Skip to content

Commit 7ac6a1c

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 37df805 + d47a30e commit 7ac6a1c

File tree

106 files changed

+1080
-329
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+1080
-329
lines changed

articles/active-directory-domain-services/network-considerations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 08/09/2019
13+
ms.date: 10/23/2019
1414
ms.author: iainfou
1515

1616
---
@@ -87,8 +87,8 @@ An Azure AD DS managed domain creates some networking resources during deploymen
8787
| Azure resource | Description |
8888
|:----------------------------------------|:---|
8989
| Network interface card | Azure AD DS hosts the managed domain on two domain controllers (DCs) that run on Windows Server as Azure VMs. Each VM has a virtual network interface that connects to your virtual network subnet. |
90-
| Dynamic basic public IP address | Azure AD DS communicates with the synchronization and management service using a basic SKU public IP address. For more information about public IP addresses, see [IP address types and allocation methods in Azure](../virtual-network/virtual-network-ip-addresses-overview-arm.md). |
91-
| Azure basic load balancer | Azure AD DS uses a basic SKU load balancer for network address translation (NAT) and load balancing (when used with secure LDAP). For more information about Azure load balancers, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md) |
90+
| Dynamic standard public IP address | Azure AD DS communicates with the synchronization and management service using a standard SKU public IP address. For more information about public IP addresses, see [IP address types and allocation methods in Azure](../virtual-network/virtual-network-ip-addresses-overview-arm.md). |
91+
| Azure standard load balancer | Azure AD DS uses a standard SKU load balancer for network address translation (NAT) and load balancing (when used with secure LDAP). For more information about Azure load balancers, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md) |
9292
| Network address translation (NAT) rules | Azure AD DS creates and uses three NAT rules on the load balancer - one rule for secure HTTP traffic, and two rules for secure PowerShell remoting. |
9393
| Load balancer rules | When an Azure AD DS managed domain is configured for secure LDAP on TCP port 636, three rules are created and used on a load balancer to distribute the traffic. |
9494

articles/active-directory-domain-services/powershell-create-instance.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,12 @@ $Vnet= New-AzVirtualNetwork `
126126

127127
Now let's create an Azure AD DS managed domain. Set your Azure subscription ID, and then provide a name for the managed domain, such as *contoso.com*. You can get your subscription ID using the [Get-AzSubscription][Get-AzSubscription] cmdlet.
128128

