You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-dns.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,15 +14,17 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 09/23/2017
17
+
ms.date: 06/22/2018
18
18
ms.author: maheshu
19
19
20
20
---
21
21
# Administer DNS on an Azure AD Domain Services managed domain
22
22
Azure Active Directory Domain Services includes a DNS (Domain Name Resolution) server that provides DNS resolution for the managed domain. Occasionally, you may need to configure DNS on the managed domain. You may need to create DNS records for machines that are not joined to the domain, configure virtual IP addresses for load-balancers or setup external DNS forwarders. For this reason, users who belong to the 'AAD DC Administrators' group are granted DNS administration privileges on the managed domain.
To perform the tasks listed in this article, you need:
27
+
To complete the tasks listed in this article, you need:
26
28
27
29
1. A valid **Azure subscription**.
28
30
2. An **Azure AD directory** - either synchronized with an on-premises directory or a cloud-only directory.
@@ -32,21 +34,21 @@ To perform the tasks listed in this article, you need:
32
34
33
35
<br>
34
36
35
-
## Task 1 - Provision a domain-joined virtual machine to remotely administer DNS for the managed domain
37
+
## Task 1 - Create a domain-joined virtual machine to remotely administer DNS for the managed domain
36
38
Azure AD Domain Services managed domains can be managed remotely using familiar Active Directory administrative tools such as the Active Directory Administrative Center (ADAC) or AD PowerShell. Similarly, DNS for the managed domain can be administered remotely using the DNS Server administration tools.
37
39
38
-
Administrators in your Azure AD directory do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Members of the 'AAD DC Administrators' group can administer DNS for managed domains remotely using DNS Server tools from a Windows Server/client computer that is joined to the managed domain. DNS Server tools can be installed as part of the Remote Server Administration Tools (RSAT) optional feature on Windows Server and client machines joined to the managed domain.
40
+
Administrators in your Azure AD directory do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Members of the 'AAD DC Administrators' group can administer DNS for managed domains remotely using DNS Server tools from a Windows Server/client computer that is joined to the managed domain. DNS Server tools are part of the Remote Server Administration Tools (RSAT) optional feature.
39
41
40
-
The first task is to provision a Windows Server virtual machine that is joined to the managed domain. For instructions, refer to the article titled [join a Windows Server virtual machine to an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-join-windows-vm.md).
42
+
The first task is to create a Windows Server virtual machine that is joined to the managed domain. For instructions, refer to the article titled [join a Windows Server virtual machine to an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-join-windows-vm.md).
41
43
42
44
## Task 2 - Install DNS Server tools on the virtual machine
43
-
Perform the following steps to install the DNS Administration tools on the domain joined virtual machine. For more information on [installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx), see Technet.
45
+
Complete the following steps to install the DNS Administration tools on the domain joined virtual machine. For more information on [installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx), see Technet.
44
46
45
47
1. Navigate to the Azure portal. Click **All resources** on the left-hand panel. Locate and click the virtual machine you created in Task 1.
46
48
2. Click the **Connect** button on the Overview tab. A Remote Desktop Protocol (.rdp) file is created and downloaded.
47
49
48
50

49
-
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. At the login prompt, use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, we use '[email protected]' in our case. You may receive a certificate warning during the sign-in process. Click Yes or Continue to proceed with the connection.
51
+
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. Use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, '[email protected]'. You may receive a certificate warning during the sign-in process. Click Yes or Continue to connect.
50
52
51
53
4. From the Start screen, open **Server Manager**. Click **Add Roles and Features** in the central pane of the Server Manager window.
52
54
@@ -60,7 +62,7 @@ Perform the following steps to install the DNS Administration tools on the domai
60
62
7. On the **Server Selection** page, select the current virtual machine from the server pool, and click **Next**.
8. On the **Server Roles** page, click **Next**. We skip this page since we are not installing any roles on the server.
65
+
8. On the **Server Roles** page, click **Next**.
64
66
9. On the **Features** page, click to expand the **Remote Server Administration Tools** node and then click to expand the **Role Administration Tools** node. Select **DNS Server Tools** feature from the list of role administration tools.
## Task 3 - Launch the DNS management console to administer DNS
72
-
Now that the DNS Server Tools feature is installed on the domain joined virtual machine, we can use the DNS tools to administer DNS on the managed domain.
74
+
Now, you can use Windows Server DNS tools to administer DNS on the managed domain.
73
75
74
76
> [!NOTE]
75
77
> You need to be a member of the 'AAD DC Administrators' group, to administer DNS on the managed domain.
@@ -80,7 +82,7 @@ Now that the DNS Server Tools feature is installed on the domain joined virtual
80
82
81
83

