You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/active-directory-ds-networking.md
+34-15Lines changed: 34 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Networking considerations for Azure Active Directory Domain Service
4
4
services: active-directory-ds
5
5
documentationcenter: ''
6
6
author: mahesh-unnikrishnan
7
-
manager: stevenpo
7
+
manager: mahesh-unnikrishnan
8
8
editor: curtand
9
9
10
10
ms.assetid: 23a857a5-2720-400a-ab9b-1ba61e7b145a
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: article
16
-
ms.date: 09/23/2017
16
+
ms.date: 12/01/2017
17
17
ms.author: maheshu
18
18
19
19
---
@@ -36,7 +36,7 @@ The following guidelines help you select a virtual network to use with Azure AD
36
36
* See the [Azure services by region](https://azure.microsoft.com/regions/#services/) page to know the Azure regions in which Azure AD Domain Services is available.
37
37
38
38
### Requirements for the virtual network
39
-
***Proximity to your Azure workloads**: Select the virtual network that currently hosts/will host virtual machines that need access to Azure AD Domain Services. You may also choose to connect virtual networks if your workloads are deployed in a different virtual network than the managed domain.
39
+
***Proximity to your Azure workloads**: Select the virtual network that currently hosts/will host virtual machines that need access to Azure AD Domain Services. If your workloads are deployed in a different virtual network than the managed domain, you may also choose to connect the virtual networks.
40
40
***Custom/bring-your-own DNS servers**: Ensure that there are no custom DNS servers configured for the virtual network. An example of a custom DNS server is an instance of Windows Server DNS running on a Windows Server VM that you have deployed in the virtual network. Azure AD Domain Services does not integrate with any custom DNS servers deployed within the virtual network.
41
41
***Existing domains with the same domain name**: Ensure that you do not have an existing domain with the same domain name available on that virtual network. For instance, assume you have a domain called 'contoso.com' already available on the selected virtual network. Later, you try to enable an Azure AD Domain Services managed domain with the same domain name (that is 'contoso.com') on that virtual network. You encounter a failure when trying to enable Azure AD Domain Services. This failure is due to name conflicts for the domain name on that virtual network. In this situation, you must use a different name to set up your Azure AD Domain Services managed domain. Alternately, you can de-provision the existing domain and then proceed to enable Azure AD Domain Services.
42
42
@@ -45,12 +45,11 @@ The following guidelines help you select a virtual network to use with Azure AD
45
45
>
46
46
>
47
47
48
-
## Network Security Groups and subnet design
49
-
A [Network Security Group (NSG)](../virtual-network/virtual-networks-nsg.md) contains a list of Access Control List (ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet. In addition, traffic to an individual VM can be restricted further by associating an NSG directly to that VM.
* Deploy Azure AD Domain Services to a **separate dedicated subnet** within your Azure virtual network.
55
54
* Do not apply NSGs to the dedicated subnet for your managed domain. If you must apply NSGs to the dedicated subnet, ensure you **do not block the ports required to service and manage your domain**.
56
55
* Do not overly restrict the number of IP addresses available within the dedicated subnet for your managed domain. This restriction prevents the service from making two domain controllers available for your managed domain.
@@ -61,20 +60,40 @@ A [Network Security Group (NSG)](../virtual-network/virtual-networks-nsg.md) con
61
60
>
62
61
>
63
62
64
-
###Ports required for Azure AD Domain Services
63
+
## Ports required for Azure AD Domain Services
65
64
The following ports are required for Azure AD Domain Services to service and maintain your managed domain. Ensure that these ports are not blocked for the subnet in which you have enabled your managed domain.
66
65
67
-
| Port number | Purpose |
68
-
| --- | --- |
69
-
| 443 |Synchronization with your Azure AD tenant |
70
-
| 3389 |Management of your domain |
71
-
| 5986 |Management of your domain |
72
-
| 636 |Secure LDAP (LDAPS) access to your managed domain |
66
+
| Port number | Required? | Purpose |
67
+
| --- | --- | --- |
68
+
| 443 | Mandatory |Synchronization with your Azure AD tenant |
69
+
| 5986 | Mandatory | Management of your domain |
70
+
| 3389 | Optional | Management of your domain |
71
+
| 636 | Optional | Secure LDAP (LDAPS) access to your managed domain |
72
+
73
+
**Port 443 (Synchronization with Azure AD)**
74
+
* It is used to synchronize your Azure AD directory with your managed domain.
