Active Directory to Microsoft Entra ID Migration Center
The definitive resource for migrating from on-premises Active Directory to Microsoft Entra ID --- the Zero Trust identity control plane for CSA-in-a-Box and the modern enterprise.
Who this is for
This migration center serves federal CISOs, identity architects, IT administrators, platform engineers, and compliance officers who are evaluating or executing a migration from on-premises Active Directory to Microsoft Entra ID. Whether you are responding to Executive Order 14028 Zero Trust mandates, eliminating domain controller infrastructure, modernizing authentication from Kerberos/NTLM to OAuth/OIDC, preparing for Microsoft's June/July 2026 hard-match hardening enforcement, or establishing cloud-native identity as the foundation for CSA-in-a-Box deployment, these resources provide the evidence, patterns, and step-by-step guidance to execute confidently.
Quick-start decision matrix
Strategic resources
These documents provide the business case, cost analysis, and strategic framing for decision-makers.
| Document | Audience | Description |
| Why Entra ID over Active Directory | CIO / CISO / Board | Executive white paper covering Zero Trust mandate, passwordless authentication, Conditional Access, elimination of domain controller infrastructure, EO 14028, and Copilot integration |
| Total Cost of Ownership Analysis | CFO / CIO / Procurement | Detailed pricing comparison of on-prem AD infrastructure vs Entra ID licensing, ⅗-year projections, hidden cost analysis, and FTE reduction |
| Complete Feature Mapping | CISO / Identity Architect | 50+ AD features mapped to Entra ID equivalents with migration complexity ratings, gap analysis, and CSA-in-a-Box integration points |
Migration guides
Domain-specific deep dives covering every aspect of an AD-to-Entra-ID migration.
| Guide | AD capability | Entra ID destination |
| Hybrid Identity Migration | AD forests, trusts, sync | Entra Connect, Cloud Sync, PHS, PTA, federation |
| Cloud-Only Migration | On-prem user objects, SOA | Cloud-managed identities, de-federation |
| Device Migration | Domain-joined devices, GPO device config | Entra Join, Autopilot, Intune MDM |
| Application Migration | LDAP, Kerberos, AD FS apps | Graph API, OAuth/OIDC, App Proxy, Entra SSO |
| Group Policy Migration | GPOs, ADMX, preferences | Intune profiles, Settings Catalog, compliance policies |
| Security Migration | AD admin tiers, LAPS, auditing | PIM, Conditional Access, Identity Protection, Windows LAPS |
Tutorials
Step-by-step walkthroughs for key migration scenarios. {: #tutorials }
| Tutorial | Duration | Description |
| Deploy Entra Cloud Sync | 2--3 hours | Install Cloud Sync agent, configure attribute mapping, enable password hash sync, test sync, enable SOA switching for pilot group |
| Entra Join a Windows Device | 1--2 hours | Configure Entra Join, deploy Autopilot profile, migrate a Windows device from domain-joined to Entra-joined with Intune management |
Technical references
| Document | Description |
| Complete Feature Mapping | Every AD feature mapped to its Entra ID equivalent with migration complexity ratings and CSA-in-a-Box integration evidence |
| Migration Playbook | The end-to-end migration playbook with capability mapping, phased project plan, and competitive framing |
Government and federal
| Document | Description |
| Federal Migration Guide | Entra ID in Azure Government, EO 14028 Zero Trust mandate, CISA ZTMM, PIV/CAC smart card authentication, IL4/IL5 identity requirements, FedRAMP identity controls |
How CSA-in-a-Box fits
CSA-in-a-Box uses Microsoft Entra ID as the identity backbone for every service in the platform. Identity is not a peripheral concern --- it is the Zero Trust control plane through which all access to data, analytics, AI, and governance services flows.
Identity integration points
flowchart TD
EntraID[Microsoft Entra ID] --> Fabric[Microsoft Fabric\nWorkspace RBAC]
EntraID --> Databricks[Azure Databricks\nSCIM Provisioning]
EntraID --> Purview[Microsoft Purview\nData Access Policies]
EntraID --> AI[Azure OpenAI / AI Foundry\nManaged Identity RBAC]
EntraID --> PowerBI[Power BI\nRow-Level Security]
EntraID --> Monitor[Azure Monitor\nDiagnostic RBAC]
EntraID --> KeyVault[Azure Key Vault\nSecret Access]
EntraID --> ADLS[ADLS Gen2\nStorage ACLs + RBAC]
subgraph CSA["CSA-in-a-Box Platform"]
Fabric
Databricks
Purview
AI
PowerBI
Monitor
KeyVault
ADLS
end
style EntraID fill:#1565c0,color:#fff
style CSA fill:#e8eaf6,color:#000
What Entra ID enables for CSA-in-a-Box
- Fabric workspaces: Entra security groups map directly to Fabric workspace roles (Admin, Member, Contributor, Viewer). Dynamic group membership automates access as users change roles.
