<p>I’m posting this as answer mainly because everyone has their own “educated opinion” based on experience, 3rd party info, hearsay, and tribal knowledge within IT, but this is more a list of citations and readings “directly” from Microsoft. I used quotes because I’m sure they don’t properly filter all opinions made by their employees, but this should prove helpful nonetheless if you are after <code>authoritative</code> references direct from Microsoft.</p>
<p><strong>BTW,</strong> I also think it is VERY EASY to say DOMAIN CONTROLLER == ACTIVE DIRECTORY, which isn’t quite the case. AD FS proxies and other means (forms based auth for OWA, EAS, etc.) offer a way to “expose” AD itself to the web to allow clients to at least attempt to authenticate via AD without exposing the DCs themselves. Go on someone’s OWA site and attempt to login and AD <strong>will</strong> get the request for authentication on a backend DC, so AD is technically “exposed”…but is secured via SSL and proxied through an Exchange server.</p>
<h2><a name="p-32776-citation-1-1" class="anchor" href="#p-32776-citation-1-1" aria-label="Heading link"></a>Citation <span class="hashtag-raw">#1</span></h2>
<p><a href="http://msdn.microsoft.com/en-us/library/windowsazure/jj156090.aspx">Guidelines for Deploying Windows Server Active Directory on Windows Azure Virtual Machines</a></p>
<p>Before you go “Azure isn’t AD”…you CAN deploy ADDS on an Azure VM.</p>
<p>But to quote the relevant bits:</p>
<blockquote></blockquote>
<p><strong>Never expose STSs directly to the Internet.</strong></p>
<p>As a security best practice, place STS instances behind a firewall and<br>
connect them to your corporate network to prevent exposure to the<br>
Internet. This is important because the STS role issues security<br>
tokens. As a result, <strong>they should be treated with the same level of<br>
protection as a domain controller.</strong> If an STS is compromised, malicious<br>
users have the ability to issue access tokens potentially containing<br>
claims of their choosing to relying party applications and other STSs<br>
in trusting organizations.</p>
<p>ergo…don’t expose domain controllers directly to the internet.</p>
<h2><a name="p-32776-citation-2-2" class="anchor" href="#p-32776-citation-2-2" aria-label="Heading link"></a>Citation <span class="hashtag-raw">#2</span></h2>
<p><a href="http://technet.microsoft.com/en-us/magazine/ff848710.aspx">Active Directory - The UnicodePwd Mystery of AD LDS</a></p>
<blockquote></blockquote>
<p><strong>Exposing a domain controller to the Internet is normally a bad<br>
practice, whether that exposure comes directly from the production<br>
environment or through a perimeter network.</strong> The natural alternative is<br>
to place a Windows Server 2008 server with Active Directory<br>
Lightweight Directory Services (AD LDS) role running in the perimeter<br>
network.</p>
<h2><a name="p-32776-citation-3-not-from-msbut-useful-still-in-looking-ahead-3" class="anchor" href="#p-32776-citation-3-not-from-msbut-useful-still-in-looking-ahead-3" aria-label="Heading link"></a>Citation <span class="hashtag-raw">#3</span> - not from MS…but useful still in looking ahead</h2>
<p><a href="http://betanews.com/2013/07/12/active-directory-as-a-service-azure-intune-hinting-at-a-cloud-hosted-ad-future/">Active Directory-as-a-Service? Azure, Intune hinting at a cloud-hosted AD future</a></p>
<blockquote></blockquote>
<p>In the end, there is no great “short” answer which meets the goals of<br>
ridding the office of the AD server in exchange for an Azure<br>
alternative. While Microsoft is being complacent in allowing customers<br>
to host Active Directory Domain Services on Server 2012 and 2008 R2<br>
boxes in Azure, their usefulness is only as good as the VPN<br>
connectivity you can muster for your staff. DirectAccess, while a very<br>
promising technology, has its hands tied due to its own unfortunate<br>
limitations.</p>
<h2><a name="p-32776-citation-4-4" class="anchor" href="#p-32776-citation-4-4" aria-label="Heading link"></a>Citation <span class="hashtag-raw">#4</span></h2>
<p><a href="http://technet.microsoft.com/en-us/library/dn509513.aspx">Deploy AD DS or AD FS and Office 365 with single sign-on and Windows Azure Virtual Machines</a></p>
<blockquote></blockquote>
<p>Domain controllers and AD FS servers should never be exposed directly<br>
to the Internet and should only be reachable through VPN</p>