75
+
* It is mandatory to allow access to this port in your NSG. Without access to this port, your managed domain is not in sync with your Azure AD directory. Users may not be able to sign in as changes to their passwords are not synchronized to your managed domain.
76
+
* You can restrict inbound access to this port to IP addresses belonging to the Azure IP address range.
73
77
74
-
Port 5986 is used to perform management tasks using PowerShell remoting on your managed domain. The domain controllers for your managed domain do not usually listen on this port. The service opens this port on managed domain controllers only when a management or maintenance operation needs to be performed for the managed domain. As soon as the operation completes, the service shuts down this port on the managed domain controllers.
78
+
**Port 5986 (PowerShell remoting)**
79
+
* It is used to perform management tasks using PowerShell remoting on your managed domain.
80
+
* It is mandatory to allow access through this port in your NSG. Without access to this port, your managed domain cannot be updated, configured, backed-up, or monitored.
81
+
* You can restrict inbound access to this port to the following source IP addresses: 52.180.183.8, 23.101.0.70, 52.225.184.198, 52.179.126.223, 13.74.249.156, 52.187.117.83, 52.161.13.95, 104.40.156.18, 104.40.87.209, 52.180.179.108, 52.175.18.134, 52.138.68.41, 104.41.159.212, 52.169.218.0, 52.187.120.237, 52.161.110.169, 52.174.189.149, 13.64.151.161
82
+
* The domain controllers for your managed domain do not usually listen on this port. The service opens this port on managed domain controllers only when a management or maintenance operation needs to be performed for the managed domain. As soon as the operation completes, the service shuts down this port on the managed domain controllers.
75
83
76
-
Port 3389 is used for remote desktop connections to your managed domain. This port also remains largely turned off on your managed domain. The service enables this port only if we need to connect to your managed domain for troubleshooting purposes, initiated in response to a service request you initiate. This mechanism is not used on an ongoing basis since management and monitoring tasks are performed using PowerShell remoting. This port is used only in the rare event that we need to connect remotely to your managed domain for advanced troubleshooting. The port is closed as soon as the troubleshooting operation is complete.
84
+
**Port 3389 (Remote desktop)**
85
+
* It is used for remote desktop connections to domain controllers for your managed domain.
86
+
* Opening this port through your NSG is optional.
87
+
* This port also remains largely turned off on your managed domain. This mechanism is not used on an ongoing basis since management and monitoring tasks are performed using PowerShell remoting. This port is used only in the rare event that Microsoft needs to connect remotely to your managed domain for advanced troubleshooting. The port is closed as soon as the troubleshooting operation is complete.
77
88
89
+
**Port 636 (Secure LDAP)**
90
+
* It is used to enable secure LDAP access to your managed domain over the internet.
91
+
* Opening this port through your NSG is optional. Open the port only if you have secure LDAP access over the internet enabled.
92
+
* You can restrict inbound access to this port to the source IP addresses from which you expect to connect over secure LDAP.
93
+
94
+
95
+
## Network Security Groups
96
+
A [Network Security Group (NSG)](../virtual-network/virtual-networks-nsg.md) contains a list of Access Control List (ACL) rules that allow or deny network traffic to your VM instances in a Virtual Network. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet. In addition, traffic to an individual VM can be restricted further by associating an NSG directly to that VM.
78
97
79
98
### Sample NSG for virtual networks with Azure AD Domain Services
80
99
The following table illustrates a sample NSG you can configure for a virtual network with an Azure AD Domain Services managed domain. This rule allows inbound traffic over the required ports to ensure your managed domain stays patched, updated and can be monitored by Microsoft. The default 'DenyAll' rule applies to all other inbound traffic from the internet.
