Directory Migration — AD Infrastructure Bridge

Everything Active Directory Was Holding Together

Published

April 19, 2026

WarningAspirational — canonically declared, not yet fully adopted

The Directory Migration adapter specifications are canonical. Operational instantiation and vendor-specific implementations are under development.

The Hidden Migration Surface

When organizations plan their “AD to Entra ID migration,” they think about users and groups. They forget about everything else Active Directory was silently holding together.

Active Directory was the implicit governance model for eleven categories of infrastructure objects. When AD goes away, every one of these services loses its governance anchor — and most of them fail silently. No errors. No alerts. Just certificates that stop renewing, RADIUS authentications that stop working, DNS records that go stale, and LDAP-dependent applications that quietly break.

The Eleven AD Dependency Object Types

# Object Type What AD Was Doing What Breaks Without Governance
1 Users Identity lifecycle, OU placement, attribute authority Orphaned accounts, privilege drift, compliance gaps
2 Computers Domain join, GPO targeting, machine certificates Unmanaged endpoints, missing patches, security exposure
3 Service Accounts SPNs, Kerberos delegation, password management Application authentication failures, silent service outages
4 Security Groups Access control, policy scoping, resource permissions Permission sprawl, ungoverned access, audit failures
5 Group Policy Objects Device configuration, security baselines, software deployment Configuration drift, inconsistent baselines, compliance gaps
6 DNS / DHCP Name resolution, IP allocation, AD-integrated zones Name resolution failures, IP conflicts, split-brain DNS
7 PKI / Certificate Services Certificate issuance, auto-enrollment, CRL distribution Silent certificate expiration, authentication failures, mTLS breaks
8 RADIUS / NPS 802.1X network access, VPN authentication, Wi-Fi auth Network access failures, VPN outages, unauthorized access
9 LDAP Application authentication, directory queries, legacy integrations Application login failures, directory query errors, broken integrations
10 SPNs / App Registrations Kerberos service principal names, application identity Application SSO breaks, delegation failures, service identity loss
11 Trust Relationships Cross-domain authentication, forest trusts, selective authentication Cross-domain access failures, authentication breaks between orgs

Eight Adapter Interfaces

Each AD-dependent service gets a dedicated adapter interface that defines the governance model for migrating that service away from Active Directory. Every adapter follows the same structure:

  • Discovery — what to inventory and how to find it in AD
  • Risk Assessment — what fails if this is not migrated correctly
  • Target Architecture — the modern equivalent and how governance works there
  • Migration Path — step-by-step governance-driven migration
  • Validation — how to confirm the migration preserved governance integrity
  • Rollback — what to do if the migration causes failures

CRITICAL Priority — Silent Failure Risk

These adapters address services that fail silently when AD governance is removed. No error messages, no alerts — just things that stop working.

ID Adapter Risk Profile
DM_020 PKI / Certificate Services Certificates stop auto-enrolling. mTLS connections fail weeks later when certs expire. Nobody notices until production breaks.
DM_030 RADIUS / 802.1X / VPN Network access control stops authenticating against AD groups. Devices fall off the network. VPN stops accepting machine certificates.
DM_040 LDAP Proxy Legacy applications that authenticate via LDAP bind stop working. This is the largest hidden attack surface in most enterprises — hundreds of apps nobody inventoried.

HIGH Priority — Operational Impact

ID Adapter Risk Profile
DM_010 IPAM (InfoBlox / BlueCat) IP address management loses its AD-integrated authority model. Includes vendor-specific adapter manifests for InfoBlox and BlueCat.
DM_050 Sync Engine (Entra Connect) The bridge between AD and Entra ID. This adapter defines the retirement criteria — when is it safe to turn off Entra Connect? Includes a 12-point Retirement Readiness Checklist.
DM_060 Device Management SCCM/MECM to Intune transition. GPO-to-configuration-profile translation. Co-management state machine.

MEDIUM Priority — Operational Continuity

ID Adapter Risk Profile
DM_070 NTP / Time Services Kerberos requires clock synchronization within 5 minutes. AD provided this implicitly via the PDC emulator. Entra ID does not. Clock skew causes authentication failures that look like identity problems.
DM_080 DFS / File Services DFS namespaces and UNC paths that reference AD domain names. User-facing file access breaks when the domain name changes. Migration requires namespace redirection and GPO-based drive mapping updates.

The Eight Core Concepts

Every adapter is grounded in UIAO’s eight universal core concepts:

Core Concept Definition Adapter Relevance
SSOT Every claim has one authoritative origin Each adapter defines its SSOT for governance decisions
Conversation as atomic unit Every interaction binds identity, certificates, addressing, path, QoS, and telemetry Adapter migrations must preserve complete conversation integrity
Identity as root namespace Every IP, certificate, subnet, policy, and telemetry event derives from identity All adapter governance traces back to identity authority
Deterministic addressing Addressing is identity-derived and policy-driven IPAM and DNS adapters enforce deterministic address assignment
Certificate-anchored overlay mTLS anchors tunnels, services, and trust relationships PKI adapter is the foundation — other adapters depend on it
Telemetry as control Telemetry is a real-time control input, not passive reporting Every adapter emits governance telemetry for drift detection
Embedded governance Governance is executed through orchestrated workflows, not manual tickets Adapter migrations are governed workflows, not ad-hoc projects
User experience first The migration is invisible to end users if governance was done right The ultimate validation: users notice nothing

The Five Migration Phases

Every adapter follows the same five-phase governance-driven migration:

Phase What Happens Governance Gate
1. Discover Complete inventory of what AD encodes for this service Inventory signed off by service owner
2. Normalize Rationalize decades of organic growth into a clean model Normalized model reviewed against OrgPath codebook
3. Map Translate AD governance constructs to modern equivalents Mapping validated — no governance gaps, no orphaned objects
4. Migrate Execute with continuous validation Every step validated before proceeding — no big-bang cutover
5. Validate Confirm governance integrity is preserved post-migration Full drift scan, telemetry confirmation, user experience validation

Adapter Registration Schema

Every adapter registers in the migration-adapter-registry.yaml with standardized metadata:

  • Adapter ID and name
  • Priority tier (CRITICAL / HIGH / MEDIUM)
  • Migration phase (current state in the five-phase model)
  • Dependencies (which other adapters must complete first)
  • Validation criteria (machine-checkable success conditions)
  • Canon crosswalk (links to relevant UIAO_xxx and MOD_xxx documents)

Source Files

All Directory Migration source files are in the monorepo at src/uiao/modernization/directory-migration/. The adapter registry is at src/uiao/modernization/directory-migration/migration-adapter-registry.yaml.

Back to top