Directory Migration — AD Infrastructure Bridge
Everything Active Directory Was Holding Together
The Directory Migration adapter specifications are canonical. Operational instantiation and vendor-specific implementations are under development.
The Eleven AD Dependency Object Types
| # | Object Type | What AD Was Doing | What Breaks Without Governance |
|---|---|---|---|
| 1 | Users | Identity lifecycle, OU placement, attribute authority | Orphaned accounts, privilege drift, compliance gaps |
| 2 | Computers | Domain join, GPO targeting, machine certificates | Unmanaged endpoints, missing patches, security exposure |
| 3 | Service Accounts | SPNs, Kerberos delegation, password management | Application authentication failures, silent service outages |
| 4 | Security Groups | Access control, policy scoping, resource permissions | Permission sprawl, ungoverned access, audit failures |
| 5 | Group Policy Objects | Device configuration, security baselines, software deployment | Configuration drift, inconsistent baselines, compliance gaps |
| 6 | DNS / DHCP | Name resolution, IP allocation, AD-integrated zones | Name resolution failures, IP conflicts, split-brain DNS |
| 7 | PKI / Certificate Services | Certificate issuance, auto-enrollment, CRL distribution | Silent certificate expiration, authentication failures, mTLS breaks |
| 8 | RADIUS / NPS | 802.1X network access, VPN authentication, Wi-Fi auth | Network access failures, VPN outages, unauthorized access |
| 9 | LDAP | Application authentication, directory queries, legacy integrations | Application login failures, directory query errors, broken integrations |
| 10 | SPNs / App Registrations | Kerberos service principal names, application identity | Application SSO breaks, delegation failures, service identity loss |
| 11 | Trust Relationships | Cross-domain authentication, forest trusts, selective authentication | Cross-domain access failures, authentication breaks between orgs |
Eight Adapter Interfaces
Each AD-dependent service gets a dedicated adapter interface that defines the governance model for migrating that service away from Active Directory. Every adapter follows the same structure:
- Discovery — what to inventory and how to find it in AD
- Risk Assessment — what fails if this is not migrated correctly
- Target Architecture — the modern equivalent and how governance works there
- Migration Path — step-by-step governance-driven migration
- Validation — how to confirm the migration preserved governance integrity
- Rollback — what to do if the migration causes failures
CRITICAL Priority — Silent Failure Risk
These adapters address services that fail silently when AD governance is removed. No error messages, no alerts — just things that stop working.
| ID | Adapter | Risk Profile |
|---|---|---|
| DM_020 | PKI / Certificate Services | Certificates stop auto-enrolling. mTLS connections fail weeks later when certs expire. Nobody notices until production breaks. |
| DM_030 | RADIUS / 802.1X / VPN | Network access control stops authenticating against AD groups. Devices fall off the network. VPN stops accepting machine certificates. |
| DM_040 | LDAP Proxy | Legacy applications that authenticate via LDAP bind stop working. This is the largest hidden attack surface in most enterprises — hundreds of apps nobody inventoried. |
HIGH Priority — Operational Impact
| ID | Adapter | Risk Profile |
|---|---|---|
| DM_010 | IPAM (InfoBlox / BlueCat) | IP address management loses its AD-integrated authority model. Includes vendor-specific adapter manifests for InfoBlox and BlueCat. |
| DM_050 | Sync Engine (Entra Connect) | The bridge between AD and Entra ID. This adapter defines the retirement criteria — when is it safe to turn off Entra Connect? Includes a 12-point Retirement Readiness Checklist. |
| DM_060 | Device Management | SCCM/MECM to Intune transition. GPO-to-configuration-profile translation. Co-management state machine. |
MEDIUM Priority — Operational Continuity
| ID | Adapter | Risk Profile |
|---|---|---|
| DM_070 | NTP / Time Services | Kerberos requires clock synchronization within 5 minutes. AD provided this implicitly via the PDC emulator. Entra ID does not. Clock skew causes authentication failures that look like identity problems. |
| DM_080 | DFS / File Services | DFS namespaces and UNC paths that reference AD domain names. User-facing file access breaks when the domain name changes. Migration requires namespace redirection and GPO-based drive mapping updates. |
The Eight Core Concepts
Every adapter is grounded in UIAO’s eight universal core concepts:
| Core Concept | Definition | Adapter Relevance |
|---|---|---|
| SSOT | Every claim has one authoritative origin | Each adapter defines its SSOT for governance decisions |
| Conversation as atomic unit | Every interaction binds identity, certificates, addressing, path, QoS, and telemetry | Adapter migrations must preserve complete conversation integrity |
| Identity as root namespace | Every IP, certificate, subnet, policy, and telemetry event derives from identity | All adapter governance traces back to identity authority |
| Deterministic addressing | Addressing is identity-derived and policy-driven | IPAM and DNS adapters enforce deterministic address assignment |
| Certificate-anchored overlay | mTLS anchors tunnels, services, and trust relationships | PKI adapter is the foundation — other adapters depend on it |
| Telemetry as control | Telemetry is a real-time control input, not passive reporting | Every adapter emits governance telemetry for drift detection |
| Embedded governance | Governance is executed through orchestrated workflows, not manual tickets | Adapter migrations are governed workflows, not ad-hoc projects |
| User experience first | The migration is invisible to end users if governance was done right | The ultimate validation: users notice nothing |
The Five Migration Phases
Every adapter follows the same five-phase governance-driven migration:
| Phase | What Happens | Governance Gate |
|---|---|---|
| 1. Discover | Complete inventory of what AD encodes for this service | Inventory signed off by service owner |
| 2. Normalize | Rationalize decades of organic growth into a clean model | Normalized model reviewed against OrgPath codebook |
| 3. Map | Translate AD governance constructs to modern equivalents | Mapping validated — no governance gaps, no orphaned objects |
| 4. Migrate | Execute with continuous validation | Every step validated before proceeding — no big-bang cutover |
| 5. Validate | Confirm governance integrity is preserved post-migration | Full drift scan, telemetry confirmation, user experience validation |
Adapter Registration Schema
Every adapter registers in the migration-adapter-registry.yaml with standardized metadata:
- Adapter ID and name
- Priority tier (CRITICAL / HIGH / MEDIUM)
- Migration phase (current state in the five-phase model)
- Dependencies (which other adapters must complete first)
- Validation criteria (machine-checkable success conditions)
- Canon crosswalk (links to relevant UIAO_xxx and MOD_xxx documents)
Source Files
All Directory Migration source files are in the monorepo at src/uiao/modernization/directory-migration/. The adapter registry is at src/uiao/modernization/directory-migration/migration-adapter-registry.yaml.