Hi everyone,
We have a scenario where I'm having trouble nailing a high level design so wanted to post here, see if I can get some answers and also share.
Scenario:
- only working with identities from Microsoft AD and Azure AD
- Account self service features and other identity sources are of low importance
- New'ish Resource Forest
- Several user forests from which users will most likely be migrated to the resource forest at some future date (typical merger scenario)
- Requirement for shadow accounts in resource domain for Lync and possibly Exchange at a later date
- 2 new Azure tenants (geographical/political reasons), probably two more at a later date
- User UPN's dont match email address and not viable at this time to change the UPN within AD
- Requirement to do Password hash to Azure
Originally we were envisaging FIM in the resource domain to bring the identities together and create the shadow accounts.
We would also use inbound rules to transform the email address to UPN.
Then use 2 x AADSync installs to sync users to the tenants (UPN eu.company.com to tenant 1 and UPN na.company.com to tenant 2).
I have learnt that FIM doesn't do password hash to Azure, a must have for us, so initially I was thinking I'd have to wait for MIM but am now asking myself if I actually need MIM for this scenario.
Can AAD Connect do what I want ... transform email to UPN, password hash to Azure and create shadow accounts in the resource domain?
Thanks,
Aengus
- Edited by AengusM 4 hours 42 minutes ago