Hybrid on-premises setup
In the Hybrid on-premises setup, some of the resources for Active Roles can be on cloud and on-premises.
NOTE:
-
Currently, Active Roles support AWS or Azure with on-premises platforms.
-
One Identity recommends to use Active Roles and SQL Server to be in the same region.
-
One Identity recommends to setup a Site-to-Site VPN between the cloud (Azure or AWS) and on-premises. A Site-to-Site VPN gateway connection is used to connect your on-premises network to a cloud virtual network over an IPsec/IKE (IKEv1 or IKEv2) VPN tunnel. This type of connection requires a VPN device located on-premises that has an externally facing public IP address assigned to it.
Site-to-Site VPN connection on Azure
Before you begin to create a Site-to-Site VPN connection on Azure, ensure the following aspects:
-
A compatible VPN device is available and the administrator can configure it.
-
An externally facing public IPv4 address is available for the VPN device.
-
Familiarity with the IP address ranges located on the on-premises network configuration.
-
Choose the same location or region for all Azure resources.
Configuring a Site-to-Site VPN
-
Create a resource group in desired region
-
Create a virtual network with required address space
-
Create a Gateway subnet in the above virtual network
-
Create a Public IP address
-
Create the VPN gateway using the above Public IP address
-
Create the local network gateway using the Public IP Address of on-premises and mention the IP address space of on-premises network
-
Configure your VPN device
-
Create the VPN connection under Local network Gateway created above
-
Ensure Shared Key provided in Connection matches with on-premises
-
Verify the VPN connection status shows Connected
For more information on creating a Site-to-Site VPN gateway connection from the on-premises network to the Azure VNet, see https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-site-to-site-resource-manager-portal.
Configuring Active Roles with on-premises domain controller
After the Site-to-Site VPN connection is set and running, configure Active Roles with on-premises domain controller.
Site-to-Site VPN connection on AWS
Before you begin to create a Site-to-Site VPN connection on AWS, ensure the following aspects:
-
A compatible VPN device is available and the administrator can configure it.
-
An externally facing public IPv4 address is available for the VPN device.
-
Familiarity with the IP address ranges located on the on-premises network configuration.
-
Choose the same location or region for all AWS resources.
Configuring a Site-to-Site VPN
-
Create a Customer Gateway using the Public IP address of on-premises network
-
Create a Virtual Private Gateway and attach it to the VPC.
-
Enable Route Propagation in the route table.
-
Update the Security Group.
-
Create a Site-to-Site VPN connection by choosing Customer Gateway and Virtual Private Gateway created above.
-
After the VPN connection is available, click Download Configuration to download the configuration. Download the file with the following options:
-
Configure the Customer Gateway/VPN Device.
-
Ensure the AWS Site-to-Site VPN connection Tunnel status displays UP.
For more information on creating a Site-to-Site VPN gateway connection from the on-premises network to AWS, see https://docs.aws.amazon.com/vpn/latest/s2svpn/SetUpVPNConnections.html.
After the Site-to-Site VPN is created and running configure Active Roles with the on–premise domain controller.