Modernizing PowerBuilder Security with Windows Authentication

A Strategic Approach to Enterprise Security and User Experience

The Current Enterprise Authentication Landscape

In today’s complex IT environments, authentication and identity management present significant challenges across organizations of all sizes. According to the 2022 Verizon Data Breach Investigations Report, approximately 80% of data breaches involve compromised credentials, highlighting the critical importance of robust authentication systems.

The Challenge of Mixed Application Portfolios

Enterprises typically maintain a heterogeneous application portfolio that includes:

  • Legacy applications built with technologies like PowerBuilder
  • Modern web applications using contemporary frameworks
  • Third-party commercial off-the-shelf (COTS) solutions
  • Cloud-based SaaS applications

This diversity creates significant challenges for IT departments, particularly around authentication and security governance. End users must navigate multiple authentication systems, while IT teams struggle to maintain consistent security policies across disparate platforms.

The password problem

The reality of password management presents substantial operational challenges:

  • Studies show the average enterprise employee manages between 20–30 different passwords
  • IT departments spend approximately 20–30% of help desk time on password-related issues
  • Password reuse across systems remains common despite security policies
  • Each additional login requirement creates friction and reduces productivity
Password Problem

Increasing Compliance and Security Requirements

Modern regulatory environments (GDPR, HIPAA, SOX, etc.) demand:

  • Robust authentication mechanisms
  • Comprehensive audit trails
  • Fine-grained access controls Regular security assessments

Increasing Compliance and Security Requirements

Understanding On-Premises AD vs. Entra ID

It is important to distinguish between on-premises Active Directory (AD) and Entra ID (formerly Azure AD). While both are part of Microsoft’s identity offerings, on-premises AD typically relies on Kerberos/NTLM for Windows Integrated Authentication, whereas Entra ID supports modern protocols such as OAuth 2.0, OpenID Connect, and SAML.

Enterprises often operate in a hybrid model, where Entra ID and on-premises AD coexist. This can include scenarios where users log in with Windows Integrated Authentication on local network devices, while remote or cloud-based users rely on token-based methods (e.g., OAuth 2.0) through Entra ID.

Comparison Active Directory Entra ID

PowerBuilder Authentication Challenges

PowerBuilder applications, while robust and reliable for business operations, present specific authentication challenges in modern environments:

Technical Limitations

Traditional PowerBuilder applications often rely on proprietary authentication methods that don’t integrate seamlessly with modern identity providers. This disconnect creates several challenges:

  • Native integration with modern identity providers requires significant code modifications
  • Standard approaches to Windows Authentication might demand complex middleware or custom development
  • Implementing modern protocols like OAuth 2.0 requires extensive programming effort
  • Security updates and patches must be managed separately for each authentication system.

Business Impact

These technical limitations translate into tangible business challenges:

  • Higher operational costs for maintaining separate authentication systems
  • Security inconsistencies between modern and legacy applications
  • Poor user experience with multiple login requirements
  • Compliance gaps in authentication policies leading to audit findings

Integration Complexity

Connecting PowerBuilder applications to on-premises AD or Entra ID traditionally requires custom development efforts that can be both costly and time-consuming. 

With approximately 65% - or more, depending on the study - of enterprises still using Active Directory as their primary identity management system, bridging this gap efficiently becomes a critical business need.

Active Directory Usage

The Strategic Value of Windows Authentication for PowerBuilder

Unified Identity Management

Integrating PowerBuilder with Windows Authentication delivers several strategic benefits that address core business challenges:

  • Consolidated Identity Infrastructure: Leverage existing investments in Microsoft identity platforms, whether on-prem AD or Entra ID.
  • Simplified User Experience: Enable seamless authentication without additional credentials.
  • Enhanced Security Posture: Apply consistent security policies across all applications.
  • Reduced Administrative Overhead: Centralize user management and provisioning.

Business Benefits

Organizations implementing Windows Authentication for PowerBuilder applications typically experience:

  • Significant reduction in password-related help desk tickets
  • Improved user satisfaction with application access
  • Reduced security risks associated with credential management
  • Accelerated compliance certification processes

Technical Requirements for Modern PowerBuilder Authentication

Successfully implementing Windows Authentication for PowerBuilder applications requires addressing several technical challenges through a comprehensive approach:

Integration with Entra ID and Active Directory
Effective integration requires:

  • Secure communication between PowerBuilder and identity providers
  • Proper handling of authentication tokens and session management
  • Support for both on-premises AD (Kerberos/NTLM) and cloud-based Entra ID (OAuth 2.0, OpenID Connect, SAML)
  • Flexible configuration options for different deployment scenarios (on-premises, cloud, or hybrid)

Single Sign-On Implementation
Creating a seamless authentication experience requires:

  • Session persistence across application boundaries
  • Configurable authentication flows for different business scenarios
  • Support for multiple identity providers in complex environments
  • Appropriate timeout and session management controls

Role-Based Access Control
Effective authorization requires:

  • Mapping between Windows groups (or Entra ID groups) and application permissions
  • Fine-grained access control at feature and data levels
  • Dynamic permission evaluation as user roles change
  • Centralized policy management for consistency

Audit and Compliance Features
Meeting regulatory requirements demands:

  • Comprehensive logging of authentication events
  • User activity tracking and reporting
  • Security incident detection capabilities
  • Compliance reporting for auditors and regulators

Visual Guard: Bridging PowerBuilder & Modern Authentication

Visual Guard provides a comprehensive solution to the challenges of integrating PowerBuilder applications with Windows Authentication, whether with Active Directory or Entra ID, offering a plug-and-play approach that significantly reduces development effort.

Seamless Integration with Microsoft Identity Platforms

Visual Guard enables PowerBuilder developers to easily implement:

  • Windows Integrated Authentication against on-premises Active Directory (using Kerberos/NTLM)
  • Modern token-based authentication with Entra ID (formerly Azure AD)
  • Hybrid authentication scenarios for organizations transitioning between on-premises AD and cloud services
  • Flexible configuration with minimal code changes

Unified Authentication Across Application Portfolios

A key advantage of Visual Guard is its ability to harmonize authentication across heterogeneous application landscapes:

  • Consistent authentication experience across PowerBuilder and modern applications
  • Unified security policies regardless of application technology
  • Centralized management of user identities and permissions
  • Bridging of legacy systems with modern security practices

Technical Implementation: A Plug & Play Solution

One of the most compelling benefits of Visual Guard is that it encapsulates the complexity of connecting PowerBuilder to modern or traditional identity providers. Rather than requiring extensive custom code, Visual Guard typically leverages:

  • Pre-built Components: Adapters and libraries specifically designed for PowerBuilder, reducing the need for custom middleware.
  • Configuration-Driven Approach: Many authentication flows and token-handling processes are set up through configuration, rather than hardcoded logic.
  • Context Retrieval: Visual Guard can retrieve the authenticated user context (whether a Windows token or OAuth/OpenID token) and pass it to the PowerBuilder application.
  • Group/Role Synchronization: Automatically maps Windows groups or Entra ID groups/roles to application-level permissions without requiring major PowerBuilder code refactoring.

This "plug-and-play" approach significantly reduces the development burden and makes ongoing maintenance more manageable, as security updates are handled within the Visual Guard framework rather than in each application individually.

A Hybrid Approach to Transition from Active Directory to Entra ID

The use of a hybrid architecture (AD + Entra ID) is particularly relevant when an organization:

  • Already has an on-premise AD for account management and Windows stations (Kerberos/NTLM),
  • Wishes to benefit from Entra ID (formerly Azure AD) services for modernized authentication (OAuth 2.0, OpenID Connect, MFA) and/or for access to cloud applications,
  • Is in a transition phase: it is not possible, or not desired, to switch all applications to Entra ID all at once (for functional, regulatory or compatibility reasons).

How hybrid authentication works

In concrete terms, Azure AD Connect is often used to synchronize (or federate) on-premise AD accounts to Entra ID. In this way, the organization maintains a single repository of accounts (mainly in AD), but benefits from cloud functionalities (SSO for SaaS, MFA, etc.).

Internal users continue to log on to Windows via AD, while those connecting from outside can use Entra ID (often via OAuth or OpenID tokens).

Key definitions

Azure AD Connect
Microsoft tool that synchronizes on-premises Active Directory objects (users, groups, passwords) with Entra ID (formerly Azure AD). It supports various modes of integration (Password Hash Sync, Pass-Through Authentication, or Federation), enabling hybrid identity scenarios.

Identity Federation
A mechanism for establishing a trusted relationship between different authentication systems, often via protocols such as SAML, OpenID Connect, or OAuth 2.0. Federation allows users to authenticate once and access multiple applications or services across organizational or domain boundaries.