82
84
2. Click **DNS** to launch the DNS Management console.
83
-
3. In the **Connect to DNS Server** dialog, click the option titled **The following computer**, and enter the DNS domain name of the managed domain (for example, 'contoso100.com').
85
+
3. In the **Connect to DNS Server** dialog, click **The following computer**, and enter the DNS domain name of the managed domain (for example, 'contoso100.com').
84
86
85
87

86
88
4. The DNS Console connects to the managed domain.
@@ -93,7 +95,7 @@ Now that the DNS Server Tools feature is installed on the domain joined virtual
93
95
>
94
96
>
95
97
96
-
See the [DNS tools article on Technet](https://technet.microsoft.com/library/cc753579.aspx) for more information about managing DNS.
98
+
For more information about managing DNS, see the [DNS tools article on Technet](https://technet.microsoft.com/library/cc753579.aspx).
97
99
98
100
## Related Content
99
101
*[Azure AD Domain Services - Getting Started guide](active-directory-ds-getting-started.md)
To perform the tasks listed in this article, you need:
27
+
To complete the tasks listed in this article, you need:
26
28
27
29
1. A valid **Azure subscription**.
28
30
2. An **Azure AD directory** - either synchronized with an on-premises directory or a cloud-only directory.
@@ -33,7 +35,7 @@ To perform the tasks listed in this article, you need:
33
35
<br>
34
36
35
37
## Administrative tasks you can perform on a managed domain
36
-
Members of the 'AAD DC Administrators' group are granted privileges on the managed domain that enable them to perform tasks such as:
38
+
Members of the 'AAD DC Administrators' group are granted privileges on the managed domain that enable them to do tasks such as:
37
39
38
40
* Join machines to the managed domain.
39
41
* Configure the built-in GPO for the 'AADDC Computers' and 'AADDC Users' containers in the managed domain.
@@ -42,15 +44,15 @@ Members of the 'AAD DC Administrators' group are granted privileges on the manag
42
44
* Gain administrative access to computers joined to the managed domain.
43
45
44
46
## Administrative privileges you do not have on a managed domain
45
-
The domain is managed by Microsoft, including activities such as patching, monitoring and, performing backups. Therefore, the domain is locked down and you do not have privileges to perform certain administrative tasks on the domain. Some examples of tasks you cannot perform are below.
47
+
The domain is managed by Microsoft, including activities such as patching, monitoring and, taking backups. The domain is locked down and you do not have privileges to do certain administrative tasks on the domain. Some examples of tasks you cannot do are below.
46
48
47
-
* You are not granted Domain Administrator or Enterprise Administrator privileges for the managed domain.
48
-
* You cannot extend the schema of the managed domain.
49
-
* You cannot connect to domain controllers for the managed domain using Remote Desktop.
50
-
* You cannot add domain controllers to the managed domain.
49
+
* You don't have Domain Administrator or Enterprise Administrator privileges for the managed domain.
50
+
* You can't extend the schema of the managed domain.
51
+
* You can't connect to domain controllers for the managed domain using Remote Desktop.
52
+
* You can't add domain controllers to the managed domain.
51
53
52
-
## Task 1 - Provision a domain-joined Windows Server virtual machine to remotely administer the managed domain
53
-
Azure AD Domain Services managed domains can be managed using familiar Active Directory administrative tools such as the Active Directory Administrative Center (ADAC) or AD PowerShell. Tenant administrators do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Therefore, members of the 'AAD DC Administrators' group can administer managed domains remotely using AD administrative tools from a Windows Server/client computer that is joined to the managed domain. AD administrative tools can be installed as part of the Remote Server Administration Tools (RSAT) optional feature on Windows Server and client machines joined to the managed domain.
54
+
## Task 1 - Create a domain-joined Windows Server virtual machine to remotely administer the managed domain
55
+
Azure AD Domain Services managed domains can be managed using familiar Active Directory administrative tools such as the Active Directory Administrative Center (ADAC) or AD PowerShell. Tenant administrators do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Members of the 'AAD DC Administrators' group can administer managed domains remotely using AD administrative tools from a Windows Server/client computer that is joined to the managed domain. AD administrative tools can be installed as part of the Remote Server Administration Tools (RSAT) optional feature on Windows Server and client machines joined to the managed domain.
54
56
55
57
The first step is to set up a Windows Server virtual machine that is joined to the managed domain. For instructions, refer to the article titled [join a Windows Server virtual machine to an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-join-windows-vm.md).
56
58
@@ -60,13 +62,13 @@ The instructions in this article use a Windows Server virtual machine to adminis
60
62
You can [install Remote Server Administration Tools (RSAT)](http://social.technet.microsoft.com/wiki/contents/articles/2202.remote-server-administration-tools-rsat-for-windows-client-and-windows-server-dsforum2wiki.aspx) on a Windows client virtual machine by following the instructions on TechNet.
61
63
62
64
## Task 2 - Install Active Directory administration tools on the virtual machine
63
-
Perform the following steps to install the Active Directory Administration tools on the domain joined virtual machine. See Technet for more [information on installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx).
65
+
Complete the following steps to install the Active Directory Administration tools on the domain joined virtual machine. See Technet for more [information on installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx).
64
66
65
67
1. Navigate to the Azure portal. Click **All resources** on the left-hand panel. Locate and click the virtual machine you created in Task 1.
66
68
2. Click the **Connect** button on the Overview tab. A Remote Desktop Protocol (.rdp) file is created and downloaded.
67
69
68
70

