Skip to content

Commit 8cc0199

Browse files
authored
Merge pull request #106414 from iainfoulds/azureadds-domainjoinprivileges
[AzureADDS] Update guidance on domain-join privileges
2 parents 2755755 + c754c3a commit 8cc0199

10 files changed

+28
-29
lines changed

articles/active-directory-domain-services/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ No. After you create an Azure AD Domain Services managed domain, you can't then
8787
No. You don't have permissions to connect to domain controllers for the managed domain using Remote Desktop. Members of the *AAD DC Administrators* group can administer the managed domain using AD administration tools such as the Active Directory Administration Center (ADAC) or AD PowerShell. These tools are installed using the *Remote Server Administration Tools* feature on a Windows server joined to the managed domain. For more information, see [Create a management VM to configure and administer an Azure AD Domain Services managed domain](tutorial-create-management-vm.md).
8888

8989
### I've enabled Azure AD Domain Services. What user account do I use to domain join machines to this domain?
90-
Members of the administrative group *AAD DC Administrators* can domain-join machines. Additionally, members of this group are granted remote desktop access to machines that have been joined to the domain.
90+
Any user account that's part of the Azure AD DS managed domain can join a VM. Members of the *AAD DC Administrators* group are granted remote desktop access to machines that have been joined to the managed domain.
9191

9292
### Do I have domain administrator privileges for the managed domain provided by Azure AD Domain Services?
9393
No. You aren't granted administrative privileges on the managed domain. *Domain Administrator* and *Enterprise Administrator* privileges aren't available for you to use within the domain. Members of the domain administrator or enterprise administrator groups in your on-premises Active Directory are also not granted domain / enterprise administrator privileges on the managed domain.

articles/active-directory-domain-services/join-centos-linux-vm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3232
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33+
* A user account that's part of the Azure AD DS managed domain.
3434

3535
## Create and connect to a CentOS Linux VM
3636

@@ -94,15 +94,15 @@ Now that the required packages are installed on the VM, join the VM to the Azure
9494
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
9595
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
9696

97-
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
97+
1. Now initialize Kerberos using the `kinit` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
9898

99-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
99+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain:
100100

101101
```console
102102
103103
```
104104

105-
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `[email protected]`:
105+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a part of the Azure AD DS managed domain that you specified in the previous `kinit` command, such as `[email protected]`:
106106

107107
```console
108108
sudo realm join --verbose AADDSCONTOSO.COM -U '[email protected]'

articles/active-directory-domain-services/join-coreos-linux-vm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3232
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33+
* A user account that's a part of the Azure AD DS managed domain.
3434

3535
## Create and connect to a CoreOS Linux VM
3636

@@ -130,9 +130,9 @@ With the SSSD configuration file updated, now join the virtual machine to the ma
130130
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
131131
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
132132

133-
1. Now join the VM to the Azure AD DS managed domain using the `adcli join` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
133+
1. Now join the VM to the Azure AD DS managed domain using the `adcli join` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
134134

135-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group.
135+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain.
136136

137137
```console
138138
sudo adcli join -D AADDSCONTOSO.COM -U [email protected] -K /etc/krb5.keytab -H coreos.aaddscontoso.com -N coreos

articles/active-directory-domain-services/join-rhel-linux-vm.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3232
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33+
* A user account that's a part of the Azure AD DS managed domain.
3434

3535
## Create and connect to a RHEL Linux VM
3636

@@ -104,15 +104,15 @@ Now that the required packages are installed on the VM, join the VM to the Azure
104104
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
105105
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
106106

107-
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
107+
1. Now initialize Kerberos using the `kinit` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
108108

109-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
109+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain:
110110

111111
```console
112112
113113
```
114114

115-
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `[email protected]`:
115+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a part of the Azure AD DS managed domain that you specified in the previous `kinit` command, such as `[email protected]`:
116116

117117
```console
118118
sudo realm join --verbose AADDSCONTOSO.COM -U '[email protected]'
@@ -138,7 +138,7 @@ Successfully enrolled machine in realm
138138
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
139139
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
140140

141-
1. First, join the domain using the `adcli join` command, this command will also creates the keytab to authenticate the machine. Use a user account that's a member of the *AAD DC Administrators* group.
141+
1. First, join the domain using the `adcli join` command, this command will also creates the keytab to authenticate the machine. Use a user account that's a part of the Azure AD DS managed domain.
142142

143143
```console
144144
sudo adcli join aaddscontoso.com -U contosoadmin

articles/active-directory-domain-services/join-ubuntu-linux-vm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3232
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33+
* A user account that's a part of the Azure AD DS managed domain.
3434

3535
## Create and connect to an Ubuntu Linux VM
3636

@@ -129,15 +129,15 @@ Now that the required packages are installed on the VM and NTP is configured, jo
129129
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
130130
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
131131

132-
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
132+
1. Now initialize Kerberos using the `kinit` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
133133

134-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
134+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain:
135135

136136
```console
137137
138138
```
139139

140-
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `[email protected]`:
140+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a part of the Azure AD DS managed domain that you specified in the previous `kinit` command, such as `[email protected]`:
141141

142142
```console
143143
sudo realm join --verbose AADDSCONTOSO.COM -U '[email protected]' --install=/

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3232
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33+
* A user account that's a part of the Azure AD DS managed domain.
3434

3535
## Azure Resource Manager template overview
3636

@@ -90,7 +90,7 @@ To create a Windows Server VM then join it to an Azure AD DS managed domain, com
9090
| DNS Label Prefix | Enter a DNS name to use for the VM, such as *myvm*. |
9191
| VM size | Specify a VM size, such as *Standard_DS2_v2*. |
9292
| Domain To Join | The Azure AD DS managed domain DNS name, such as *aaddscontoso.com*. |
93-
| Domain Username | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a member of the *Azure AD DC administrators* group. |
93+
| Domain Username | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a part of the Azure AD DS managed domain. |
9494
| Domain Password | The password for the user account specified in the previous setting. |
9595
| Optional OU Path | The custom OU in which to add the VM. If you don't specify a value for this parameter, the VM is added to the default *AAD DC Computers* OU. |
9696
| VM Admin Username | Specify a local administrator account to create on the VM. |
@@ -100,7 +100,7 @@ To create a Windows Server VM then join it to an Azure AD DS managed domain, com
100100

101101
> [!WARNING]
102102
> **Handle passwords with caution.**
103-
> The template parameter file requests the password for a user account that's a member of the *Azure AD DC administrators* group. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
103+
> The template parameter file requests the password for a user account that's a part of the Azure AD DS managed domain. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
104104
105105
It takes a few minutes for the deployment to complete successfully. When finished, the Windows VM is created and joined to the Azure AD DS managed domain. The VM can be managed or signed into using domain accounts.
106106

@@ -119,15 +119,15 @@ To join an existing Windows Server VM to an Azure AD DS managed domain, complete
119119
| Resource group | Choose the resource group with your existing VM. |
120120
| Location | Select the location of your existing VM. |
121121
| VM list | Enter the comma-separated list of the existing VM(s) to join to the Azure AD DS managed domain, such as *myVM1,myVM2*. |
122-
| Domain Join User Name | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a member of the *Azure AD DC administrators* group. |
122+
| Domain Join User Name | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a part of the Azure AD DS managed domain. |
123123
| Domain Join User Password | The password for the user account specified in the previous setting. |
124124
| Optional OU Path | The custom OU in which to add the VM. If you don't specify a value for this parameter, the VM is added to the default *AAD DC Computers* OU. |
125125

126126
1. Review the terms and conditions, then check the box for **I agree to the terms and conditions stated above**. When ready, select **Purchase** to join the VM to the Azure AD DS managed domain.
127127

128128
> [!WARNING]
129129
> **Handle passwords with caution.**
130-
> The template parameter file requests the password for a user account that's a member of the *Azure AD DC administrators* group. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
130+
> The template parameter file requests the password for a user account that's a part of the Azure AD DS managed domain. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
131131
132132
It takes a few moments for the deployment to complete successfully. When finished, the specified Windows VMs are joined to the Azure AD DS managed domain and can be managed or signed into using domain accounts.
133133

0 commit comments

Comments
 (0)