SSO (Single Sign-On)
A process in which a user authenticates once and gains access to multiple applications without being prompted to log in again. In hybrid environments, SSO can leverage Kerberos tickets for on-premises scenarios or OAuth tokens from Entra ID for cloud-based apps.

MFA (Multi-Factor Authentication)
A security measure requiring two or more proofs of identity (e.g., password + SMS code, or password + biometrics). Even in a hybrid setup, MFA can be enforced through Entra ID, enhancing protection against compromised credentials.

Hybrid Identity
A strategy where organizations maintain both on-premises AD and cloud-based Entra ID, typically syncing accounts via Azure AD Connect. This enables gradual migration to the cloud while preserving existing investments in AD and Windows-based authentication.

The role of Visual Guard in hybrid architecture

In such a configuration, Visual Guard is added to manage authentication and authorization in PowerBuilder applications (and possibly other apps) in a consistent manner:

  • If the user is on the LAN, the application can validate their identity via the Kerberos/NTLM ticket from AD.
  • If the user is off the LAN, the application can rely on Entra ID and an OAuth/OpenID token.
  • All while remaining synchronized thanks to Azure AD Connect or an equivalent mechanism, until the organization has completely migrated to Entra ID, if it so wishes.

Example of a Hybrid Architecture

  1. User Sign-In:
    • On-premises workstation: The user logs into Windows, receiving a Kerberos/NTLM ticket from the domain controller.
    • Remote/Cloud access: The user accesses the application from outside the corporate network, authenticating with Entra ID (OAuth/OpenID Connect token).
  2. Visual Guard Integration:
    • PowerBuilder calls a Visual Guard component at startup to verify the user's credentials or tokens.
    • Visual Guard either validates the Windows ticket against AD or exchanges the OAuth token with Entra ID.
  3. Permission Mapping:
    • Visual Guard maps the user's Windows/Entra ID groups or roles to specific application permissions.
  4. Session Persistence:
    • For an SSO experience, Visual Guard manages session tokens or cookies (in web-based scenarios) to avoid repeated logins.
  5. Application Access:
    • The user proceeds with normal PowerBuilder operations, with Visual Guard enforcing role-based security behind the scenes.

Hybrid Approach: AD + Entra ID with Visual Guard

Benefits of the hybrid approach

  • Gradual transition:
    Enables migration to the cloud over time
  • Consistent user experience:
    seamless authentication regardless of location
  • Enhanced security:
    MFA can be added to existing applications
  • Investment protection:
    No need to redevelop PowerBuilder applications
  • Future-proof:
    Infrastructure ready for eventual full migration to Entra ID

Beyond Authentication: Comprehensive Application Security

Visual Guard extends beyond basic authentication to help organizations maintain a robust security posture aligned with modern standards while streamlining administrative tasks and reducing overhead.

PowerBuilder Application Permissions

Fine-Grained Permission Management
Mapping users and groups (Windows, Entra ID, or custom) to specific application features, data elements, or business functions. This model allows for dynamic permission updates and avoids the pitfalls of simple static role management.

MFA for PowerBuilder

Multi-Factor Authentication
Adding a second factor to the authentication flow, considerably enhancing security and reducing the risk of compromise through ID theft. Visual Guard can support a variety of mechanisms (OTP, SMS, validation app) depending on business needs.

Audit PowerBuilder Application Security

Detailed Audit Logging & Monitoring
Centralized logs capturing every user action (authentication, authorization decisions, data access, etc.), complemented by monitoring dashboards or automated alerts. This audit trail is critical for incident response, forensics, and compliance with regulations like GDPR, HIPAA, or SOX.

Automate Security operations in PB Apps

Security Automations:
Workflows for creating or modifying accounts and roles
Automated user lifecycle management (provisioning/deprovisioning)
Notification and escalation in case of unauthorized access attempts or sensitive privilege requests

Conclusion

In today's complex security landscape, organizations must balance robust security with user experience across their application portfolios. PowerBuilder applications, while reliable and mission-critical, must evolve to meet modern authentication requirements without extensive redevelopment.

By implementing Windows Authentication through Visual Guard, organizations can modernize their PowerBuilder applications with minimal disruption, while delivering consistent security experiences across on-premises AD and cloud-based Entra ID infrastructures. This strategic approach not only enhances security and compliance but also improves user satisfaction and operational efficiency.

As Microsoft continues to evolve its identity platforms under the Entra ID umbrella, organizations with PowerBuilder applications can confidently move forward, knowing their authentication infrastructure can adapt to future changes while preserving existing investments