For IT teams evaluating on-premises internal communications software, the deployment model itself is only part of the story. How the software integrates with existing security infrastructure is equally important and often where otherwise-capable platforms fall short.
Active Directory Integration
Active Directory is the directory service at the heart of most enterprise IT environments. It holds the authoritative record of every user account, their attributes, their group memberships, and their access rights. Any on-premises software that needs to know who your employees are, what department they work in, and what their role is should be consuming that information from Active Directory, not maintaining a parallel, manually-managed user database.
For an internal communications platform, this matters in several specific ways:
User provisioning and deprovisioning. When an employee joins, their AD account is created and they should automatically become available in the communications platform, without manual intervention from an administrator. When they leave, their AD account is disabled and they should be immediately removed from all platform access. Any gap in this cycle is a security and compliance risk.
Audience targeting. The power of a well-deployed internal communications platform is the ability to target messages to specific groups, by department, location, role level, or any other attribute. Whether delivering a desktop alert to a single site or a desktop ticker to a specific department, in an AD-integrated deployment those groups already exist. IT should not have to rebuild organisational structure inside a communications tool; the platform should read it from AD directly.
Attribute synchronisation. Beyond basic group membership, richer AD attributes, cost centre, manager hierarchy, site location, employment type, can drive more sophisticated targeting. A platform that can sync and filter on arbitrary AD attributes gives communicators significantly more precision without adding IT overhead.
Single Sign-On and SAML Authentication
Single sign-on is a non-negotiable requirement in most enterprise environments. Employees should authenticate to the communications platform using their existing corporate credentials, not a separate username and password. This has security implications (one credential to manage, one credential to revoke) and practical ones (employees will not engage with a tool that requires a separate login they inevitably forget).
SAML 2.0 is the standard protocol for enterprise SSO federation, and integration with identity providers including Microsoft Entra ID (formerly Azure AD), Active Directory Federation Services (ADFS), Okta, Ping Identity, and others should be a baseline expectation for any on-premises deployment.
For highly regulated environments, this integration is not optional. A communications platform that maintains its own authentication layer is an additional credential system to manage, audit, and secure, and most IT security teams will not accept that overhead.
Group Sync and Audience Management
Group synchronisation, keeping the communications platform's audience groups in step with AD group membership in real time, is where many platforms that claim AD integration fall short. There is a meaningful difference between:
- Reading user data from AD at initial setup (basic integration)
- Synchronising user data from AD on a scheduled basis (adequate, but creates lag)
- Maintaining a live, event-driven sync that reflects AD changes immediately (genuine integration)
For communications purposes, the lag matters. If an employee changes department and it takes 24 hours to be reflected in the communications platform, they may receive a day's worth of messages from their old team and miss a day's worth from their new one. In compliance-sensitive environments, where acknowledgement of a specific communication may need to be attributable to a specific role, this lag is unacceptable.
The practical question to ask any vendor: if an employee is added to an AD group at 9:00am, at what point can a communicator in the platform target that employee as part of that group?
Network and Perimeter Security
An on-premises deployment should be architecturally compatible with the organisation's existing network security model. This means:
No mandatory outbound internet connectivity for core functionality. The platform should operate fully within the internal network for all core communication delivery, sending messages, tracking acknowledgements, managing audiences. Any external connectivity requirements (for updates, for vendor support) should be optional, explicit, and audited.
Compatibility with network segmentation. Many enterprise networks are significantly segmented, different VLANs for different departments, separate networks for regulated vs non-regulated functions. The communications platform should be deployable in a way that allows it to reach across segments where required, using existing network controls rather than requiring new firewall exceptions.
Proxy and certificate support. In environments where outbound traffic is inspected via a proxy or SSL inspection is in place, the platform should support these configurations without requiring exceptions that would undermine the organisation's security controls.
Agent deployment via existing tooling. The client-side component of the platform, typically a lightweight agent installed on managed devices that powers channels including desktop alerts, screensavers, and wallpaper management, should be deployable via the organisation's existing software distribution tooling: Group Policy, SCCM, Intune, or similar. Requiring a separate deployment mechanism is an unnecessary overhead and creates a shadow IT footprint that IT security teams are rightly reluctant to accept.