Update June 2021: I’m surprised I have to say this, but technology changes rapidly in the cloud and this was a comparison of the technologies at a point in time. Please reference the latest official documentation for both products to understand capabilities and features and how they compare at the time you are reading this post.
Over the past year I’ve done deep dives into both Amazon’s AWS Managed Microsoft Active Directory and Microsoft’s Azure Active Directory Domain Services. These services represent each vendor’s offering of a managed Windows Active Directory (AD) service. I extensively covered the benefits of a service over the course of the posts, so today I’m going to cover the key features of each service. I’m also going to include two tables. One table will outline the differences in general features while the other outlines the differences in security-related features.
Let’s hit on the key points first.
- Amazon provides a legacy (Windows AD is legacy folks) managed service while Microsoft provides a modernized service (Azure AD) which has been been integrated with a legacy service.
- Microsoft synchronizes users, passwords hashes, and groups from the Azure AD to a managed instance of Windows Active Directory. The reliance on this synchronization means the customer has to be comfortable synchronizing both directory data and password hashes to Azure AD. Amazon does not require any data be synchronized.
- Amazon provides the capability to leverage the identities in the managed instance of Windows AD or in a forest that has a trust with the managed instance to be leveraged in managing AWS resources. In this instance Amazon is taking a legacy service and enabling it for management of the modern cloud management plane.
- The pricing model for the services differs where Amazon bills on a per domain controller basis while Microsoft bills on the number of objects in the directory.
- Amazon’s service is eligible to be used in solutions that require PCI DSS Level 1 or HIPAA.
- Both services use a delegated model where the customer has full control over an OU rather the directory itself. Highly privileged roles such as Schema Admin, Enterprise Admins, and Domain Admins are maintained by the cloud provider.
- Both services provide LDAP for legacy applications customers may be trying to lift and shift. Microsoft limits LDAP to read operations while Amazon supports both read and write operations.
- Both services support LDAPS. At this time Amazon requires an instance of Active Directory Certificate Services be deployed to act as a Certificate Authority and provide certificates to the managed domain controllers.
- Both services do not allow the customer to modify the Default Domain Policy or Default Domain Controller Policies. This means the customer cannot modify the password or lockout policy applied to the domain. Amazon provides a method of enforcing custom password and lockout policies through Fine Grained Password Policies. Additionally, the customer does not have the ability to harden the OS of the domain controllers for either service so it is important to review the vendor documentation.
- Amazon’s service supports Active Directory forest trusts and external trusts. Microsoft’s service doesn’t support trusts at this time.
Here is a table showing the comparison of general features:
Features | AWS Managed Microsoft AD | Azure Active Directory Domain Services |
---|---|---|
Cost Basis | Number of Domain Controllers | Number of Directory Objects |
Schema Extensions | Yes, with limitations | No |
Trusts | Yes, with limitations | No |
Domain Controller Log Access | Security and DNS Server Event Logs | No |
DNS Management | Yes | Yes |
Snapshots | Yes | No |
Limit of Managed Forests | 10 per account | 1 per Azure AD tenant |
Supports being used on-premises | Yes with Direct Connect or VPN | No, within VNet only |
Scaled By Customer | Yes | No |
Max number of Domain Controller | 20 per directory | Unknown how service is scaled |
Here is a table of security capabilities:
Features | AWS Managed Microsoft AD | Azure Active Directory Domain Services |
---|---|---|
Requires Directory Synchronization | No | Yes, including password |
Fine-Grained Password Policies | Yes, limited to seven | No |
Smart Card Authentication | Not native, requires RADIUS | No |
LDAPS | Yes, with special requirements | Yes, but LDAP operations are limited to read |
LDAPS Protocols | SSLv3, TLS 1.0, TLS 1.2 | TLS 1.0, TLS 1.2 |
LDAPS Cipher Suites | RC4, 3DES, AES128, AES256 | RC4, 3DES, AES128, AES256 |
Kerberos Delegation | Account-Based and Resource-Based | Resource-Based |
Kerberos Encryption | RC4, AES128, AES256 | RC4, AES128, AES256 |
NTLM Support | NTLMv1, NTLMv2 | NTLMv1, NTLMv2 |
Well folks that sums it up. As you can see from both of the series as well as this summary post both vendors have taken very different approaches in providing the service. It will be interesting to see how these offerings evolve over the next few years. As much as we’d love to see Windows Active Directory go away, it will still be here for years to come.
Until next time my fellow geeks!