Public beta scope: AD workflows have real-system path validation, but NOBA is still under active verification. Treat compliance evidence and self-healing claims as evaluation surfaces unless the source and configured state are shown. Read validation boundaries.

Validation Topology

NOBA's core migration flows have been validated in a real remote lab, not only against static demo data. This page documents what was exercised and where design-partner validation still matters.

Lab Shape

AreaValidated environment
SitesTwo real remote locations connected over WAN/ISP links, with a 4-host cross-site connectivity matrix verified across the final run.
VirtualizationFour Proxmox hosts used to run and isolate the test environments.
DirectoriesSamba AD DCs, Windows Server 2025 AD, and an Azure AD / Entra ID development tenant.
Flow styleConnection tests, discovery, mapping, dry-run, reconciliation, pre-flight, migration execution, authentication verification, and evidence/reporting paths.

AD Validation Evidence

AreaWhat was exercisedCurrent boundary
SyncAzure AD / Entra Graph API and Samba LDAP sync against real directory data, including role mapping, disabled-user filtering, and cross-directory linking.Small directory sizes; 1000+ user performance remains a design-partner validation target.
Migration directionsLDAP-to-LDAP, Azure-to-LDAP, LDAP-to-Azure, and broader MSAD/Samba/Azure direction coverage recorded in the AD PoC.Path coverage is strong; customer-scale row-volume testing is still needed.
Windows AD behaviorServer 2025 LDAPS via ADCS, LDAP signing-sensitive paths, PSO detection, nested groups via MATCHING_RULE_IN_CHAIN, tombstones, AdminCount/AdminSDHolder, and service-account SPN discovery.SID history and some cutover-specific enterprise policies still need customer-context validation.
LAPS and machinesWindows LAPS lifecycle: schema, domain join, LDAP password read, expiry freeze, encrypted-password behavior, and machine OU move preserving LAPS passwords.BitLocker recovery-key backup and machine unjoin/rejoin remain bounded until exercised on the right endpoint setup.
Scale100-user throughput runs recorded at 1.0-8.8 users/sec on the SQLite-backed beta test profile while the same 4-host Proxmox lab was also carrying cross-site AD validation; 484/491 AD tests passed, with expected failures documented.This is workflow path coverage and small-load evidence, not a known AD architecture ceiling. PostgreSQL and Redis-backed caching are available for heavier deployments, but multi-thousand-user validation still requires customer or design-partner infrastructure.

What This Proves

Recent Gap Closure

What Still Needs Broader Validation

How Design Partners Should Evaluate

  1. Start with the mock-data cross-domain demo to understand the operator flow.
  2. Install the beta in a controlled lab environment and connect non-production directories first.
  3. Run discovery, mapping, reconciliation, and dry-run paths before any write-side execution.
  4. Define explicit rollback and cutover criteria before testing production-like data.

This is deliberate beta positioning: NOBA has gone beyond toy validation, but customer-scale proof still requires customer-scale environments and willing design partners.