Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

6.5.1. On-Premises and Cloud Identity Platforms

💡 First Principle: Identity platforms are the authoritative source of truth for who exists in the organization, what groups they belong to, and what credentials they hold — every authentication and authorization decision ultimately traces back to the identity platform's data.

On-premises identity platforms:
PlatformProtocolPrimary UseKey Characteristics
Active Directory (AD)Kerberos, NTLM, LDAPWindows domain authenticationDomain controllers, Group Policy, trust relationships, KRBTGT
LDAP directoriesLDAPv3Cross-platform directory queriesHierarchical (DN, OU, CN), read-optimized, bind authentication
RADIUSRADIUS (UDP 1812/1813)Network access authenticationAAA for VPN, WiFi (802.1X), network devices; centralized policy
Cloud identity platforms:
PlatformStandardsUse Case
Microsoft Entra ID (Azure AD)OIDC, SAML, OAuth 2.0Microsoft 365, Azure, hybrid AD environments
OktaOIDC, SAML, SCIMSaaS SSO, workforce identity, lifecycle management
Google Workspace IdentityOIDC, SAMLGoogle ecosystem, GCP IAM
AWS IAM / IAM Identity CenterSAML, OIDCAWS resource access, cross-account federation

Hybrid identity connects on-premises AD with cloud identity through synchronization (Azure AD Connect, Okta AD Agent). Users authenticate once and access both on-premises and cloud resources. The synchronization creates a shared identity plane — but also means a compromise of on-premises AD can propagate to cloud resources through synced credentials.

Directory services architecture: LDAP directories use a hierarchical namespace: CN=John Smith,OU=Engineering,DC=company,DC=com. The bind operation is how LDAP authenticates — the client sends a distinguished name (DN) and password, and the directory returns success or failure. Simple bind sends credentials in cleartext; LDAP over TLS (LDAPS, port 636) encrypts the bind operation.

⚠️ Exam Trap: LDAP is a directory access protocol, not an authentication protocol. LDAP can be used for authentication (via the bind operation), but its primary purpose is querying directory information — user attributes, group memberships, organizational structure. The exam distinguishes between protocols designed for authentication (Kerberos, RADIUS) and protocols that can perform authentication as a secondary function (LDAP).

Reflection Question: An organization uses on-premises Active Directory synchronized to Azure AD via Azure AD Connect. An attacker compromises a domain controller on-premises. Explain how this compromise could propagate to cloud resources, what specific artifacts the attacker could leverage, and what architectural controls would limit the blast radius.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications