SAMIT: Do You Really Need Active Directory
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
But If AD doesn't - then what does? I mean - the workstation only checks the DC for these files in a very specific location IF it's a member of AD (granted could be MS or Linux based AD)... otherwise the workstation won't do that.
Well there are two ways to look at this.
What does it? It's the local workstation. Windows is "pull" management as an ecosystem. The workstations are self managed, they are not managed by a server (AD or otherwise.) You can replace this mechanism, but not while staying as part of the "MS Windows Server ecosystem". You can still use Windows Servers, but not in the "Microsoft way." But there is nothing wrong with pull management, that's the standard for every desktop OS. It's a viable approach and is relatively resource light.
What provides the mechanism for this? That's Windows SMB (aka Windows Server.) Confusingly, SMB services from Windows Server is literally called Windows Server! Yes, the same name as the parent product. Facepalm. But to keep it straight, we generally call it the Windows File Server or the WIndows SMB Server, not just Windows Server.
It's an historic artefact that when Windows Server and the SMB service were first introduced, the idea what that Windows Server only had one function in the first place.
-
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Now - using Salt/Ansible/RMM to centrally manage GPO, OK - now we're talking about actual potential replacements.
No, now you are onto a different topic. There is a different. GPO is one tool for managing desktop functions. Salt, Ansible, SMB are different tools for managing GPO. None of those are AD or the topic here.
Did you even read the sentence you quoted? The quoted part is not talking about directory services (AD) it's specifically talking about GPOs
-
@Obsolesce said in SAMIT: Do You Really Need Active Directory:
Yeah, you can replace it all. There's no doubt there and I don't think anyone was saying otherwise. The question is how much trouble do you go through to replace something working with a bunch of different things and to manage/maintain it all.
Yes, and that's why replacing any working system is difficult (aka brownfield.) In a greenfield, it's pretty darn easy. Easier, in lots of cases.
The thing that is hardest is the "replace" word here. That's where the challenges tend to be. In lots of environments, and truly most environments that I run across, the simplest answer is literally to not replace, but to remove. GPO is often more of a problem than it is worth, it is non-deterministic, doesn't work well in a disparate network, and is very complicated to manage. It actually struggles to add value over "having nothing" for lots, and lots of companies.
So literally the most common answer is "how do I replace X" component from the Windows Server ecosystem is truly "you don't."
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
why would you even have OD if you can prevent local storage of files?
That statement makes no sense. If you prevent local storage you have to have a service like OD to access files.
-
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
If you have questions unrelated or loosely related to AD like "what are good ways to replace Windows Server components in a Windows desktop world while retaining tight control and visibility of individual workstations", that should be its own thread.
yeah - we need a more useful thread like "if even needed, and not going BYOD, how do I replace all the components that go along with Windows AD (i.e. directory services, workstation settings management).
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
But basically - you are saying - BYOD all the things, and just not give a shit about the end device at all...
But you still have regulations, the reason you're running an SIEM.Not BYOD and have standard builds with restricted permissions, but you dont really push anything because they are just a basic OS that lets you access resources. You let them update on their own.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
And is it really GPO if you're using Salt/Ansible/RMM to set registry keys, and not the GPO tool and the XML files it generates? I mean the end goal is the same, sure, but the tech to get there is slightly different - I think.
No, it is definitely not GPO if you are using PS to set the registry. That highlights why GPO is often not to be maintained, because there are other, often better ways to handle it. GPO isn't the end all of value. That said, though, you can use Salt / Ansible / PowerShell to do set GPOs, or to bypass them. Most people use the GPO approach because of momentum of conversations like this - people get convinced that they need GPO, so they want tools to automate GPO rather than starting from the goal and figuring out how to achieve it.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Sure - because, as stated a moment ago - almost no one ever talks about AD - but they are talking about AD DS or whatever you want to call the total and complete bundle of things that come with the Windows Server license that typical shops use.
AD DS is 20% of AD, it's more specific and under the hood, not less specific and under the hood. It's actually making the discussion worse, not better.
Imagine if we called every single thing on Linux "Apache" because Linux often ships with Apache. Imagine calling Samba, DNS, and LibreOffice "Apache" and just going "everyone means everything when they say Apache?"
Then how the heck do they talk about Apache? No wonder every Windows admin is confused, if your claim is true - not a single Windows admin knows any Windows component, feature, or functionality? That's crazy. How do they function? How do they communicate? No wonder so many Windows components get rolled out when they are not needed if everyone thinks that it's all one thing and none of it has a name or known purpose!
As you mention - GPOs is nothing more than files on a SMB file share, it's not really an installed thing - it becomes "enabled" for lack of a better work only after a PC has joined a domain.
I wonder if a workstation can be hacked to look for a directory that houses the GPO files and integrate them without being a domain member? i.e. is there a registry key for that? lol
Uh, what?
