How To: Plan your hybrid Azure Active Directory join implementation
In a similar way to a user, a device is becoming another identity you want to protect and also use to protect your resources at any time and location. You can accomplish this goal by bringing your devices' identities to Azure AD using one of the following methods:
- Azure AD join
- Hybrid Azure AD join
- Azure AD registration
By bringing your devices to Azure AD, you maximize your users' productivity through single sign-on (SSO) across your cloud and on-premises resources. At the same time, you can secure access to your cloud and on-premises resources with conditional access.
If you have an on-premises Active Directory environment and you want to join your domain-joined devices to Azure AD, you can accomplish this by configuring hybrid Azure AD joined devices. This article provides you with the related steps to implement a hybrid Azure AD join in your environment.
This article assumes that you are familiar with the Introduction to device management in Azure Active Directory.
The minimum required domain functional and forest functional levels for Windows 10 hybrid Azure AD join is Windows Server 2008 R2.
Plan your implementation
To plan your hybrid Azure AD implementation, you should familiarize yourself with:
|Review supported devices|
|Review things you should know|
|Review how to control the hybrid Azure AD join of your devices|
|Select your scenario|
Review supported devices
Hybrid Azure AD join supports a broad range of Windows devices. Because the configuration for devices running older versions of Windows requires additional or different steps, the supported devices are grouped into two categories:
Windows current devices
- Windows 10
- Windows Server 2016
- Windows Server 2019
For devices running the Windows desktop operating system, the supported version is the Windows 10 Anniversary Update (version 1607) or later. As a best practice, upgrade to the latest version of Windows 10.
Windows down-level devices
- Windows 8.1
- Windows 7
- Windows Server 2012 R2
- Windows Server 2012
- Windows Server 2008 R2
As a first planning step, you should review your environment and determine whether you need to support Windows down-level devices.
Review things you should know
You can't use a hybrid Azure AD join if your environment consists of a single forest that synchronized identity data to more than one Azure AD tenant.
If you are relying on the System Preparation Tool (Sysprep), make sure images created from an installation of Windows 10 1803 or earlier have not been configured for hybrid Azure AD join.
If you are relying on a Virtual Machine (VM) snapshot to create additional VMs, make sure you use a VM snapshot that has not been configured for hybrid Azure AD join.
Hybrid Azure AD join of Windows down-level devices:
- Is supported in non-federated environments through Azure Active Directory Seamless Single Sign-On.
- Is not supported when using Azure AD Pass-through Authentication without Seamless Single Sign On.
- Is not supported when using credential roaming or user profile roaming or when using virtual desktop infrastructure (VDI).
The registration of Windows Server running the Domain Controller (DC) role is not supported.
If your organization requires access to the Internet via an authenticated outbound proxy, you must make sure that your Windows 10 computers can successfully authenticate to the outbound proxy. Because Windows 10 computers run device registration using machine context, it is necessary to configure outbound proxy authentication using machine context.
Hybrid Azure AD join is a process to automatically register your on-premises domain-joined devices with Azure AD. There are cases where you don't want all your devices to register automatically. If this is true for you, see How to control the hybrid Azure AD join of your devices.
If your Windows 10 domain joined devices are already Azure AD registered to your tenant, we highly recommend removing that state before enabling Hybrid Azure AD join. From Windows 10 1809 release, the following changes have been made to avoid this dual state:
- Any existing Azure AD registered state would be automatically removed after the device is Hybrid Azure AD joined.
- You can prevent your domain joined device from being Azure AD registered by adding this registry key - HKLM\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin, "BlockAADWorkplaceJoin"=dword:00000001 .
- This change is now available for Windows 10 1803 release with KB4489894.
FIPS-compliant TPMs aren't supported for Hybrid Azure AD join. If your devices have FIPS-compliant TPMs, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.
Review how to control the hybrid Azure AD join of your devices
Hybrid Azure AD join is a process to automatically register your on-premises domain-joined devices with Azure AD. There are cases where you don't want all your devices to register automatically. This is for example true, during the initial rollout to verify that everything works as expected.
For more information, see How to control the hybrid Azure AD join of your devices
Select your scenario
You can configure hybrid Azure AD join for the following scenarios:
- Managed domains
- Federated domains
If your environment has managed domains, hybrid Azure AD join supports:
- Pass Through Authentication (PTA)
- Password Hash Sync (PHS)
Azure AD does not support smartcards or certificates in managed domains.
Beginning with version 1.1.819.0, Azure AD Connect provides you with a wizard to configure hybrid Azure AD join. The wizard enables you to significantly simplify the configuration process. For more information, see:
- Configure hybrid Azure Active Directory join for federated domains
- Configure hybrid Azure Active Directory join for managed domains
If installing the required version of Azure AD Connect is not an option for you, see how to manually configure device registration.
On-premises AD UPN support in Hybrid Azure AD join
Sometimes, your on-premises AD UPNs could be different from your Azure AD UPNs. In such cases, Windows 10 Hybrid Azure AD join provides limited support for on-premises AD UPNs based on the authentication method, domain type and Windows 10 version. There are two types of on-premises AD UPNs that can exist in your environment:
- Routable UPN: A routable UPN has a valid verified domain, that is registered with a domain registrar. For example, if contoso.com is the primary domain in Azure AD, contoso.org is the primary domain in on-premises AD owned by Contoso and verified in Azure AD
- Non-routable UPN: A non-routable UPN does not have a verified domain. It is applicable only within your organization's private network. For example, if contoso.com is the primary domain in Azure AD, contoso.local is the primary domain in on-premises AD but is not a verifiable domain in the internet and only used within Contoso's network.
The table below provides details on support for these on-premises AD UPNs in Windows 10 Hybrid Azure AD join
|Type of on-premises AD UPN||Domain type||Windows 10 version||Description|
|Routable||Federated||From 1703 release||Generally available|
|Routable||Managed||From 1709 release||Currently in private preview. Azure AD SSPR is not supported|
|Non-routable||Federated||From 1803 release||Generally available|
Send feedback about: