You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/tutorial-create-tenant.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,8 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
64
64
For **Resource group**, select **Create new**. Enter a **Name** for the resource group that will contain the tenant, select the **Resource group location**, and then select **Create**.
65
65
66
66

67
+
68
+
You can link multiple Azure AD B2C tenants to a single Azure subscription for billing purposes.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/compare-identity-solutions.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: overview
12
-
ms.date: 10/30/2019
12
+
ms.date: 01/22/2020
13
13
ms.author: iainfou
14
14
15
15
#Customer intent: As an IT administrator or decision maker, I want to understand the differences between Active Directory Domain Services (AD DS), Azure AD, and Azure AD DS so I can choose the most appropriate identity solution for my organization.
@@ -25,8 +25,8 @@ Although the three Active Directory-based identity solutions share a common name
25
25
* AD DS is a central component in many organizations with an on-premises IT environment, and provides core user account authentication and computer management features.
26
26
***Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Office 365, the Azure portal, or SaaS applications.
27
27
* Azure AD can be synchronized with an on-premises AD DS environment to provide a single identity to users that works natively in the cloud.
28
-
***Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fullycompatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
29
-
* Azure AD DS integrates with Azure AD, which itself can synchronize with an on-premises AD DS environment, to extend central identity use cases to traditional web applications that run in Azure as part of a lift-and-shift strategy.
28
+
***Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully-compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
29
+
* Azure AD DS integrates with Azure AD, which itself can synchronize with an on-premises AD DS environment. This ability extends central identity use cases to traditional web applications that run in Azure as part of a lift-and-shift strategy.
30
30
31
31
This overview article compares and contrasts how these identity solutions can work together, or would be used independently, depending on the needs of your organization.
32
32
@@ -45,8 +45,8 @@ When you deploy and run a self-managed AD DS environment, you have to maintain a
45
45
46
46
Common deployment models for a self-managed AD DS environment that provides identity to applications and services in the cloud include the following:
47
47
48
-
***Standalone cloud-only AD DS** - Azure VMs are configured as domain controllers and a separate cloud-only AD DS environment is created. This AD DS environment doesn't integrate with an on-premises AD DS environment. A different set of credentials is used to sign in to and administer VMs in the cloud.
49
-
***Resource forest deployment** - Azure VMs are configured as domain controllers and an AD DS domain as part of an existing forest is created. A trust relationship is then configured to an on-premises AD DS environment. Other Azure VMs can domain-join to this resource forest in the cloud. User authentication runs over a VPN / ExpressRoute connection to the on-premises AD DS environment.
48
+
***Standalone cloud-only AD DS** - Azure VMs are configured as domain controllers and a separate, cloud-only AD DS environment is created. This AD DS environment doesn't integrate with an on-premises AD DS environment. A different set of credentials is used to sign in and administer VMs in the cloud.
49
+
***Resource forest deployment** - Azure VMs are configured as domain controllers and an AD DS domain that's part of an existing forest is created. A trust relationship is then configured to an on-premises AD DS environment. Other Azure VMs can domain-join to this resource forest in the cloud. User authentication runs over a VPN / ExpressRoute connection to the on-premises AD DS environment.
50
50
***Extend on-premises domain to Azure** - An Azure virtual network connects to an on-premises network using a VPN / ExpressRoute connection. Azure VMs connect to this Azure virtual network, which lets them domain-join to the on-premises AD DS environment.
51
51
* An alternative is to create Azure VMs and promote them as replica domain controllers from the on-premises AD DS domain. These domain controllers replicate over a VPN / ExpressRoute connection to the on-premises AD DS environment. The on-premises AD DS domain is effectively extended into Azure.
52
52
@@ -64,15 +64,15 @@ The following table outlines some of the features you may need for your organiza
64
64
|**Custom OU structure**|**✓**|**✓**|
Azure AD lets you manage the identity of devices used by the organization and control access to corporate resources from those devices. Users can also register their personal device (a bring-your-own, or BYO, model) with Azure AD, which provides the device with an identity. Azure AD then authenticates the device when a user signs in to Azure AD and uses the device to access secured resources. The device can be managed using Mobile Device Management (MDM) software like Microsoft Intune. This management ability lets you restrict access to sensitive resources to managed and policy-compliant devices.
75
+
Azure AD lets you manage the identity of devices used by the organization and control access to corporate resources from those devices. Users can also register their personal device (a bring-your-own (BYO) model) with Azure AD, which provides the device with an identity. Azure AD then authenticates the device when a user signs in to Azure AD and uses the device to access secured resources. The device can be managed using Mobile Device Management (MDM) software like Microsoft Intune. This management ability lets you restrict access to sensitive resources to managed and policy-compliant devices.
76
76
77
77
Traditional computers and laptops can also join to Azure AD. This mechanism offers the same benefits of registering a personal device with Azure AD, such as to allow users to sign in to the device using their corporate credentials.
78
78
@@ -89,8 +89,8 @@ Devices can be joined to Azure AD with or without a hybrid deployment that inclu
89
89
|**Type of device**|**Device platforms**|**Mechanism**|
| Personal devices | Windows 10, iOS, Android, Mac OS | Azure AD registered |
92
-
| Organizationowned device not joined to on-premises AD DS | Windows 10 | Azure AD joined |
93
-
| Organizationowned device joined to an on-premises AD DS | Windows 10 | Hybrid Azure AD joined |
92
+
| Organization-owned device not joined to on-premises AD DS | Windows 10 | Azure AD joined |
93
+
| Organization-owned device joined to an on-premises AD DS | Windows 10 | Hybrid Azure AD joined |
94
94
95
95
On an Azure AD-joined or registered device, user authentication happens using modern OAuth / OpenID Connect based protocols. These protocols are designed to work over the internet, so are great for mobile scenarios where users access corporate resources from anywhere.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/migrate-from-classic-vnet.md
+18-15Lines changed: 18 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,16 +8,16 @@ ms.service: active-directory
8
8
ms.subservice: domain-services
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 10/15/2019
11
+
ms.date: 01/22/2020
12
12
ms.author: iainfou
13
13
14
14
---
15
15
16
16
# Preview - Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager
17
17
18
-
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model.
18
+
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
19
19
20
-
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. This feature is currently in preview.
20
+
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. This migration feature is currently in preview.
21
21
22
22
## Overview of the migration process
23
23
@@ -103,7 +103,7 @@ As you prepare and then migrate an Azure AD DS managed domain, there are some co
103
103
104
104
### IP addresses
105
105
106
-
The domain controller IP addresses for an Azure AD DS managed domain change after migration. This includes the public IP address for the secure LDAP endpoint. The new IP addresses are inside the address range for the new subnet in the Resource Manager virtual network.
106
+
The domain controller IP addresses for an Azure AD DS managed domain change after migration. This change includes the public IP address for the secure LDAP endpoint. The new IP addresses are inside the address range for the new subnet in the Resource Manager virtual network.
107
107
108
108
In the case of rollback, the IP addresses may change after rolling back.
109
109
@@ -119,13 +119,13 @@ Azure AD DS managed domains that run on Classic virtual networks don't have AD a
119
119
120
120
By default, 5 bad password attempts in 2 minutes lock out an account for 30 minutes.
121
121
122
-
A locked out account can't be signed in to, which may interfere with the ability to manage the Azure AD DS managed domain or applications managed by the account. After an Azure AD DS managed domain is migrated, accounts can experience what feels like a permanent lockout due to repeated failed attempts to sign in. Two common scenarios after migration include the following:
122
+
A locked out account can't be used to sign in, which may interfere with the ability to manage the Azure AD DS managed domain or applications managed by the account. After an Azure AD DS managed domain is migrated, accounts can experience what feels like a permanent lockout due to repeated failed attempts to sign in. Two common scenarios after migration include the following:
123
123
124
124
* A service account that's using an expired password.
125
125
* The service account repeatedly tries to sign in with an expired password, which locks out the account. To fix this, locate the application or VM with expired credentials and update the password.
126
126
* A malicious entity is using brute-force attempts to sign in to accounts.
127
127
* When VMs are exposed to the internet, attackers often try common username and password combinations as they attempt to sign. These repeated failed sign-in attempts can lock out the accounts. It's not recommended to use administrator accounts with generic names such as *admin* or *administrator*, for example, to minimize administrative accounts from being locked out.
128
-
* Minimize the number of VMs that are exposed to the internet. You can use [Azure Bastion (currently in preview)][azure-bastion] to securely connect to VMs using the Azure portal.
128
+
* Minimize the number of VMs that are exposed to the internet. You can use [Azure Bastion][azure-bastion] to securely connect to VMs using the Azure portal.
129
129
130
130
If you suspect that some accounts may be locked out after migration, the final migration steps outline how to enable auditing or change the fine-grained password policy settings.
131
131
@@ -161,11 +161,11 @@ The migration to the Resource Manager deployment model and virtual network is sp
161
161
162
162
## Update and verify virtual network settings
163
163
164
-
Before you begin the migration, complete the following initial checks and updates. These steps can happen at any time before the migration and don't affect the operation of the Azure AD DS managed domain.
164
+
Before you begin the migration process, complete the following initial checks and updates. These steps can happen at any time before the migration and don't affect the operation of the Azure AD DS managed domain.
165
165
166
166
1. Update your local Azure PowerShell environment to the latest version. To complete the migration steps, you need at least version *2.3.2*.
167
167
168
-
For information on how to check and update, see [Azure PowerShell overview][azure-powershell].
168
+
For information on how to check and update your PowerShell version, see [Azure PowerShell overview][azure-powershell].
169
169
170
170
1. Create, or choose an existing, Resource Manager virtual network.
171
171
@@ -207,7 +207,8 @@ To prepare the Azure AD DS managed domain for migration, complete the following
207
207
208
208
```powershell
209
209
Migrate-Aadds `
210
-
-Prepare -ManagedDomainFqdn contoso.com `
210
+
-Prepare `
211
+
-ManagedDomainFqdn contoso.com `
211
212
-Credentials $creds
212
213
```
213
214
@@ -270,27 +271,27 @@ The second domain controller should be available 1-2 hours after the migration c
270
271
271
272
When the migration process is successfully complete, some optional configuration steps include enabling audit logs or e-mail notifications, or updating the fine-grained password policy.
272
273
273
-
####Subscribe to audit logs using Azure Monitor
274
+
### Subscribe to audit logs using Azure Monitor
274
275
275
276
Azure AD DS exposes audit logs to help troubleshoot and view events on the domain controllers. For more information, see [Enable and use audit logs][security-audits].
276
277
277
278
You can use templates to monitor important information exposed in the logs. For example, the audit log workbook template can monitor possible account lockouts on the Azure AD DS managed domain.
278
279
279
-
####Configure Azure AD Domain Services email notifications
280
+
### Configure Azure AD Domain Services email notifications
280
281
281
282
To be notified when a problem is detected on the Azure AD DS managed domain, update the email notification settings in the Azure portal. For more information, see [Configure notification settings][notifications].
282
283
283
-
####Update fine-grained password policy
284
+
### Update fine-grained password policy
284
285
285
286
If needed, you can update the fine-grained password policy to be less restrictive than the default configuration. You can use the audit logs to determine if a less restrictive setting makes sense, then configure the policy as needed. Use the following high-level steps to review and update the policy settings for accounts that are repeatedly locked out after migration:
286
287
287
288
1.[Configure password policy][password-policy] for fewer restrictions on the Azure AD DS managed domain and observe the events in the audit logs.
288
289
1. If any service accounts are using expired passwords as identified in the audit logs, update those accounts with the correct password.
289
-
1. If VM is exposed to the internet, review for generic account names like *administrator*, *user*, or *guest* with high sign-in attempts. Where possible, update those VMs to use less generically named accounts.
290
-
1. Use a network trace on the VM to locate the source of the attacks and block those IP addresses for being able to attempt sign-ins.
290
+
1. If a VM is exposed to the internet, review for generic account names like *administrator*, *user*, or *guest* with high sign-in attempts. Where possible, update those VMs to use less generically named accounts.
291
+
1. Use a network trace on the VM to locate the source of the attacks and block those IP addresses from being able to attempt sign-ins.
291
292
1. When there are minimal lockout issues, update the fine-grained password policy to be as restrictive as necessary.
292
293
293
-
####Creating a network security group
294
+
### Creating a network security group
294
295
295
296
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain, and isn't automatically created. To create the network security group and open the required ports, review the following steps:
296
297
@@ -299,6 +300,8 @@ Azure AD DS needs a network security group to secure the ports needed for the ma
299
300
300
301
## Roll back and restore from migration
301
302
303
+
Up to a certain point in the migration process, you can choose to roll back or restore the Azure AD DS managed domain.
304
+
302
305
### Roll back
303
306
304
307
If there's an error when you run the PowerShell cmdlet to prepare for migration in step 2 or for the migration itself in step 3, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
0 commit comments