129+
If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
130+
131+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
132+
133+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones].
134+
129135
```powershell
130136
$AzureSubscriptionId = "YOUR_AZURE_SUBSCRIPTION_ID"
131137
$ManagedDomainName = "contoso.com"
@@ -144,6 +150,8 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
144150

145151
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
146152
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
153+
* If you created an Azure AD DS managed domain in a region that supports Availability Zones, create a network security group to restrict traffic in the virtual network for the Azure AD DS managed domain. An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly.
154+
* To create the network security group and required rules, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically create and configure the network security group.
147155
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
148156

149157
## Complete PowerShell script
@@ -229,6 +237,8 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
229237

230238
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
231239
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
240+
* If you created an Azure AD DS managed domain in a region that supports Availability Zones, create a network security group to restrict traffic in the virtual network for the Azure AD DS managed domain. An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly.
241+
* To create the network security group and required rules, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically create and configure the network security group.
232242
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
233243

234244
## Next steps
@@ -254,3 +264,4 @@ To see the Azure AD DS managed domain in action, you can [domain-join a Windows
254264
[New-AzVirtualNetwork]: /powershell/module/Az.Network/New-AzVirtualNetwork
255265
[Get-AzSubscription]: /powershell/module/Az.Accounts/Get-AzSubscription
256266
[cloud-shell]: /azure/cloud-shell/cloud-shell-windows-users
267+
[availability-zones]: ../availability-zones/az-overview.md

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/18/2019
11+
ms.date: 10/23/2019
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -86,7 +86,11 @@ The following DNS name restrictions also apply:
8686
Complete the fields in the *Basics* window of the Azure portal to create an Azure AD DS instance:
8787

8888
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
89-
1. Choose the Azure **Location** in which the managed domain should be created.
89+
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
90+
91+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
92+
93+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
9094

9195
![Configure basic settings for an Azure AD Domain Services instance](./media/tutorial-create-instance-advanced/basics-window.png)
9296

@@ -165,7 +169,7 @@ On the **Summary** page of the wizard, review the configuration settings for the
165169

166170
![Domain Services status once successfully provisioned](./media/tutorial-create-instance-advanced/successfully-provisioned.png)
167171

168-
During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in your directory. These Enterprise Applications are needed to service your managed domain. It's imperative that these applications are not deleted at any time.
172+
The managed domain is associated with your Azure AD tenant. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in the Azure AD tenant. These Enterprise Applications are needed to service your managed domain. Don't delete these applications.
169173

170174
## Update DNS settings for the Azure virtual network
171175

@@ -236,6 +240,7 @@ To see this managed domain in action, create and join a virtual machine to the d
236240
[on-prem-sync]: tutorial-configure-password-hash-sync.md
237241
[configure-sspr]: ../active-directory/authentication/quickstart-sspr.md
238242
[password-hash-sync-process]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
243+
[availability-zones]: ../availability-zones/az-overview.md
239244

240245
<!-- EXTERNAL LINKS -->
241246
[naming-prefix]: /windows-server/identity/ad-ds/plan/selecting-the-forest-root-domain#selecting-a-prefix

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/18/2019
11+
ms.date: 10/23/2019
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -85,7 +85,11 @@ The following DNS name restrictions also apply:
8585
Complete the fields in the *Basics* window of the Azure portal to create an Azure AD DS instance:
8686

8787
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
88-
1. Choose the Azure **Location** in which the managed domain should be created.
88+
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
89+
90+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
91+
92+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
8993

9094
![Configure basic settings for an Azure AD Domain Services instance](./media/tutorial-create-instance/basics-window.png)
9195

@@ -115,7 +119,7 @@ On the **Summary** page of the wizard, review the configuration settings for the
115119

116120
![Domain Services status once successfully provisioned](./media/tutorial-create-instance/successfully-provisioned.png)
117121

118-
We provision Azure AD Domain Services on the Azure Active Directory tenant and the Azure AD Domain Services resource for the service is created within the associated Azure subscription. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in your Azure Active directory instance where you have enabled the Azure AD domain services. These Enterprise Applications are needed to service your managed domain. It's imperative that these applications are not deleted at any time.
122+
The managed domain is associated with your Azure AD tenant. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in the Azure AD tenant. These Enterprise Applications are needed to service your managed domain. Don't delete these applications.
119123

120124
## Update DNS settings for the Azure virtual network
121125

@@ -186,6 +190,7 @@ Before you domain-join VMs and deploy applications that use the Azure AD DS mana
186190
[on-prem-sync]: tutorial-configure-password-hash-sync.md
187191
[configure-sspr]: ../active-directory/authentication/quickstart-sspr.md
188192
[password-hash-sync-process]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
193+
[availability-zones]: ../availability-zones/az-overview.md
189194

190195
<!-- EXTERNAL LINKS -->
191196
[naming-prefix]: /windows-server/identity/ad-ds/plan/selecting-the-forest-root-domain#selecting-a-prefix

articles/active-directory/hybrid/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,8 @@
149149
href: plan-migrate-adfs-password-hash-sync.md
150150
- name: Migrate from federation to PTA
151151
href: plan-migrate-adfs-pass-through-authentication.md
152+
- name: Cloud authentication - Staged Rollout (Public Preview)
153+
href: how-to-connect-staged-rollout.md
152154
- name: Hybrid Identity Design Considerations
153155
items:
154156
- name: Hybrid Identity Design Considerations Overview

0 commit comments

Comments
 (0)