Skip to content

What is Active Directory Integration (ADI)?

Active Directory (AD) was introduced two decades ago to provide centralized user and rights management as well as Windows PC configurations for private networks behind firewalls. Email was the first factor to upend that model for access control, and was followed by the proliferation of cloud services and devices that transformed networks into a digital estate.

The perimeter model that AD supported worked well, until it didn’t. Its shortcomings helped lay the groundwork for the Zero Trust approach to identity and access management (IAM). Zero Trust brings access control (the perimeter) closer to identities and devices by enforcing explicit trust before granting access to resources.

JumpCloud’s open directory platform makes it possible to modernize AD for Zero Trust. It works by combining cloud IAM with universal endpoint management (UEM) and other essential services to manage today’s IT infrastructures, which are a hybrid of everything, everywhere. JumpCloud’s Active Directory Integration (ADI) feature integrates AD with the open directory.

ADI makes it possible for multi-domain environments to extend AD environments to the cloud without locking small to medium-sized enterprises (SMEs) into a suite of vertically integrated tools. That approach to AD modernization can limit freedom of choice and distract from your overall mission by making IT management significantly more difficult. This article provides an overview of what ADI is and how it works to help SMEs reestablish the strong access control that was lost when AD’s network perimeter model failed to meet today’s IT infrastructure needs.

Note: JumpCloud helps you follow Microsoft’s Zero Trust Rapid Modernization Plan (RaMP) for a privileged access strategy to secure AD.

AD Integration Deployment Models

AD integration

ADI continuously syncs users, groups, and passwords between AD and JumpCloud. Its components are installed on a member server and configured to import and sync identities for each domain. It provides several options for authentication flows: bi-directional syncing and one-way syncing (in either direction). Pass-through authentication back to AD is supported to uphold security and compliance requirements for local authentication and authorization.

Note: Microsoft’s Entra ID cloud directory will not synchronize groups unless the subscription is a Premium SKU.

Bi-Directional Synchronization

JumpCloud Architecture

Bi-directionality means that password changes that occur on the integrated platform get synchronized and changed in AD. This makes it possible for friction-free user access with single-sign on (SSO). It also enables advanced identity lifecycle management. For example, you can use JumpCloud to sync human resources systems with JumpCloud and back to AD.

AD integrations are often one-way, where AD is the source of truth and a third-party application or IT resource authenticates user access against AD. Resources such as web applications require SSO in order to meet modern security and usability requirements. A cloud directory provides SSO with the added benefit of multi-factor authentication (MFA) and conditional access to enable a Zero Trust security strategy that “assumes breach” and verifies requests.

This approach modernizes AD to extend access control to every device and resource without requiring admins to perform consolidation, migration, or deep integrations with multiple point solutions. Admins can manage users, groups, and access in either AD or JumpCloud.

There’s also an available migration path to JumpCloud, if and when it makes sense to leave AD.

Note: Microsoft requires its customers that modernize AD using Entra ID to purchase premium subscriptions for password write-back.

Pass-Through Authentication

synchronization

Some sectors are required to retain oversight of their credential store for certainty and compliance. JumpCloud’s open directory can federate authentication AD through ADI, which extends AD to other resources and devices without running afoul of those rules.

Note: Outbound authentication flows from AD to JumpCloud enable AD users to access cloud resources and non-Windows devices.

Modernizing AD with JumpCloud

JumpCloud is modern, user-friendly, and makes it possible for admins to manage SSO and UEM from a single console with minimal effort. It also extends SSO to common network protocols, adding convenience, while reducing the risk of unauthorized access to infrastructure. A Zero Trust IAM strategy complements your existing investment in network perimeter security.

A crucial part of reestablishing access control over your digital estate comes from the ability to integrate AD with non-Windows systems.

modernize AD flow chart

Universal Endpoint Management

JumpCloud’s UEM adds the ability to integrate Android, macOS, and Linux devices into Active Directory-controlled environments with mobile device management (MDM) support for Windows. Untrusted endpoints can become a weak link in a Zero Trust strategy; UEM ensures that there’s a baseline of policies and patch management (optional) to reduce your attack surface.

End users don’t have to jump through hoops to stay compliant with password policies, password resets, and other critical functions. And, they can do this from anywhere — with no VPN. Built-in remote assist is available to support your users with both attended and unattended sessions.

Note:

Agents provide telemetry and reporting on device and user activity.

SSO and Modern Authentication 

ADI synced identities connect through SSO to networking infrastructure with RADIUS, cloud infrastructure and web apps with OIDC and SAML, file servers on-prem and in the cloud, legacy applications via LDAP, and more by using JumpCloud’s RESTful API.

Note:

JumpCloud offers an integrated password manager for when SSO isn’t possible.

The platform also includes JumpCloud Go™, a hardware-protected and phishing-resistant passwordless login for JumpCloud managed devices. It provides modern authentication that’s more secure and simpler and safer for your users. JumpCloud Go is supported on MacOS and Windows and integrates with device biometric authenticators (Apple Touch ID or Windows Hello) to satisfy traditional password sign-in challenges. It will provide high MFA authenticator assurance.

JumpCloud Go
Modern authentication helps to harden AD against the latest security threats.

Adopting SSO and UEM is recommended for all organizations that use AD, per Microsoft’s Cybersecurity Reference Architectures (MCRA). JumpCloud provides SMEs with an alternative to Microsoft’s prescribed path by keeping your identity provider (IdP) and IT stack independent. JumpCloud has essential IAM, UEM, and system management capabilities in a single place.

Try JumpCloud ADI

Still wondering what Active Directory Integration is and how it can modernize AD? See for yourself when you sign up for a free trial of JumpCloud. It’s included with the open directory platform at no additional charge. JumpCloud has professional service options to assist with onboarding users. JumpCloud is also a Google partner and integrates with Google Workspace, making both services better together with a modern IT management and productivity package.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

NordLayer services in review: Device Posture Security

Mobility and device versatility make business digital possibilities nearly endless. However, overcoming one technical or security challenge means another will soon emerge. Just like enabling secure remote user access to the company network raises another issue for IT administrators — how to ensure only compliant devices enter the network? 

Customized internal policies must be synced with the organization’s business model and sensitive data levels. Specific rules define how identities are managed to access the company network; on another security level, they are redistributed to access unrestricted resources.

In this process, the absent layer of security guarantees entering devices match the set organization’s security criteria to prevent potential security breaches. Companies can address this challenge by adopting Zero Trust Network Access-based endpoint controls.

A service like Device Posture Security provides a comprehensive solution for organizations looking to bolster their security. By monitoring – and, if required, blocking – devices that connect to the company network, organizations can mitigate risk levels of exposing sensitive information to dangerous scenarios.

Device Posture Security using NordLayer

NordLayer’s Device Posture Security service is based on the ZTNA security model, meaning that all devices are treated as untrusted until they can prove trustworthy.

This approach ensures that organizations have complete visibility and control over the devices connecting to their network.

The Device Posture Security functionality helps monitor who connects to the company network according to predefined rules and enables non-compliant device blocking capability to meet ZTNA requirements.

Click to tweet

Primarily, NordLayer-introduced Device Posture Security service allowed monitoring network-entering devices. Now the technology is enhanced with blocking functionality that enables network administrators to take action once a non-compliant device is detected.

How does NordLayer’s Device Posture Security service work?

The cloud-based service monitors all devices with an installed/running NordLayer application.

Device Posture Security allows organization admins to perform several actions for more accurate and extensive network supervision:

  • The service qualifies admins to get notified about new devices entering the network and lets to identify them

  • Inspect if the compatible operating system (OS) of every entering device is used, and check its version against the supported OSs’ list

  • Verify the newest NordLayer application version is utilized

  • Scan organization-enlisted devices to see if they contain an admin-installed file that allows determining corporate devices from personal ones

  • Browse a History tab with the logged activity of all connected devices for investigation and auditing network activity

More in-depth information allows for following the internal procedures to enforce OS or application updates to ensure the most recent patches and bug fixes are in place.

