

The organization realizes that the traditional network perimeter is no longer sufficient and a zero trust architecture is needed. The on-premises components and system interactions add a new layer of additional complexity that need a passwordless and MFA strategy. The On-premises and Cloud Organization already has guidance and a strategy from the Cloud Native Organization that addresses cloud based SaaS applications and system sign-in. Some on-premises applications require physical smart cards to authenticate.Some on-premises applications use RADIUS authentication and require MFA controls.

Have not synchronized computer objects to the Azure AD tenant.Have not synchronized the on-premises users to the Azure AD tenant.May have federated some of their on-premises applications with AD FS using WS-Federation and SAML or OpenID Connect.May leverage Active Directory (AD) and Active Directory Federation Services (AD FS) infrastructure for authentication of users, applications, and systems for on-premises and external users.Some of these applications are not federated with Azure AD. May utilize SaaS applications for productivity (Office 365), HR, scheduling, CRM, and other Line of Business Applications.Generally using multiple MFA providers such as Azure MFA, application specific MFA, or third-party solutions. May use different MFA controls, sometimes using smart phones with TOTP, push notifications, or SMS.May leverage Azure AD as a primary identity provider and for federation.In this scenario a representative On-premises and Cloud Organization: On-premises + Cloud Organization Components
