You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Join a SUSE Linux Enterprise virtual machine to a Microsoft Entra Domain Services managed domain
17
17
18
-
To let users sign in to virtual machines (VMs) in Azure using a single set of credentials, you can join VMs to a Microsoft Entra Domain Services (Microsoft Entra DS) managed domain. When you join a VM to a Microsoft Entra DS managed domain, user accounts and credentials from the domain can be used to sign in and manage servers. Group memberships from the managed domain are also applied to let you control access to files or services on the VM.
18
+
To let users sign in to virtual machines (VMs) in Azure using a single set of credentials, you can join VMs to a Microsoft Entra Domain Services managed domain. When you join a VM to a Domain Services managed domain, user accounts and credentials from the domain can be used to sign in and manage servers. Group memberships from the managed domain are also applied to let you control access to files or services on the VM.
19
19
20
20
This article shows you how to join a SUSE Linux Enterprise (SLE) VM to a managed domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-ubuntu-linux-vm.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,13 +10,13 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 01/29/2023
13
+
ms.date: 09/23/2023
14
14
ms.author: justinha
15
15
ms.custom: fasttrack-edit, devx-track-linux
16
16
---
17
17
# Join an Ubuntu Linux virtual machine to a Microsoft Entra Domain Services managed domain
18
18
19
-
To let users sign in to virtual machines (VMs) in Azure using a single set of credentials, you can join VMs to a Microsoft Entra Domain Services (Microsoft Entra DS) managed domain. When you join a VM to a Microsoft Entra DS managed domain, user accounts and credentials from the domain can be used to sign in and manage servers. Group memberships from the managed domain are also applied to let you control access to files or services on the VM.
19
+
To let users sign in to virtual machines (VMs) in Azure using a single set of credentials, you can join VMs to a Microsoft Entra Domain Services managed domain. When you join a VM to a Domain Services managed domain, user accounts and credentials from the domain can be used to sign in and manage servers. Group memberships from the managed domain are also applied to let you control access to files or services on the VM.
20
20
21
21
This article shows you how to join an Ubuntu Linux VM to a managed domain.
22
22
@@ -160,7 +160,7 @@ rdns=false
160
160
161
161
## Update the SSSD configuration
162
162
163
-
One of the packages installed in a previous step was for System Security Services Daemon (SSSD). When a user tries to sign in to a VM using domain credentials, SSSD relays the request to an authentication provider. In this scenario, SSSD uses Microsoft Entra DS to authenticate the request.
163
+
One of the packages installed in a previous step was for System Security Services Daemon (SSSD). When a user tries to sign in to a VM using domain credentials, SSSD relays the request to an authentication provider. In this scenario, SSSD uses Domain Services to authenticate the request.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-windows-vm-template.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Use a template to join a Windows VM to Microsoft Entra DS | Microsoft Docs
2
+
title: Use a template to join a Windows VM to Microsoft Entra Domain Services | Microsoft Docs
3
3
description: Learn how to use Azure Resource Manager templates to join a new or existing Windows Server VM to a Microsoft Entra Domain Services managed domain.
# Join a Windows Server virtual machine to a Microsoft Entra Domain Services managed domain using a Resource Manager template
19
19
20
-
To automate the deployment and configuration of Azure virtual machines (VMs), you can use a Resource Manager template. These templates let you create consistent deployments each time. Extensions can also be included in templates to automatically configure a VM as part of the deployment. One useful extension joins VMs to a domain, which can be used with Microsoft Entra Domain Services (Microsoft Entra DS) managed domains.
20
+
To automate the deployment and configuration of Azure virtual machines (VMs), you can use a Resource Manager template. These templates let you create consistent deployments each time. Extensions can also be included in templates to automatically configure a VM as part of the deployment. One useful extension joins VMs to a domain, which can be used with Microsoft Entra Domain Services managed domains.
21
21
22
-
This article shows you how to create and join a Windows Server VM to a Microsoft Entra DS managed domain using Resource Manager templates. You also learn how to join an existing Windows Server VM to a Microsoft Entra DS domain.
