Skip to content

Commit 213e647

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into lboutboundrulesposh
2 parents b0fabea + ae5679d commit 213e647

File tree

8 files changed

+382
-337
lines changed

8 files changed

+382
-337
lines changed

articles/active-directory-domain-services/TOC.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -95,22 +95,22 @@
9595
items:
9696
- name: Common errors
9797
href: troubleshoot.md
98-
- name: Common alerts
98+
- name: Mismatched tenant errors
99+
href: mismatched-tenant-error.md
100+
- name: Suspended domains
101+
href: suspension.md
102+
- name: Secure LDAP
103+
href: tshoot-ldaps.md
104+
- name: Known issues
99105
items:
100106
- name: Common alerts
101107
href: troubleshoot-alerts.md
102-
- name: Fix a broken network configuration
108+
- name: Network alerts
103109
href: alert-nsg.md
104-
- name: Restore missing service principals
110+
- name: Service principal alerts
105111
href: alert-service-principal.md
106112
- name: Secure LDAP alerts
107113
href: alert-ldaps.md
108-
- name: Mismatched tenant errors
109-
href: mismatched-tenant-error.md
110-
- name: Suspended domains
111-
href: suspension.md
112-
- name: Secure LDAP
113-
href: tshoot-ldaps.md
114114
- name: Resources
115115
items:
116116
- name: FAQs
Lines changed: 33 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -1,64 +1,62 @@
11
---
2-
title: 'Azure Active Directory Domain Services: Troubleshoot secure LDAP | Microsoft Docs'
3-
description: Troubleshooting Secure LDAP for Azure AD Domain Services
2+
title: Resolve secure LDAP alerts in Azure AD Domain Services | Microsoft Docs
3+
description: Learn how to troubleshoot and resolve common alerts with secure LDAP for Azure Active Directory Domain Services.
44
services: active-directory-ds
5-
documentationcenter: ''
65
author: iainfoulds
7-
manager:
8-
editor:
6+
manager: daveba
97

108
ms.assetid: 81208c0b-8d41-4f65-be15-42119b1b5957
119
ms.service: active-directory
1210
ms.subservice: domain-services
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
16-
ms.topic: conceptual
17-
ms.date: 05/22/2019
12+
ms.topic: troubleshooting
13+
ms.date: 09/18/2019
1814
ms.author: iainfou
1915

2016
---
21-
# Azure AD Domain Services - Troubleshooting Secure LDAP configuration
17+
# Known issues: Secure LDAP alerts in Azure Active Directory Domain Services
2218

23-
This article provides resolutions for common issues when [configuring secure LDAP](tutorial-configure-ldaps.md) for Azure AD Domain Services.
19+
Applications and services that use lightweight directory access protocol (LDAP) to communicate with Azure Active Directory Domain Services (Azure AD DS) can be [configured to use secure LDAP](tutorial-configure-ldaps.md). An appropriate certificate and required network ports must be open for secure LDAP to work correctly.
2420

25-
## AADDS101: Secure LDAP Network Security Group configuration
21+
This article helps you understand and resolve common alerts with secure LDAP access in Azure AD DS.
2622

27-
**Alert message:**
23+
## AADDS101: Secure LDAP network security group configuration
24+
25+
### Alert message
2826

2927
*Secure LDAP over the internet is enabled for the managed domain. However, access to port 636 is not locked down using a network security group. This may expose user accounts on the managed domain to password brute-force attacks.*
3028

31-
### Secure LDAP port
29+
### Resolution
30+
31+
When you enable secure LDAP, it's recommended to create additional rules that restrict inbound LDAPS access to specific IP addresses. These rules protect the Azure AD DS managed domain from brute force attacks. To update the network security group to restrict TCP port 636 access for secure LDAP, complete the following steps:
3232

33-
When secure LDAP is enabled, we recommend creating additional rules to allow inbound LDAPS access only from certain IP addresses. These rules protect your domain from brute force attacks that could pose a security threat. Port 636 allows access to your managed domain. Here is how to update your NSG to allow access for Secure LDAP:
33+
1. In the Azure portal, search for and select **Network security groups**.
34+
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*, then select **Inbound security rules**
35+
1. **+ Add** a rule for TCP port 636. If needed, select **Advanced** in the window to create a rule.
36+
1. For the **Source**, choose *IP Addresses* from the drop-down menu. Enter the source IP addresses that you want to grant access for secure LDAP traffic.
37+
1. Choose *Any* as the **Destination**, then enter *636* for **Destination port ranges**.
38+
1. Set the **Protocol** as *TCP* and the **Action** to *Allow*.
39+
1. Specify the priority for the rule, then enter a name such as *RestrictLDAPS*.
40+
1. When ready, select **Add** to create the rule.
3441

