Skip to content

Active Directory to Microsoft Entra ID Migration Center

The definitive resource for migrating from on-premises Active Directory to Microsoft Entra ID --- the Zero Trust identity control plane for CSA-in-a-Box and the modern enterprise.


Who this is for

This migration center serves federal CISOs, identity architects, IT administrators, platform engineers, and compliance officers who are evaluating or executing a migration from on-premises Active Directory to Microsoft Entra ID. Whether you are responding to Executive Order 14028 Zero Trust mandates, eliminating domain controller infrastructure, modernizing authentication from Kerberos/NTLM to OAuth/OIDC, preparing for Microsoft's June/July 2026 hard-match hardening enforcement, or establishing cloud-native identity as the foundation for CSA-in-a-Box deployment, these resources provide the evidence, patterns, and step-by-step guidance to execute confidently.


Quick-start decision matrix

Your situation Start here
Executive evaluating Entra ID vs on-prem AD Why Entra ID over Active Directory
Need cost justification for migration Total Cost of Ownership Analysis
Need a feature-by-feature comparison Complete Feature Mapping
Ready to plan a migration Migration Playbook
Federal/government-specific requirements Federal Migration Guide
Planning hybrid identity deployment Hybrid Identity Migration
Planning full cloud-only migration Cloud-Only Migration
Migrating domain-joined devices Device Migration
Migrating LDAP/Kerberos applications Application Migration
Migrating Group Policy Group Policy Migration
Migrating AD security model Security Migration

Strategic resources

These documents provide the business case, cost analysis, and strategic framing for decision-makers.

Document Audience Description
Why Entra ID over Active Directory CIO / CISO / Board Executive white paper covering Zero Trust mandate, passwordless authentication, Conditional Access, elimination of domain controller infrastructure, EO 14028, and Copilot integration
Total Cost of Ownership Analysis CFO / CIO / Procurement Detailed pricing comparison of on-prem AD infrastructure vs Entra ID licensing, ⅗-year projections, hidden cost analysis, and FTE reduction
Complete Feature Mapping CISO / Identity Architect 50+ AD features mapped to Entra ID equivalents with migration complexity ratings, gap analysis, and CSA-in-a-Box integration points

Migration guides

Domain-specific deep dives covering every aspect of an AD-to-Entra-ID migration.

Guide AD capability Entra ID destination
Hybrid Identity Migration AD forests, trusts, sync Entra Connect, Cloud Sync, PHS, PTA, federation
Cloud-Only Migration On-prem user objects, SOA Cloud-managed identities, de-federation
Device Migration Domain-joined devices, GPO device config Entra Join, Autopilot, Intune MDM
Application Migration LDAP, Kerberos, AD FS apps Graph API, OAuth/OIDC, App Proxy, Entra SSO
Group Policy Migration GPOs, ADMX, preferences Intune profiles, Settings Catalog, compliance policies
Security Migration AD admin tiers, LAPS, auditing PIM, Conditional Access, Identity Protection, Windows LAPS

Tutorials

Step-by-step walkthroughs for key migration scenarios. {: #tutorials }

Tutorial Duration Description
Deploy Entra Cloud Sync 2--3 hours Install Cloud Sync agent, configure attribute mapping, enable password hash sync, test sync, enable SOA switching for pilot group
Entra Join a Windows Device 1--2 hours Configure Entra Join, deploy Autopilot profile, migrate a Windows device from domain-joined to Entra-joined with Intune management

Technical references

Document Description
Complete Feature Mapping Every AD feature mapped to its Entra ID equivalent with migration complexity ratings and CSA-in-a-Box integration evidence
Migration Playbook The end-to-end migration playbook with capability mapping, phased project plan, and competitive framing

Government and federal

Document Description
Federal Migration Guide Entra ID in Azure Government, EO 14028 Zero Trust mandate, CISA ZTMM, PIV/CAC smart card authentication, IL4/IL5 identity requirements, FedRAMP identity controls

How CSA-in-a-Box fits

CSA-in-a-Box uses Microsoft Entra ID as the identity backbone for every service in the platform. Identity is not a peripheral concern --- it is the Zero Trust control plane through which all access to data, analytics, AI, and governance services flows.

Identity integration points

flowchart TD
    EntraID[Microsoft Entra ID] --> Fabric[Microsoft Fabric\nWorkspace RBAC]
    EntraID --> Databricks[Azure Databricks\nSCIM Provisioning]
    EntraID --> Purview[Microsoft Purview\nData Access Policies]
    EntraID --> AI[Azure OpenAI / AI Foundry\nManaged Identity RBAC]
    EntraID --> PowerBI[Power BI\nRow-Level Security]
    EntraID --> Monitor[Azure Monitor\nDiagnostic RBAC]
    EntraID --> KeyVault[Azure Key Vault\nSecret Access]
    EntraID --> ADLS[ADLS Gen2\nStorage ACLs + RBAC]