22
+
This article shows you how to create and join a Windows Server VM to a Domain Services managed domain using Resource Manager templates. You also learn how to join an existing Windows Server VM to a Domain Services domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-windows-vm.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.author: justinha
15
15
---
16
16
# Tutorial: Join a Windows Server virtual machine to a Microsoft Entra Domain Services managed domain
17
17
18
-
Microsoft Entra Domain Services (Microsoft Entra DS) provides managed domain services such as domain join, group policy, LDAP, Kerberos/NTLM authentication that is fully compatible with Windows Server Active Directory. With a Microsoft Entra DS managed domain, you can provide domain join features and management to virtual machines (VMs) in Azure. This tutorial shows you how to create a Windows Server VM then join it to a managed domain.
18
+
Microsoft Entra Domain Services provides managed domain services such as domain join, group policy, LDAP, Kerberos/NTLM authentication that is fully compatible with Windows Server Active Directory. With a Domain Services managed domain, you can provide domain join features and management to virtual machines (VMs) in Azure. This tutorial shows you how to create a Windows Server VM then join it to a managed domain.
19
19
20
20
In this tutorial, you learn how to:
21
21
@@ -38,7 +38,7 @@ To complete this tutorial, you need the following resources:
38
38
* If needed, [create and configure a Microsoft Entra Domain Services managed domain][create-azure-ad-ds-instance].
39
39
* A user account that's a part of the managed domain.
40
40
* Make sure that Microsoft Entra Connect password hash synchronization or self-service password reset has been performed so the account is able to sign in to managed domain.
41
-
* An Azure Bastion host deployed in your Microsoft Entra DS virtual network.
41
+
* An Azure Bastion host deployed in your Domain Services virtual network.
42
42
* If needed, [create an Azure Bastion host][azure-bastion].
43
43
44
44
If you already have a VM that you want to domain-join, skip to the section to [join the VM to the managed domain](#join-the-vm-to-the-managed-domain).
@@ -183,7 +183,7 @@ In the next tutorial, you use this Windows Server VM to install the management t
183
183
184
184
To remove the VM from the managed domain, follow through the steps again to [join the VM to a domain](#join-the-vm-to-the-managed-domain). Instead of joining the managed domain, choose to join a workgroup, such as the default *WORKGROUP*. After the VM has rebooted, the computer object is removed from the managed domain.
185
185
186
-
If you [delete the VM](#delete-the-vm) without unjoining from the domain, an orphaned computer object is left in Microsoft Entra DS.
186
+
If you [delete the VM](#delete-the-vm) without unjoining from the domain, an orphaned computer object is left in Domain Services.
187
187
188
188
### Delete the VM
189
189
@@ -204,7 +204,7 @@ If you don't receive a prompt that asks for credentials to join the domain, ther
204
204
205
205
After trying each of these troubleshooting steps, try to join the Windows Server VM to the managed domain again.
206
206
207
-
* Verify the VM is connected to the same virtual network that Microsoft Entra DS is enabled in, or has a peered network connection.
207
+
* Verify the VM is connected to the same virtual network that Domain Services is enabled in, or has a peered network connection.
208
208
* Try to ping the DNS domain name of the managed domain, such as `ping aaddscontoso.com`.
209
209
* If the ping request fails, try to ping the IP addresses for the managed domain, such as `ping 10.0.0.4`. The IP address for your environment is displayed on the *Properties* page when you select the managed domain from your list of Azure resources.
210
210
* If you can ping the IP address but not the domain, DNS may be incorrectly configured. Confirm that the IP addresses of the managed domain are configured as DNS servers for the virtual network.
@@ -220,7 +220,7 @@ After trying each of these troubleshooting steps, try to join the Windows Server
220
220
* Confirm that the account is part of the managed domain or Microsoft Entra tenant. Accounts from external directories associated with your Microsoft Entra tenant can't correctly authenticate during the domain-join process.
221
221
* Try using the UPN format to specify credentials, such as `[email protected]`. If there are many users with the same UPN prefix in your tenant or if your UPN prefix is overly long, the *SAMAccountName* for your account may be autogenerated. In these cases, the *SAMAccountName* format for your account may be different from what you expect or use in your on-premises domain.
222
222
* Check that you have [enabled password synchronization][password-sync] to your managed domain. Without this configuration step, the required password hashes won't be present in the managed domain to correctly authenticate your sign-in attempt.
223
-
* Wait for password synchronization to be completed. When a user account's password is changed, an automatic background synchronization from Microsoft Entra ID updates the password in Microsoft Entra DS. It takes some time for the password to be available for domain-join use.