69
-
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. At the login prompt, use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, we use '[email protected]' in our case. You may receive a certificate warning during the sign-in process. Click Yes or Continue to proceed with the connection.
71
+
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. Use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, '[email protected]'. You may receive a certificate warning during the sign-in process. Click Yes or Continue to proceed with the connection.
70
72
4. From the Start screen, open **Server Manager**. Click **Add Roles and Features** in the central pane of the Server Manager window.
71
73
72
74

@@ -79,7 +81,7 @@ Perform the following steps to install the Active Directory Administration tools
79
81
7. On the **Server Selection** page, select the current virtual machine from the server pool, and click **Next**.
8. On the **Server Roles** page, click **Next**. We skip this page since we are not installing any roles on the server.
84
+
8. On the **Server Roles** page, click **Next**.
83
85
9. On the **Features** page, click to expand the **Remote Server Administration Tools** node and then click to expand the **Role Administration Tools** node. Select **AD DS and AD LDS Tools** feature from the list of role administration tools.
## Task 3 - Connect to and explore the managed domain
91
-
Now that the AD Administrative Tools are installed on the domain joined virtual machine, we can use these tools to explore and administer the managed domain.
93
+
Now, you can use Windows Server AD administrative tools to explore and administer the managed domain.
92
94
93
95
> [!NOTE]
94
96
> You need to be a member of the 'AAD DC Administrators' group, to administer the managed domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-group-policy.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,13 +14,15 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 09/26/2017
17
+
ms.date: 06/22/2018
18
18
ms.author: maheshu
19
19
20
20
---
21
21
# Administer Group Policy on an Azure AD Domain Services managed domain
22
22
Azure Active Directory Domain Services includes built-in Group Policy Objects (GPOs) for the 'AADDC Users' and 'AADDC Computers' containers. You can customize these built-in GPOs to configure Group Policy on the managed domain. Additionally, members of the 'AAD DC Administrators' group can create their own custom OUs in the managed domain. They can also create custom GPOs and link them to these custom OUs. Users who belong to the 'AAD DC Administrators' group are granted Group Policy administration privileges on the managed domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,13 +14,15 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 12/08/2017
17
+
ms.date: 06/22/2018
18
18
ms.author: maheshu
19
19
20
20
---
21
21
# Configure secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
22
22
This article shows how you can enable Secure Lightweight Directory Access Protocol (LDAPS) for your Azure AD Domain Services managed domain. Secure LDAP is also known as 'Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) / Transport Layer Security (TLS)'.
0 commit comments