Copy file name to clipboardExpand all lines: articles/active-directory/active-directory-coreapps-assign-user-azure-portal.md
+76-9Lines changed: 76 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Assign a user or group to an enterprise app in Azure Active Directory | M
3
3
description: How to select an enterprise app to assign a user or group to it in Azure Active Directory
4
4
services: active-directory
5
5
documentationcenter: ''
6
-
author: curtand
7
-
manager: femila
6
+
author: daveba
7
+
manager: mtillman
8
8
editor: ''
9
9
10
10
ms.assetid: 5817ad48-d916-492b-a8d0-2ade8c50a224
@@ -13,22 +13,24 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: article
16
-
ms.date: 08/28/2017
17
-
ms.author: curtand
16
+
ms.date: 11/30/2017
17
+
ms.author: daveba
18
18
19
-
ms.reviewer: asteen
19
+
ms.reviewer: luleon
20
20
21
21
---
22
22
# Assign a user or group to an enterprise app in Azure Active Directory
23
-
It's easy to assign a user or a group to your enterprise applications in Azure Active Directory (Azure AD). You must have the appropriate permissions to manage the enterprise app, and you must be global admin for the directory.
23
+
To assign a user or group to an enterprise app, you must have the appropriate permissions to manage the enterprise app, and you must be global admin for the directory.
24
+
> [!NOTE]
25
+
> For Microsoft Applications (such asOffice 365 apps), use PowerShell to assign users to an enterprise app.
24
26
25
-
## How do I assign user access to an enterprise app?
27
+
## How do I assign user access to an enterprise app in the Azure portal?
26
28
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a global admin for the directory.
27
29
2. Select **More services**, enter Azure Active Directory in the text box, and then select **Enter**.
28
30
3. On the **Azure Active Directory - *directoryname*** blade (that is, the Azure AD blade for the directory you are managing), select **Enterprise applications**.
4. On the **Enterprise applications** blade, select **All applications**. You'll see a list of the apps you can manage.
33
+
4. On the **Enterprise applications** blade, select **All applications**. This lists the apps you can manage.
32
34
5. On the **Enterprise applications - All applications** blade, select an app.
33
35
6. On the ***appname*** blade (that is, the blade with the name of the selected app in the title), select **Users & Groups**.
34
36
@@ -39,7 +41,72 @@ It's easy to assign a user or a group to your enterprise applications in Azure A
39
41

40
42
9. On the **Users and groups** blade, select one or more users or groups from the list and then select the **Select** button at the bottom of the blade.
41
43
10. On the **Add Assignment** blade, select **Role**. Then, on the **Select Role** blade, select a role to apply to the selected users or groups, and then select the **OK** button at the bottom of the blade.
42
-
11. On the **Add Assignment** blade, select the **Assign** button at the bottom of the blade. The assigned users or groups will have the permissions defined by the selected role for this enterprise app.
44
+
11. On the **Add Assignment** blade, select the **Assign** button at the bottom of the blade. The assigned users or groups have the permissions defined by the selected role for this enterprise app.
45
+
46
+
## How do I assign a user to an enterprise app using PowerShell?
47
+
48
+
1. Open an elevated Windows PowerShell command prompt.
49
+
50
+
>[!NOTE]
51
+
> You need to install the AzureAD module (use the command `Install-Module -Name AzureAD`). If prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
52
+
53
+
2. Run `Connect-AzureAD` and sign in with a Global Admin user account.
54
+
3. Use the following script to assign a user and role to an application:
55
+
56
+
```powershell
57
+
# Assign the values to the variables
58
+
$username = "<You user's UPN>"
59
+
$app_name = "<Your App's display name>"
60
+
$app_role_name = "<App role display name>"
61
+
62
+
# Get the user to assign, and the service principal for the app to assign to
For more information about how to assign a user to an application role visit the documentation for [New-AzureADUserAppRoleAssignment](https://docs.microsoft.com/en-us/powershell/module/azuread/new-azureaduserapproleassignment?view=azureadps-2.0)
72
+
73
+
### Example
74
+
75
+
This example assigns the user Britta Simon to the [Microsoft Workplace Analytics](https://products.office.com/en-us/business/workplace-analytics) application using PowerShell.
76
+
77
+
1. In PowerShell, assign the corresponding values to the variables $username, $app_name and $app_role_name.
2. In this example, we don't know what is the exact name of the application role we want to assign to Britta Simon. Run the following commands to get the user ($user) and the service principal ($sp) using the user UPN and the service principal display names.
86
+
87
+
```powershell
88
+
# Get the user to assign, and the service principal for the app to assign to
3. Run the command `$sp.AppRoles` to display the roles available for the Workplace Analytics application. In this example, we want to assign Britta Simon the Analyst (Limited access) Role.
0 commit comments