35-
1. Navigate to the [Network Security Groups tab](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.Network%2FNetworkSecurityGroups) in the Azure portal
36-
2. Choose the NSG associated with your domain from the table.
37-
3. Click on **Inbound security rules**
38-
4. Create the port 636 rule
39-
1. Click **Add** on the top navigation bar.
40-
2. Choose **IP Addresses** for the source.
41-
3. Specify the Source port ranges for this rule.
42-
4. Input "636" for Destination port ranges.
43-
5. Protocol is **TCP**.
44-
6. Give the rule an appropriate name, description, and priority. This rule's priority should be higher than your "Deny all" rule's priority, if you have one.
45-
7. Click **OK**.
46-
5. Verify that your rule has been created.
47-
6. Check your domain's health in two hours to ensure that you have completed the steps correctly.
42+
The Azure AD DS managed domain's health automatically updates itself within two hours and removes the alert.
4843

4944
> [!TIP]
50-
> Port 636 is not the only rule needed for Azure AD Domain Services to run smoothly. To learn more, visit the [Networking guidelines](network-considerations.md) or [Troubleshoot NSG configuration](alert-nsg.md) articles.
51-
>
45+
> TCP port 636 isn't the only rule needed for Azure AD DS to run smoothly. To learn more, see the [Azure AD DS Network security groups and required ports](network-considerations.md#network-security-groups-and-required-ports).
5246
5347
## AADDS502: Secure LDAP certificate expiring
5448

55-
**Alert message:**
49+
### Alert message
5650

5751
*The secure LDAP certificate for the managed domain will expire on [date]].*
5852

59-
**Resolution:**
53+
### Resolution
54+
55+
Create a replacement secure LDAP certificate by following the steps to [create a certificate for secure LDAP](tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap). Apply the replacement certificate to Azure AD DS, and distribute the certificate to any clients that connect using secure LDAP.
56+
57+
## Next steps
6058

61-
Create a new secure LDAP certificate by following the steps outlined in the [Configure secure LDAP](tutorial-configure-ldaps.md) article.
59+
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
6260

63-
## Contact us
64-
Contact the Azure Active Directory Domain Services product team to [share feedback or for support](contact-us.md).
61+
<!-- INTERNAL LINKS -->
62+
[azure-support]: ../active-directory/fundamentals/active-directory-troubleshooting-support-howto.md
Lines changed: 62 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,57 +1,86 @@
11
---
2-
title: 'Azure Active Directory Domain Services: Troubleshoot network security groups | Microsoft Docs'
3-
description: Troubleshooting network security group configuration for Azure AD Domain Services
2+
title: Resolve network security group alerts in Azure AD DS | Microsoft Docs
3+
description: Learn how to troubleshoot and resolve network security group configuration alerts for Azure Active Directory Domain Services
44
services: active-directory-ds
5-
documentationcenter: ''
65
author: iainfoulds
7-
manager:
8-
editor:
6+
manager: daveba
97

108
ms.assetid: 95f970a7-5867-4108-a87e-471fa0910b8c
119
ms.service: active-directory
1210
ms.subservice: domain-services
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
16-
ms.topic: article
17-
ms.date: 05/22/2019
12+
ms.topic: troubleshooting
13+
ms.date: 09/19/2019
1814
ms.author: iainfou
1915

2016
---
21-
# Troubleshoot invalid networking configuration for your managed domain
22-
This article helps you troubleshoot and resolve network-related configuration errors that result in the following alert message:
17+
# Known issues: Network configuration alerts in Azure Active Directory Domain Services
18+
19+
To let applications and services correctly communicate with Azure Active Directory Domain Services (Azure AD DS), specific network ports must be open to allow traffic to flow. In Azure, you control the flow of traffic using network security groups. The health status of an Azure AD DS managed domain shows an alert if the required network security group rules aren't in place.
20+
21+
This article helps you understand and resolve common alerts for network security group configuration issues.
2322

2423
## Alert AADDS104: Network error
25-
**Alert message:**
26-
*Microsoft is unable to reach the domain controllers for this managed domain. This may happen if a network security group (NSG) configured on your virtual network blocks access to the managed domain. Another possible reason is if there is a user-defined route that blocks incoming traffic from the internet.*
2724

28-
Invalid NSG configurations are the most common cause of network errors for Azure AD Domain Services. The Network Security Group (NSG) configured for your virtual network must allow access to [specific ports](network-considerations.md#network-security-groups-and-required-ports). If these ports are blocked, Microsoft cannot monitor or update your managed domain. Additionally, synchronization between your Azure AD directory and your managed domain is impacted. While creating your NSG, keep these ports open to avoid interruption in service.
25+
### Alert message
26+
27+
*Microsoft is unable to reach the domain controllers for this managed domain. This may happen if a network security group (NSG) configured on your virtual network blocks access to the managed domain. Another possible reason is if there is a user-defined route that blocks incoming traffic from the internet.*
28+
29+
Invalid network security group rules are the most common cause of network errors for Azure AD DS. The network security group for the virtual network must allow access to specific ports and protocols. If these ports are blocked, the Azure platform can't monitor or update the managed domain. The synchronization between the Azure AD directory and Azure AD DS managed domain is also impacted. Make sure you keep the default ports open to avoid interruption in service.
2930

