Product Feature Differences in Version 7 between Active Directory and Entra ID for user directory
This is a list of the key product feature differences when deploying MyWorkDrive on a domain joined server with Active Directory for user database/identity vs a stand alone server using Entra ID for identity. Features not listed here are equivalently available in either configuration
Feature | Active Directory | Entra ID |
---|---|---|
User database / access | Active Directory, via LDAP | Entra ID via GraphAPI |
Server Computer Account | Must be Windows domain joined | No Domain Required |
Windows File Share Access | via SMB and NTFS in the user context | Uses a service account |
Azure File Share | via SMB or Connection String | via Connection String or Entra ID |
Azure Blob Storage | via Connection String | Via Connection String, Entra ID, Entra ID with Hierarchal namespac |
Managed Identity for Azure VM | Not Supported | With Entra ID Auth for Blob and Azure File Share - Preferred method |
MFA | Native with Duo or as configured in SSO Provider | Native in Microsoft Login |
SSO Sign In | via SAML | Native Microsoft Login |
User/Pass Sign in | Optional with Domain Credentials | Not Available |
Clustering of Config Files | Optional via SMB Storage | Not Currently Available (In Development) |
Guest User via Microsoft B2B | MyWorkDrive Guest User Access Process | Natively Microsoft Guest user in Entra ID |
WevDav | Optionally available | Not Available |
Teams Client | Optionally available | Not available |
File and Folder Level Permissions | NTFS Permissions via SMB | ACL via Azure Blob with Hierarchical Namespace |
Search | Windows Search Service, dTSearch | Not Available |
File Locking | Applied on SMB, Internal to MyWorkDrive for other storage types | No external locks are applied. Locks exclusively internal to MyWorkDrive |
We appreciate your feedback. If you have any questions, comments, or suggestions about this article please contact our support team at support@myworkdrive.com.