The Device Posture Security service helps close potential security gaps by checking if the device is not jailbroken/rooted or doesn’t miss an organization-enrolled file. If the device doesn’t comply, admins can disconnect it from the network to protect it.

How NordLayer’s Device Posture Security is different?

NordLayer’s Device Security Posture contains two capabilities. Until the latest service upgrade, it was dedicated only to device posture monitoring. The full composition of the service now offers monitoring and device account-blocking capability functions.

DPS

The ability to monitor and allow only trusted devices to access digital company resources helps adopt the ZTNA approach, allowing organizations to enjoy peace of mind knowing that all devices connecting to their network meet their security standards.

  • Only trusted devices are permitted. Device Posture Security enables organization administrators to verify every device within the network separately, whether it’s a known endpoint. If the device is unrecognized, an alert is triggered for the admin to review if it complies with company security policy requirements.

  • Use of allowlisted operating systems. The NordLayer application is available on Windows, macOS, and Linux operating systems. However, a company can only settle to work with one OS, like macOS. Thus, the service will notify the system if a user tries to use a device with any other but enabled OS.

  • Ensuring utilized OS versions are up-to-date. Due to security patching requirements, companies can define a threshold by which OS versions comply with internal policies. Therefore, if the system detects an outdated operating system version that deviates from set rules, it informs the administrator to take relevant action.

  • Establishing the use of the latest NordLayer app version. Following NordLayer’s Release Notes, IT managers can see the latest information about new and essential feature launches that apply to the most recent application version.

  • Existing File check. Administrators can store a specific file that labels the device as approved to log and recognize corporate devices. This action distinguishes corporate-approved devices from personal ones, even if they consist of the same operating system and version.

To ensure organization members use the latest app version, the admin must create a Device Posture Security profile with the desired NordLayer version to determine who should update the app.

NordLayer’s Device Posture Security offering builds a practical, security-by-design-based approach to business network protection. Thus, the service allows close supervision of endpoints within the network if they are up-to-date as required. Automated device inspection helps prevent overlooked security gaps whether the organization has only a dozen or a few hundred users.

Benefits of Device Posture Security

Regular check-ups of in-network operating devices establish a threat prevention-based approach to internal compliance management. The service enables organization network admins to act more centrally, define the scope of the rules, and maintain high security levels without spending long hours or hiring a squad to carry out such tasks.

Enforcing rules centrally

Created security policies can be enforced in a matter of moments for the full-scale organization within a few mouse clicks.

The Control Panel allows administrators to see what teams fall under the security requirements and must follow the rules.

Increasing device visibility to the admin

The larger the company, the bigger the endpoint network to supervise. Especially when users practice having a few devices per member, multiplying the work scope for the administrators.

Device Posture Security reveals and registers every endpoint within the company network, collecting information in the History tab and limiting the possibility of slipping for unauthorized or faulty devices at a given time.

Understanding whether the device is compliant and up-to-date

The service allows network admins to see more in-depth information on whether the endpoints comply with organization security requirements.

Tracking what operating system and which version and NordLayer application edition is used creates a more action-based cybersecurity strategy for the organization.

Giving access to block untrusted devices

Device Posture Security allows network administrators to reject untrustworthy devices from the company network.

If the admin sees that the device is jailbroken or rooted, lacks a specific organization-deployed file, or needs an update—they can enforce action to be performed outside the organization and confirm device entrance to access resources only when the endpoint can be trusted.

Preventing non-compliant devices from accessing your network

The NordLayer service gives the option to see any deviating devices in the network that were infected or outdated while being there.

However, taking action at an entry level is as important. Blocking a non-compliant device beforehand helps avoid any back peddling with uncertain consequences if such a device is detected after entering the network.