30-
### Checking your NSG for compliance
31+
## Default security rules
3132

32-
1. Navigate to the [Network security groups](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.Network%2FNetworkSecurityGroups) page in the Azure portal
33-
2. From the table, choose the NSG associated with the subnet in which your managed domain is enabled.
34-
3. Under **Settings** in the left-hand panel, click **Inbound security rules**
35-
4. Review the rules in place and identify which rules are blocking access to [these ports](network-considerations.md#network-security-groups-and-required-ports)
36-
5. Edit the NSG to ensure compliance by either deleting the rule, adding a rule, or creating a new NSG entirely. Steps to [add a rule](#add-a-rule-to-a-network-security-group-using-the-azure-portal) or create a new, compliant NSG are below
33+
The following default inbound and outbound security rules are applied to the network security group for an Azure AD DS managed domain. These rules keep Azure AD DS secure and allow the Azure platform to monitor, manage, and update the managed domain. You may also have an additional rule that allows inbound traffic if you [configure secure LDAP][configure-ldaps].
3734

38-
## Sample NSG
39-
The following table depicts a sample NSG that would keep your managed domain secure while allowing Microsoft to monitor, manage, and update information.
35+
### Inbound security rules
4036

41-
![sample NSG](./media/active-directory-domain-services-alerts/default-nsg.png)
37+
| Priority | Name | Port | Protocol | Source | Destination | Action |
38+
|----------|------|------|----------|--------|-------------|--------|
39+
| 101 | AllowSyncWithAzureAD | 443 | TCP | AzureActiveDirectoryDomainServices | Any | Allow |
40+
| 201 | AllowRD | 3389 | TCP | CorpNetSaw | Any | Allow |
41+
| 301 | AllowPSRemoting | 5986| TCP | AzureActiveDirectoryDomainServices | Any | Allow |
42+
| 65000 | AllVnetInBound | Any | Any | VirtualNetwork | VirtualNetwork | Allow |
43+
| 65001 | AllowAzureLoadBalancerInBound | Any | Any | AzureLoadBalancer | Any | Allow |
44+
| 65500 | DenyAllInBound | Any | Any | Any | Any | Deny |
45+
46+
### Outbound security rules
47+
48+
| Priority | Name | Port | Protocol | Source | Destination | Action |
49+
|----------|------|------|----------|--------|-------------|--------|
50+
| 65000 | AllVnetOutBound | Any | Any | VirtualNetwork | VirtualNetwork | Allow |
51+
| 65001 | AllowAzureLoadBalancerOutBound | Any | Any | Any | Internet | Allow |
52+
| 65500 | DenyAllOutBound | Any | Any | Any | Any | Deny |
4253

4354
>[!NOTE]
44-
> Azure AD Domain Services requires unrestricted outbound access from the virtual network. We recommend not to create any additional NSG rule that restricts outbound access for the virtual network.
55+
> Azure AD DS needs unrestricted outbound access from the virtual network. We don't recommend that you create any additional rules that restrict outbound access for the virtual network.
56+
57+
## Verify and edit existing security rules
58+
59+
To verify the existing security rules and make sure the default ports are open, complete the following steps:
60+
61+
1. In the Azure portal, search for and select **Network security groups**.
62+
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*.
63+
1. On the **Overview** page, the existing inbound and outbound security rules are shown.
64+
65+
Review the inbound and outbound rules and compare to the list of required rules in the previous section. If needed, select and then delete any custom rules that block required traffic. If any of the required rules are missing, add a rule in the next section.
66+
67+
After you add or delete rules to allow the required traffic, the Azure AD DS managed domain's health automatically updates itself within two hours and removes the alert.
68+
69+
### Add a security rule
70+
71+
To add a missing security rule, complete the following steps:
72+
73+
1. In the Azure portal, search for and select **Network security groups**.
74+
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*.
75+
1. Under **Settings** in the left-hand panel, click *Inbound security rules* or *Outbound security rules* depending on which rule you need to add.
76+
1. Select **Add**, then create the required rule based on the port, protocol, direction, etc. When ready, select **OK**.
4577

46-
## Add a rule to a Network Security Group using the Azure portal
47-
If you do not want to use PowerShell, you can manually add single rules to NSGs using the Azure portal. To create rules in your Network security group, complete the following steps:
78+
It takes a few moments for the security rule to be added and show in the list.
4879

49-
1. Navigate to the [Network security groups](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.Network%2FNetworkSecurityGroups) page in the Azure portal.
50-
2. From the table, choose the NSG associated with the subnet in which your managed domain is enabled.
51-
3. Under **Settings** in the left-hand panel, click either **Inbound security rules** or **Outbound security rules**.
52-
4. Create the rule by clicking **Add** and filling in the information. Click **OK**.
53-
5. Verify your rule has been created by locating it in the rules table.
80+
## Next steps
5481

82+
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
5583

56-
## Need help?
57-
Contact the Azure Active Directory Domain Services product team to [share feedback or for support](contact-us.md).
84+
<!-- INTERNAL LINKS -->
85+
[azure-support]: ../active-directory/fundamentals/active-directory-troubleshooting-support-howto.md
86+
[configure-ldaps]: tutorial-configure-ldaps.md

0 commit comments

Comments
 (0)