223
+
* Wait for password synchronization to be completed. When a user account's password is changed, an automatic background synchronization from Microsoft Entra ID updates the password in Domain Services. It takes some time for the password to be available for domain-join use.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/manage-dns.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,16 +15,16 @@ ms.author: justinha
15
15
---
16
16
# Administer DNS and create conditional forwarders in a Microsoft Entra Domain Services managed domain
17
17
18
-
Microsoft Entra DS includes a Domain Name System (DNS) server that provides name resolution for the managed domain. This DNS server includes built-in DNS records and updates for the key components that allow the service to run.
18
+
Microsoft Entra Domain Services includes a Domain Name System (DNS) server that provides name resolution for the managed domain. This DNS server includes built-in DNS records and updates for the key components that allow the service to run.
19
19
20
-
As you run your own applications and services, you may need to create DNS records for machines that aren't joined to the domain, configure virtual IP addresses for load balancers, or set up external DNS forwarders. Users who belong to the *AAD DC Administrators* group are granted DNS administration privileges on the Microsoft Entra DS managed domain and can create and edit custom DNS records.
20
+
As you run your own applications and services, you may need to create DNS records for machines that aren't joined to the domain, configure virtual IP addresses for load balancers, or set up external DNS forwarders. Users who belong to the *AAD DC Administrators* group are granted DNS administration privileges on the Domain Services managed domain and can create and edit custom DNS records.
21
21
22
22
In a hybrid environment, DNS zones and records configured in other DNS namespaces, such as an on-premises AD DS environment, aren't synchronized to the managed domain. To resolve named resources in other DNS namespaces, create and use conditional forwarders that point to existing DNS servers in your environment.
23
23
24
-
This article shows you how to install the DNS Server tools then use the DNS console to manage records and create conditional forwarders in Microsoft Entra DS.
24
+
This article shows you how to install the DNS Server tools then use the DNS console to manage records and create conditional forwarders in Domain Services.
25
25
26
26
>[!NOTE]
27
-
>Creating or changing root hints or server-level DNS forwarders is not supported and will cause issues for the Microsoft Entra DS managed domain.
27
+
>Creating or changing root hints or server-level DNS forwarders is not supported and will cause issues for the Domain Services managed domain.
28
28
29
29
## Before you begin
30
30
@@ -36,7 +36,7 @@ To complete this article, you need the following resources and privileges:
36
36
* If needed, [create a Microsoft Entra tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
37
37
* A Microsoft Entra Domain Services managed domain enabled and configured in your Microsoft Entra tenant.
38
38
* If needed, complete the tutorial to [create and configure a Microsoft Entra Domain Services managed domain][create-azure-ad-ds-instance].
39
-
* Connectivity from your Microsoft Entra DS virtual network to where your other DNS namespaces are hosted.
39
+
* Connectivity from your Domain Services virtual network to where your other DNS namespaces are hosted.
40
40
* This connectivity can be provided with an [Azure ExpressRoute][expressroute] or [Azure VPN Gateway][vpn-gateway] connection.
41
41
* A Windows Server management VM that is joined to the managed domain.
42
42
* If needed, complete the tutorial to [create a Windows Server VM and join it to a managed domain][create-join-windows-vm].
@@ -77,11 +77,11 @@ With the DNS Server tools installed, you can administer DNS records on the manag
77
77

78
78
79
79
> [!WARNING]
80
-
> When you manage records using the DNS Server tools, make sure that you don't delete or modify the built-in DNS records that are used by Microsoft Entra DS. Built-in DNS records include domain DNS records, name server records, and other records used for DC location. If you modify these records, domain services are disrupted on the virtual network.
80
+
> When you manage records using the DNS Server tools, make sure that you don't delete or modify the built-in DNS records that are used by Domain Services. Built-in DNS records include domain DNS records, name server records, and other records used for DC location. If you modify these records, domain services are disrupted on the virtual network.
81
81
82
82
## Create conditional forwarders
83
83
84
-
A Microsoft Entra DS DNS zone should only contain the zone and records for the managed domain itself. Don't create additional zones in the managed domain to resolve named resources in other DNS namespaces. Instead, use conditional forwarders in the managed domain to tell the DNS server where to go in order to resolve addresses for those resources.
84
+
A Domain Services DNS zone should only contain the zone and records for the managed domain itself. Don't create additional zones in the managed domain to resolve named resources in other DNS namespaces. Instead, use conditional forwarders in the managed domain to tell the DNS server where to go in order to resolve addresses for those resources.
85
85
86
86
A conditional forwarder is a configuration option in a DNS server that lets you define a DNS domain, such as *contoso.com*, to forward queries to. Instead of the local DNS server trying to resolve queries for records in that domain, DNS queries are forwarded to the configured DNS for that domain. This configuration makes sure that the correct DNS records are returned, as you don't create a local a DNS zone with duplicate records in the managed domain to reflect those resources.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/manage-group-policy.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,9 @@ ms.author: justinha
15
15
---
16
16
# Administer Group Policy in a Microsoft Entra Domain Services managed domain
17
17
18
-
Settings for user and computer objects in Microsoft Entra Domain Services (Microsoft Entra DS) are often managed using Group Policy Objects (GPOs). Microsoft Entra DS includes built-in GPOs for the *AADDC Users* and *AADDC Computers* containers. You can customize these built-in GPOs to configure Group Policy as needed for your environment. Members of the *Microsoft Entra DC administrators* group have Group Policy administration privileges in the Microsoft Entra DS domain, and can also create custom GPOs and organizational units (OUs). For more information on what Group Policy is and how it works, see [Group Policy overview][group-policy-overview].
18
+
Settings for user and computer objects in Microsoft Entra Domain Services are often managed using Group Policy Objects (GPOs). Domain Services includes built-in GPOs for the *AADDC Users* and *AADDC Computers* containers. You can customize these built-in GPOs to configure Group Policy as needed for your environment. Members of the *Microsoft Entra DC administrators* group have Group Policy administration privileges in the Domain Services domain, and can also create custom GPOs and organizational units (OUs). For more information on what Group Policy is and how it works, see [Group Policy overview][group-policy-overview].
19
19
20
-
In a hybrid environment, group policies configured in an on-premises AD DS environment aren't synchronized to Microsoft Entra DS. To define configuration settings for users or computers in Microsoft Entra DS, edit one of the default GPOs or create a custom GPO.
20
+
In a hybrid environment, group policies configured in an on-premises AD DS environment aren't synchronized to Domain Services. To define configuration settings for users or computers in Domain Services, edit one of the default GPOs or create a custom GPO.
21
21
22
22
This article shows you how to install the Group Policy Management tools, then edit the built-in GPOs and create custom GPOs.
23
23
@@ -38,7 +38,7 @@ To complete this article, you need the following resources and privileges:
38
38
* If needed, [create a Microsoft Entra tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
39
39
* A Microsoft Entra Domain Services managed domain enabled and configured in your Microsoft Entra tenant.
40
40
* If needed, complete the tutorial to [create and configure a Microsoft Entra Domain Services managed domain][create-azure-ad-ds-instance].
41
-
* A Windows Server management VM that is joined to the Microsoft Entra DS managed domain.
41
+
* A Windows Server management VM that is joined to the Domain Services managed domain.
42
42
* If needed, complete the tutorial to [create a Windows Server VM and join it to a managed domain][create-join-windows-vm].
43
43
* A user account that's a member of the *Microsoft Entra DC administrators* group in your Microsoft Entra tenant.
44
44
@@ -97,7 +97,7 @@ There are two built-in Group Policy Objects (GPOs) in a managed domain - one for
97
97
98
98
## Create a custom Group Policy Object
99
99
100
-
To group similar policy settings, you often create additional GPOs instead of applying all of the required settings in the single, default GPO. With Microsoft Entra DS, you can create or import your own custom group policy objects and link them to a custom OU. If you need to first create a custom OU, see [create a custom OU in a managed domain](create-ou.md).
100
+
To group similar policy settings, you often create additional GPOs instead of applying all of the required settings in the single, default GPO. With Domain Services, you can create or import your own custom group policy objects and link them to a custom OU. If you need to first create a custom OU, see [create a custom OU in a managed domain](create-ou.md).
101
101
102
102
1. In the **Group Policy Management** console, select your custom organizational unit (OU), such as *MyCustomOU*. Right-select the OU and choose **Create a GPO in this domain, and Link it here...**:
0 commit comments