You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/compare-identity-solutions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: overview
12
-
ms.date: 01/22/2020
12
+
ms.date: 03/30/2020
13
13
ms.author: iainfou
14
14
15
15
#Customer intent: As an IT administrator or decision maker, I want to understand the differences between Active Directory Domain Services (AD DS), Azure AD, and Azure AD DS so I can choose the most appropriate identity solution for my organization.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/concepts-forest-trust.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 11/19/2019
12
+
ms.date: 03/30/2020
13
13
ms.author: iainfou
14
14
---
15
15
@@ -106,11 +106,11 @@ The outbound forest trust for Azure AD Domain Services is created in the Azure p
106
106
107
107
Many inter-domain and inter-forest transactions depend on domain or forest trusts in order to complete various tasks. This section describes the processes and interactions that occur as resources are accessed across trusts and authentication referrals are evaluated.
108
108
109
-
### Overview of Authentication Referral Processing
109
+
### Overview of authentication referral processing
110
110
111
111
When a request for authentication is referred to a domain, the domain controller in that domain must determine whether a trust relationship exists with the domain from which the request comes. The direction of the trust and whether the trust is transitive or nontransitive must also be determined before it authenticates the user to access resources in the domain. The authentication process that occurs between trusted domains varies according to the authentication protocol in use. The Kerberos V5 and NTLM protocols process referrals for authentication to a domain differently
112
112
113
-
### Kerberos V5 Referral Processing
113
+
### Kerberos V5 referral processing
114
114
115
115
The Kerberos V5 authentication protocol is dependent on the Net Logon service on domain controllers for client authentication and authorization information. The Kerberos protocol connects to an online Key Distribution Center (KDC) and the Active Directory account store for session tickets.
116
116
@@ -126,7 +126,7 @@ If the client uses Kerberos V5 for authentication, it requests a ticket to the s
126
126
* If yes, send the client a referral to the next domain on the trust path.
127
127
* If no, send the client a logon-denied message.
128
128
129
-
### NTLM Referral Processing
129
+
### NTLM referral processing
130
130
131
131
The NTLM authentication protocol is dependent on the Net Logon service on domain controllers for client authentication and authorization information. This protocol authenticates clients that do not use Kerberos authentication. NTLM uses trusts to pass authentication requests between domains.
132
132
@@ -142,7 +142,7 @@ If the account does not exist in the database, the domain controller determines
142
142
* If yes, pass the authentication request on to the next domain in the trust path. This domain controller repeats the process by checking the user's credentials against its own security accounts database.
143
143
* If no, send the client a logon-denied message.
144
144
145
-
### Kerberos-Based Processing of Authentication Requests Over Forest Trusts
145
+
### Kerberos-based processing of authentication requests over forest trusts
146
146
147
147
When two forests are connected by a forest trust, authentication requests made using the Kerberos V5 or NTLM protocols can be routed between forests to provide access to resources in both forests.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/create-gmsa.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: conceptual
13
-
ms.date: 11/26/2019
13
+
ms.date: 03/30/2020
14
14
ms.author: iainfou
15
15
16
16
---
@@ -27,7 +27,7 @@ This article shows you how to create a gMSA in an Azure AD DS managed domain usi
27
27
To complete this article, you need the following resources and privileges:
28
28
29
29
* An active Azure subscription.
30
-
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
31
31
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
32
32
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
33
33
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/deploy-kcd.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: conceptual
13
-
ms.date: 11/26/2019
13
+
ms.date: 03/30/2020
14
14
ms.author: iainfou
15
15
16
16
---
@@ -25,7 +25,7 @@ This article shows you how to configure resource-based Kerberos constrained dele
25
25
To complete this article, you need the following resources:
26
26
27
27
* An active Azure subscription.
28
-
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28
+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
29
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
30
30
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
31
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-windows-vm.md
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: domain-services
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 02/19/2020
11
+
ms.date: 03/30/2020
12
12
ms.author: iainfou
13
13
14
14
#Customer intent: As an server administrator, I want to learn how to join a Windows Server VM to an Azure Active Directory Domain Services managed domain to provide centralized identity and policy.
@@ -24,14 +24,14 @@ In this tutorial, you learn how to:
24
24
> * Connect the Windows Server VM to an Azure virtual network
25
25
> * Join the VM to the Azure AD DS managed domain
26
26
27
-
If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
27
+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
28
28
29
29
## Prerequisites
30
30
31
31
To complete this tutorial, you need the following resources:
32
32
33
33
* An active Azure subscription.
34
-
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34
+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35
35
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
36
36
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
37
37
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
@@ -73,8 +73,6 @@ If you already have a VM that you want to domain-join, skip to the section to [j
73
73
74
74
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over TLS. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
75
75
76
-
For now, disable direct RDP connections to the VM.
77
-
78
76
Under **Public inbound ports**, select *None*.
79
77
80
78
1. When done, select **Next: Disks**.
@@ -93,22 +91,23 @@ If you already have a VM that you want to domain-join, skip to the section to [j
93
91
94
92

95
93
96
-
1. In the left-hand menu of the virtual network window, select **Address space**. The virtual network is created with a single address space of *10.0.1.0/24*, which is used by the default subnet.
94
+
1. In the left-hand menu of the virtual network window, select **Address space**. The virtual network is created with a single address space of *10.0.2.0/24*, which is used by the default subnet. Other subnets, such as for *workloads* or Azure Bastion may also already exist.
97
95
98
96
Add an additional IP address range to the virtual network. The size of this address range and the actual IP address range to use depends on other network resources already deployed. The IP address range shouldn't overlap with any existing address ranges in your Azure or on-premises environment. Make sure that you size the IP address range large enough for the number of VMs you expect to deploy into the subnet.
99
97
100
-
In the following example, an additional IP address range of *10.0.2.0/24* is added. When ready, select **Save**.
98
+
In the following example, an additional IP address range of *10.0.5.0/24* is added. When ready, select **Save**.
101
99
102
-

100
+

103
101
104
102
1. Next, in the left-hand menu of the virtual network window, select **Subnets**, then choose **+ Subnet** to add a subnet.
105
103
106
-
1. Select **+ Subnet**, then enter a name for the subnet, such as *management*. Provide an **Address range (CIDR block)**, such as *10.0.2.0/24*. Make sure that this IP address range doesn't overlap with any other existing Azure or on-premises address ranges. Leave the other options as their default values, then select **OK**.
104
+
1. Select **+ Subnet**, then enter a name for the subnet, such as *management*. Provide an **Address range (CIDR block)**, such as *10.0.5.0/24*. Make sure that this IP address range doesn't overlap with any other existing Azure or on-premises address ranges. Leave the other options as their default values, then select **OK**.
107
105
108
106

109
107
110
108
1. It takes a few seconds to create the subnet. Once it's created, select the *X* to close the subnet window.
111
109
1. Back in the **Networking** pane to create a VM, choose the subnet you created from the drop-down menu, such as *management*. Again, make sure you choose the correct subnet and don't deploy your VM in the same subnet as your Azure AD DS managed domain.
110
+
1. For **Public IP**, select *None* from the drop-down menu, as you use Azure Bastion to connect to the management and don't need a public IP address assigned.
112
111
1. Leave the other options as their default values, then select **Management**.
113
112
1. Set **Boot diagnostics** to *Off*. Leave the other options as their default values, then select **Review + create**.
114
113
1. Review the VM settings, then select **Create**.
0 commit comments