP (Lightweight Directory Access Protocol), is used.
- For Azure environments that still have dependency on-premises infrastructure, private connectivity (Site-to-site VPN or Azure ExpressRoute) is set up between on-premises and Azure.
- The Azure Virtual Desktop environment consists of an Azure Virtual Desktop workspace for each business unit and two host pools per workspace.
- The Azure Virtual Desktop session hosts are joined to domain controllers in Azure. That is, CompanyA session hosts join the CompanyA.local domain, and CompanyB session hosts join the CompanyB.local domain.
- Azure Storage accounts can use Azure Files for FSLogix profiles. One account is created per company domain (that is, CompanyA.local and CompanyB.local), and the account is joined to the corresponding domain.
Note
Active Directory Domain Services is a self-managed, on-premises component in many hybrid environments, and Microsoft Entra Domain Services provides managed domain services with a subset of fully compatible, traditional AD DS features such as domain join, group policy, LDAP, and Kerberos/NTLM authentication. For a detailed comparison of these components, see Compare self-managed AD DS, Microsoft Entra ID, and managed Microsoft Entra Domain Services.
The solution idea Multiple Azure Virtual Desktop forests using Microsoft Entra Domain Services discusses architecture that uses cloud-managed Microsoft Entra Domain Services.
Here are a few relevant use cases for this architecture:
- Mergers and acquisitions, organization rebranding, and multiple on-premises identities
- Complex on-premises active directory environments (multi-forest, multi-domains, group policy (or GPO) requirements, and legacy authentication)
- On-premises GPO infrastructure with Azure Virtual Desktop
When you're designing your workload based on this architecture, keep the following ideas in mind.
To extend GPO infrastructure for Azure Virtual Desktop, the on-premises domain controllers should sync to the Azure infrastructure as a service (IaaS) domain controllers.
Extending GPO infrastructure to Azure IaaS domain controllers requires private connectivity.
The domain controllers are shared components, so they need to be deployed in a shared services hub virtual network in this hub-spoke architecture.
Azure Virtual Desktop session hosts join the domain controller in Azure over their respective hub-spoke virtual network peering.
The following design considerations apply to user profile containers, cloud cache containers, and MSIX packages:
You can use both Azure Files and Azure NetApp Files in this scenario. You choose the right solution based on factors such as expected performance, cost, and so on.
Both Azure Storage accounts and Azure NetApp Files are limited to joining to one single AD DS at a time. In these cases, multiple Azure Storage accounts or Azure NetApp Files instances are required.
In scenarios with users in multiple on-premises Active Directory forests, only one Microsoft Entra Connect Sync server is connected to the Microsoft Entra tenant. An exception to this is a Microsoft Entra Connect server that's used in staging mode.
The following identity topologies are supported:
- Multiple on-premises Active Directory forests.
- One or more resource forests trust all account forests.
- A full mesh topology allows users and resources to be in any forest. Commonly, there are two-way trusts between the forests.
For more details, see the Staging server section of Microsoft Entra Connect topologies.
This article is maintained by Microsoft. It was originally written by the following contributors.
Principal author:
- Tom Maher | Senior Security and Identity Engineer
For more information, see the following articles: