How to deploy Microsoft Entra Domain Services within Landing Zone Architecture #1612
Replies: 2 comments
-
|
I have the same thoughts. I would like to deploy Microsoft Entra Domain Services in a dedicated Identity Subscription via terraform. I also want to have a connectivity (transit vnet) using virtual wan in a seperate management group and subscription. I want to make sure traffic can traverse from Identity --> Connectivity --> Corp or Online application in a global manner with low latency. |
Beta Was this translation helpful? Give feedback.
-
|
Microsoft’s Cloud Adoption Framework (CAF) recommends placing identity services such as Microsoft Entra Domain Services in a dedicated “identity” subscription and virtual network, then integrating that network with your hub and workload VNets. There isn’t a ready‑made Terraform module in the enterprise‑scale repo, but the deployment pattern is straightforward:
This aligns with the CAF identity and access management design area【170421221927050†L25-L27】. You can adapt the identity subscription module from the enterprise‑scale Terraform samples and then add resources like |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
There is good documentation around the Identity and Access Management landing zone, but there aren't any examples I can find of how you would actually implement a deployment like that (in Terraform or otherwise).
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/landing-zone/design-area/identity-access#identity-and-access-management-in-azure-landing-zones
Does anyone have any working examples how how they have done Microsoft Entra Domain Service integration within the Landing Zone Architecture?
Beta Was this translation helpful? Give feedback.
All reactions