Why would anyone want to do that? If you hacked a system you just scan the registry (if you care, but unlikely).
-
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
So literally the most common answer is "how do I replace X" component from the Windows Server ecosystem is truly "you don't."
How do you replace the functionality of auto deployed printers - you don't, you make the users add them manually when needed... yeah that sounds awesome.
No - of course, you're going to tell me, uh, duh of course not, we use powershell to push it out to all the workstations. or an RMM, but you see, those are things that REPLACED powershell. The only not replacement is the user doing it themselves, or the IT staff visiting the workstations doing it for the users (physically or remotely).
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Scott keeps mentioning that as an MSP he doesn't need AD - and that I would agree, his clients, because NTG is an MSP, AD (and the other associated things) aren't designed to work from a central situation across different customers - but - so what? that's not the use case any one here is really talking about - Except Scott. But we'll leave that lie.
Is that true? Does everyone else see the world of IT purely from a "single large LAN" perspective without exception? There are no VPNs? No remote workers? No outside consultants? No multi-organizational entities?
Because as an MSP, I deal with this within individual clients, most individual clients, not just between clients. AD is a problem in every org I deal with. Mostly because of being multiple sites or having remote users. Everything from small vet clinics and doctors offices to tiny funeral homes to multi-state manufacturing. The overhead of AD and Windows Server ecosystem is high, the benefits are low, and it's not designed around how modern companies are built, or modern workers expect to work.
My MSP perspective should represent a massive percentage of the field. But beyond that, my non-MSP perspective maintains the same view.
-
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
why would you even have OD if you can prevent local storage of files?
That statement makes no sense. If you prevent local storage you have to have a service like OD to access files.
Thanks for pulling a scott and not reading the followup where I answered my own question - but left it there anyways for other people who might have had the same thought I originally did.
that said - the file is still saved locally - in the cache of OD. I don't believe you can work locally with a non cached file.
I'm prepared to be wrong that account though if you have an article from MS stating as much. -
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
why would you even have OD if you can prevent local storage of files?
That statement makes no sense. If you prevent local storage you have to have a service like OD to access files.
Thanks for pulling a scott and not reading the followup where I answered my own question - but left it there anyways for other people who might have had the same thought I originally did.
that said - the file is still saved locally - in the cache of OD. I don't believe you can work locally with a non cached file.
I'm prepared to be wrong that account though if you have an article from MS stating as much.Why would you need to use Desktop Office? Why not use Office Online?
-
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
But basically - you are saying - BYOD all the things, and just not give a shit about the end device at all...
But you still have regulations, the reason you're running an SIEM.Not BYOD and have standard builds with restricted permissions, but you dont really push anything because they are just a basic OS that lets you access resources. You let them update on their own.
I could definitely see this working in a 1 to 1 situation because there would be so little to manage.. and once the user is setup, they aren't likely going to need much IT support. But in a shared environment, it gets stickier.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
I'm gathering that Scott is of the opinion that most offices would just have a single user setup on each PC, Scott, as the IT or MSP would have an admin account on that machine (again local only) and everything else would be setup as LANless as possible.
Only insofar as to state that that is one extremely viable and common option among countless. The problem that I'm having is that you are approach AD from a "here is the tool, how else do I solve the unknown problem". You aren't starting with a problem to fix or a goal to achieve and asking how to do it. You are starting with a solution or an approach and asking how else to do what it does, while not clearly stating what exact thing it does you want to replacate or, way better, explaining what goal it was believed to have achieved.
You are working from a cart before the horse perspective. You are starting from AD, and especially in the context of us having said that you simply don't need it, and asking how to replace it - already knowing that its not needed (all the time.) So if something isn't needed, the best replacement is to simply not replace it.
There is no universal tool in IT (or life.) There is no product or approach in IT that we can start from without knowing the goals. We always have to work from specific goals and work backwards to find the right tools or solutions. We can't work from the tools and decide on the "right tool" for an unknown job.
-
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
why would you even have OD if you can prevent local storage of files?
That statement makes no sense. If you prevent local storage you have to have a service like OD to access files.
Thanks for pulling a scott and not reading the followup where I answered my own question - but left it there anyways for other people who might have had the same thought I originally did.
that said - the file is still saved locally - in the cache of OD. I don't believe you can work locally with a non cached file.
I'm prepared to be wrong that account though if you have an article from MS stating as much.Why would you need to use Desktop Office? Why not use Office Online?
Because it gives you a reason to have OD installed - if you don't have any local apps using the files - then OD is pointless (at least the local application) Your files are just 'in the cloud' sure personal files are in something called OD, and shared are in Sharepoint - but again, nothing local.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
why would you even have OD if you can prevent local storage of files?