Entering NordLayer’s Device Posture Security

Device Posture Security makes your organization more robust to digital threats and brings it one step closer to implementing the ZTNA model approach to the cybersecurity strategy. The Device Posture Security service setup and deployment are made straightforward to achieve it effectively.

NordLayer provides information about devices on the Control Panel. Device security check logs contain information such as timestamps when the last check was done or device deviation detected, endpoint identification information, and its status. The device status is based on admin-defined rules the organization must comply with.

For comprehensive tracking, organization-allowed devices can fall under the category of a fully compliant device or initiate an alert whether the device is unknown, operated by a forbidden OS, if the version needs an update, or device doesn’t contain a specific file required per internal security policy. As predefined by a set of rules, any deviation prevents the device from accessing company resources.

Device posture security checks are performed regularly. If a device becomes not compliant, an alert is triggered, and the user is disconnected from Virtual Private Gateway—such action was unavailable utilizing the Device Posture Monitoring service. With device account blocking, the Device Posture Security provides extra protection for company data without additional labor and resources.

Let’s discuss the NordLayer solution for your business network access security now.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

ESET Research: Winter Vivern attacks Roundcube webmail servers of governments in Europe through zero-day vulnerability

  • ESET researchers discovered that the Winter Vivern group has been exploiting a zero-day XSS vulnerability in Roundcube Webmail.
  • According to ESET telemetry, the campaign targeted Roundcube Webmail servers belonging to governmental entities and a think tank in Europe.
  • Roundcube is an open-source webmail server used by many different organizations.
  • Roundcube patched the vulnerability and released security updates very quickly after being notified by ESET.
  • No manual interaction other than viewing the malicious email message in a web browser is required. The final JavaScript payload can exfiltrate email messages to the command and control server of the group.

BRATISLAVA, MONTREAL — October 25, 2023 — ESET researchers, during their regular monitoring of the cyberespionage operations of Winter Vivern, discovered that the group recently began exploiting a zero-day XSS vulnerability in the Roundcube Webmail server. In an XSS attack, malicious scripts are injected into otherwise trusted websites. According to ESET telemetry data, the campaign targeted Roundcube Webmail servers belonging to governmental entities and a think tank, all in Europe. ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible.

ESET discovered the vulnerability on October 12 and immediately reported it to the Roundcube team, who patched the vulnerability and released security updates soon after, on October 14. “We would like to thank the Roundcube developers for their quick reply and for patching the vulnerability in such a short time frame,” says ESET researcher Matthieu Faou, who discovered the vulnerability and Winter Vivern attacks.

“Winter Vivern is a threat to governments in Europe because of its persistence, its very consistent running of phishing campaigns, and because a significant number of internet-facing applications are not regularly updated despite being known to contain vulnerabilities,” explains Faou.

Exploitation of the XSS vulnerability CVE-2023-5631 can be done remotely by sending a specially crafted email message. “At first sight, the email doesn’t seem malicious – but if we examine the HTML source code, we can see a tag for SVG graphics at the end that contains an encoded malicious payload,” says Faou. By sending a specially crafted email message, attackers are able to load arbitrary JavaScript code in the context of the Roundcube user’s browser window. No manual interaction other than viewing the message in a web browser is required. The final JavaScript payload can exfiltrate email messages to the command and control server of the group.

Winter Vivern is a cyberespionage group that is thought to have been active since at least 2020 and targets governments in Europe and Central Asia. To compromise its targets, the group uses malicious documents, phishing websites, and a custom PowerShell backdoor. ESET believes with low confidence that Winter Vivern is linked to MoustachedBouncer, a sophisticated Belarus-aligned group that we first published about in August 2023. Winter Vivern has been targeting Zimbra and Roundcube email servers belonging to governmental entities since at least 2022.

For more technical information about Winter Vivern, its latest attack, and the Roundcube vulnerability, check out the blogpost “Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers” on WeLiveSecurity. Make sure to follow ESET Research on Twitter (now known as X) for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×