    subgraph CSA["CSA-in-a-Box Platform"]
        Fabric
        Databricks
        Purview
        AI
        PowerBI
        Monitor
        KeyVault
        ADLS
    end

    style EntraID fill:#1565c0,color:#fff
    style CSA fill:#e8eaf6,color:#000

What Entra ID enables for CSA-in-a-Box

  • Fabric workspaces: Entra security groups map directly to Fabric workspace roles (Admin, Member, Contributor, Viewer). Dynamic group membership automates access as users change roles.
  • Databricks SCIM: Entra ID provisions and deprovisions users and groups into Databricks workspaces automatically via SCIM 2.0. Unity Catalog inherits these identities for table-level access control.
  • Purview governance: Data access policies in Purview bind to Entra security groups. Data stewards manage access through Entra group membership, not per-resource ACLs.
  • Azure OpenAI / AI Foundry: Managed identities (workload identities) authenticate service-to-service calls without credentials. User access governed by Entra RBAC roles.
  • Power BI row-level security: RLS roles reference Entra group membership via USERPRINCIPALNAME() and CUSTOMDATA() DAX functions. No separate identity store.
  • ADLS Gen2 storage: POSIX-style ACLs and Azure RBAC roles bind to Entra identities. No shared keys in production --- managed identity or user delegation SAS only.
  • Key Vault: Secrets, keys, and certificates accessed exclusively through Entra RBAC. No access policy model in new deployments.
  • Azure Monitor: Log Analytics workspace access controlled through Entra RBAC. Resource-context and workspace-context access models both reference Entra identities.

Why AD migration is a prerequisite

Without Entra ID as the identity provider, CSA-in-a-Box cannot enforce:

  1. Conditional Access on data platform access (require compliant device, MFA, location policy)
  2. Just-in-time admin elevation via PIM for Fabric/Databricks/Purview admin roles
  3. Automated provisioning/deprovisioning via SCIM and Entra lifecycle workflows
  4. Workload identity federation for CI/CD pipelines deploying Bicep templates
  5. Cross-service SSO --- a single sign-on token from Entra ID authenticates to Fabric, Databricks, Purview, Power BI, and Azure Portal without separate credential stores

Performance and benchmarks

Document Description
Benchmarks Authentication latency comparison (on-prem AD vs Entra ID), Conditional Access evaluation speed, SSO token performance, Graph API vs LDAP query performance, MFA latency

Best practices

Document Description
Best Practices Staged migration waves, pilot group strategy, rollback planning, application inventory methodology, GPO audit before migration, CSA-in-a-Box identity integration patterns

Migration timeline overview

gantt
    title AD to Entra ID Migration Timeline
    dateFormat  YYYY-MM-DD
    axisFormat  %b %Y

    section Discovery
    Identity inventory        :a1, 2026-07-01, 4w
    Application dependency    :a2, after a1, 2w
    GPO analysis             :a3, after a1, 2w

    section Hybrid Identity
    Cloud Sync deployment    :b1, after a2, 3w
    Conditional Access       :b2, after b1, 2w
    PIM deployment           :b3, after b1, 2w

    section Applications
    AD FS migration          :c1, after b2, 8w
    LDAP app remediation     :c2, after b2, 12w
    App Proxy deployment     :c3, after c1, 4w

    section Devices
    Hybrid Join (interim)    :d1, after b2, 6w
    Intune enrollment        :d2, after d1, 8w
    Entra Join (target)      :d3, after d2, 12w

    section Security
    Passwordless deployment  :e1, after c1, 6w
    Identity Governance      :e2, after e1, 4w

    section Decommission
    AD FS decommission       :f1, after c3, 2w
    DC decommission          :f2, after d3, 4w

Document index

# Document Lines Description
1 Hub Page This page Decision matrix, navigation, CSA-in-a-Box integration
2 Why Entra ID ~450 Executive brief: Zero Trust, passwordless, EO 14028
3 TCO Analysis ~450 Cost comparison with ⅗-year projections
4 Feature Mapping ~550 50+ AD features mapped to Entra ID equivalents
5 Hybrid Identity ~420 Entra Connect vs Cloud Sync, PHS, PTA, federation
6 Cloud-Only Migration ~375 Full cloud-managed identity, SOA switching
7 Device Migration ~425 Domain-joined to Entra-joined, Autopilot, Intune
8 Application Migration ~425 LDAP/Kerberos to modern auth, App Proxy
9 GPO Migration ~425 Group Policy to Intune Settings Catalog
10 Security Migration ~375 Conditional Access, PIM, Identity Protection
11 Tutorial: Cloud Sync ~450 Step-by-step Cloud Sync deployment
12 Tutorial: Device Join ~375 Step-by-step Entra Join + Autopilot
13 Federal Guide ~375 Azure Government, PIV/CAC, IL4/IL5, FedRAMP
14 Benchmarks ~325 Authentication and API performance data
15 Best Practices ~375 Migration waves, rollback, CSA-in-a-Box patterns

Maintainers: csa-inabox core team Last updated: 2026-04-30