That statement makes no sense. If you prevent local storage you have to have a service like OD to access files.
Thanks for pulling a scott and not reading the followup where I answered my own question - but left it there anyways for other people who might have had the same thought I originally did.
that said - the file is still saved locally - in the cache of OD. I don't believe you can work locally with a non cached file.
I'm prepared to be wrong that account though if you have an article from MS stating as much.Why would you need to use Desktop Office? Why not use Office Online?
Because it gives you a reason to have OD installed - if you don't have any local apps using the files - then OD is pointless (at least the local application) Your files are just 'in the cloud' sure personal files are in something called OD, and shared are in Sharepoint - but again, nothing local.
@Obsolesce would probably know for sure, but I think you can encrypt that partition and require authentication to access it.
I would however not even bother with it. Train them to use Office Online and your OS dependency completely goes away.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
If that's not the case - then I really cant envision Scott's typical ideal setup?
DING DING DING
There is no ideal setup. IT isn't a checkbox. There can't be, IT would have no purpose if there was a single ideal setup. IT is a business endeavor. The moment that there is one ideal setup, you don't need IT at all, there is one script to follow and a monkey could do it.
IT is complex and creative. We are like any business people... we are given problems, and we work to best solve them. Thinking that there is one solution to rule them all will always cause confusion and disaster.
You can certainly find prototype solutions that work for common scenarios really well. AD + GPO + LAN + SMB is one of those sample sets, it's easy to produce contrived environmental examples where that is a really great fit, and trivial to show contrived ones where it is absolutely insane. It's pretty trivial to show any example falling down somewhere. Which is not a bad thing, it just demonstrates that there can't be a single solution and we shouldn't seek one.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical
chargeschairs daily - now what?We've covered this before, but...
- Now you are adding more and more "trying to find a situation where AD is valuable." That you have to keep making it more and more specific is proving the point that it is not blanket valuable. No one is arguing that it has a use case, it's that it isn't anywhere close to being an "always" or a "requirement" or possibly even the majority case. That people need to move around an office falls under "common" but "far short of average." It's not niche, but it is a minority case.
- This is specifically AD's strong suit, no question. This is specifically what it was built for, mobile workers on a single LAN, on Windows homogeneously. Make it not any of those things, and it all falls apart to quite a degree. A niche in today's world.
- You can do this with scripts, it's not nearly as hard as people think. If this is your environment, you can build scripts to do this really quickly. In fact, I bet you can automate this without AD faster than you can with AD. We have O365 customers where we have to automate this and yes, that's harder than AD automation, but it's a million times worse than local scripts. Scripts always sound like a kludge, but really, what's AD other than tons of really good, well reviewed scripts (basically.)
- There are third part products that do this well. Basically doing #3 for you.
- Salt / Ansible and their ilk provide built in mechanisms for this.
- If your users go off network, how does AD handle it? It doesn't it falls down.
- MDM products could have this, I assume some do, but I've not looked.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Obsolesce said in SAMIT: Do You Really Need Active Directory:
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Obsolesce said in SAMIT: Do You Really Need Active Directory:
So, if you get rid of AD, you'll also be getting rid of Group Policy and whatever else is in use with it. So, you'll not just be replacing AD and that's it, typically.
That's not correct, though. GPO exists without AD. It's part of Windows itself. You can, and still do, use it even when AD isn't there. That's part of the continuing myth that not only the part you point out that AD doesn't do what people think, but the second part is that the things that people think depend on AD, don't actually. SMB, GPO, etc. they all keep working without AD.
Right, but you know I wasn't talking about Local group policy.
Then the point becomes moot because getting right of non-local group policy doesn't matter, as you still have group policy.
If you only meant AD, what was the point of the statement? It basically says "without AD, you don't have AD", back to my point of being circular. Consistently the argument seems to be "AD for AD's sake".
you don't have centrally managed Group Policy - but your retort is that you that you can - just use salt or ansible or RMM, right?
My retort is that state machines can be used to set GPO, or they can be used to bypass GPO. They can meet the "goal" requirements, and/or they can meet the "interim assumed approach". They cover both bases.
-
@IRJ said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Toss in a situation where many users must be able to use nearly any computer in the office at any time - and now what? really - how do you manage that?
100 desktops, 100 users, and they play musical charges daily - now what?
Everything they access of value is cloud based, so you only care about authentication to that service not authentication to the local system.
You can prevent users from storing files locally on OD for example and in that case if their workstation is compromised none of the data is sensitive.
These are great "change it all" approaches. Which when thinking at the goal level is ideal... don't try to make old assumptions work.
This is more of a greenfield thinking approach. If we approach more brownfield, we can still keep a lot of the existing file shares and working models, without needing AD to handle the passwords. Meaning, we can retain desktop security in a similar way if we need to. Or we can abandon as many now do.