- Databricks SCIM: Entra ID provisions and deprovisions users and groups into Databricks workspaces automatically via SCIM 2.0. Unity Catalog inherits these identities for table-level access control.
- Purview governance: Data access policies in Purview bind to Entra security groups. Data stewards manage access through Entra group membership, not per-resource ACLs.
- Azure OpenAI / AI Foundry: Managed identities (workload identities) authenticate service-to-service calls without credentials. User access governed by Entra RBAC roles.
- Power BI row-level security: RLS roles reference Entra group membership via
USERPRINCIPALNAME() and CUSTOMDATA() DAX functions. No separate identity store. - ADLS Gen2 storage: POSIX-style ACLs and Azure RBAC roles bind to Entra identities. No shared keys in production --- managed identity or user delegation SAS only.
- Key Vault: Secrets, keys, and certificates accessed exclusively through Entra RBAC. No access policy model in new deployments.
- Azure Monitor: Log Analytics workspace access controlled through Entra RBAC. Resource-context and workspace-context access models both reference Entra identities.
Why AD migration is a prerequisite
Without Entra ID as the identity provider, CSA-in-a-Box cannot enforce:
- Conditional Access on data platform access (require compliant device, MFA, location policy)
- Just-in-time admin elevation via PIM for Fabric/Databricks/Purview admin roles
- Automated provisioning/deprovisioning via SCIM and Entra lifecycle workflows
- Workload identity federation for CI/CD pipelines deploying Bicep templates
- Cross-service SSO --- a single sign-on token from Entra ID authenticates to Fabric, Databricks, Purview, Power BI, and Azure Portal without separate credential stores
| Document | Description |
| Benchmarks | Authentication latency comparison (on-prem AD vs Entra ID), Conditional Access evaluation speed, SSO token performance, Graph API vs LDAP query performance, MFA latency |
Best practices
| Document | Description |
| Best Practices | Staged migration waves, pilot group strategy, rollback planning, application inventory methodology, GPO audit before migration, CSA-in-a-Box identity integration patterns |
Migration timeline overview
gantt
title AD to Entra ID Migration Timeline
dateFormat YYYY-MM-DD
axisFormat %b %Y
section Discovery
Identity inventory :a1, 2026-07-01, 4w
Application dependency :a2, after a1, 2w
GPO analysis :a3, after a1, 2w
section Hybrid Identity
Cloud Sync deployment :b1, after a2, 3w
Conditional Access :b2, after b1, 2w
PIM deployment :b3, after b1, 2w
section Applications
AD FS migration :c1, after b2, 8w
LDAP app remediation :c2, after b2, 12w
App Proxy deployment :c3, after c1, 4w
section Devices
Hybrid Join (interim) :d1, after b2, 6w
Intune enrollment :d2, after d1, 8w
Entra Join (target) :d3, after d2, 12w
section Security
Passwordless deployment :e1, after c1, 6w
Identity Governance :e2, after e1, 4w
section Decommission
AD FS decommission :f1, after c3, 2w
DC decommission :f2, after d3, 4w
Document index
| # | Document | Lines | Description |
| 1 | Hub Page | This page | Decision matrix, navigation, CSA-in-a-Box integration |
| 2 | Why Entra ID | ~450 | Executive brief: Zero Trust, passwordless, EO 14028 |
| 3 | TCO Analysis | ~450 | Cost comparison with ⅗-year projections |
| 4 | Feature Mapping | ~550 | 50+ AD features mapped to Entra ID equivalents |
| 5 | Hybrid Identity | ~420 | Entra Connect vs Cloud Sync, PHS, PTA, federation |
| 6 | Cloud-Only Migration | ~375 | Full cloud-managed identity, SOA switching |
| 7 | Device Migration | ~425 | Domain-joined to Entra-joined, Autopilot, Intune |
| 8 | Application Migration | ~425 | LDAP/Kerberos to modern auth, App Proxy |
| 9 | GPO Migration | ~425 | Group Policy to Intune Settings Catalog |
| 10 | Security Migration | ~375 | Conditional Access, PIM, Identity Protection |
| 11 | Tutorial: Cloud Sync | ~450 | Step-by-step Cloud Sync deployment |
| 12 | Tutorial: Device Join | ~375 | Step-by-step Entra Join + Autopilot |
| 13 | Federal Guide | ~375 | Azure Government, PIV/CAC, IL4/IL5, FedRAMP |
| 14 | Benchmarks | ~325 | Authentication and API performance data |
| 15 | Best Practices | ~375 | Migration waves, rollback, CSA-in-a-Box patterns |
Maintainers: csa-inabox core team Last updated: 2026-04-30