Performing a Staged Rollout of Cloud Authentication in Office 365 from Federated

With features such as Pass Through Authentication (PTA) available in AD Connect, there are really very few use cases for ADFS federation any more. I encourage anyone still using ADFS for Office 365 / Azure AD to review if they still need to maintain (a minimum) of four ADFS servers and a number of firewall ports inbound (to DMZ). In the past moving from ADFS wasn’t overly difficult but did carry some risk as each domain needed to be converted to manually, not allowing for granular rollout to specific users for testing. This was particularly worrying for very large organizations who need to test changes before potentially impacting thousands of users. One workaround to test moving away from ADFS was to use a lightly used domain to convert first, testing with a smaller user count but not every organization have a domain already federated with a small amount of users assigned.

To make this process easier, last year Microsoft added support for staged rollout of cloud authentication, allowing you to move users from federated authentication to managed without cutting over the entire domain. This also opens up the possibility to test out some of the cool Identity Protection features available through Azure AD on a select group without impacting users. We can use this method for up to 50,000 users so our test cases should be more than achievable.

Configure AD Connect

Before getting started, ensure that your chosen target authentication method has been configured on your AD Connect servers. Supported scenarios are Password Hash, Pass-Through Authentication and Seamless Single Sign-on. You can check or configure this in the AD Connect Wizard Optional Features page as shown in Figure 1.

Figure 1: Configure Password Hash Sync on the Optional Features page

Create a Group to Scope the Change

To scope the change from federated to managed, create a new Azure AD Security Group similar to the one in Figure 2.

Figure 2: Create a new Azure AD Security Group and add your users

Enable Staged Rollout

Next, to enabled staged rollout for the group we created, open Azure AD and navigate to “AD Connect” -> “Enable staged rollout for managed user sign-in”. From here you can enable the features you want and specify the security group that your created previously as shown in Figure 3.

Figure 3: Enable Staged Rollout of your chosen features for the Group you created

And that’s it, you can rollout to whoever you see fit for testing. Just remember if you are performing a full cutover at the end to convert the domain to managed and remove the pilot group.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s