You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/faqs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ No. After you create an Azure AD Domain Services managed domain, you can't then
87
87
No. You don't have permissions to connect to domain controllers for the managed domain using Remote Desktop. Members of the *AAD DC Administrators* group can administer the managed domain using AD administration tools such as the Active Directory Administration Center (ADAC) or AD PowerShell. These tools are installed using the *Remote Server Administration Tools* feature on a Windows server joined to the managed domain. For more information, see [Create a management VM to configure and administer an Azure AD Domain Services managed domain](tutorial-create-management-vm.md).
88
88
89
89
### I've enabled Azure AD Domain Services. What user account do I use to domain join machines to this domain?
90
-
Members of the administrative group *AAD DC Administrators* can domain-join machines. Additionally, members of this group are granted remote desktop access to machines that have been joined to the domain.
90
+
Any user account that's part of the Azure AD DS managed domain can join a VM. Members of the *AAD DC Administrators*group are granted remote desktop access to machines that have been joined to the managed domain.
91
91
92
92
### Do I have domain administrator privileges for the managed domain provided by Azure AD Domain Services?
93
93
No. You aren't granted administrative privileges on the managed domain. *Domain Administrator* and *Enterprise Administrator* privileges aren't available for you to use within the domain. Members of the domain administrator or enterprise administrator groups in your on-premises Active Directory are also not granted domain / enterprise administrator privileges on the managed domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-centos-linux-vm.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
30
30
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
31
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32
32
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33
-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33
+
* A user account that's part of the Azure AD DS managed domain.
34
34
35
35
## Create and connect to a CentOS Linux VM
36
36
@@ -94,15 +94,15 @@ Now that the required packages are installed on the VM, join the VM to the Azure
94
94
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
95
95
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
96
96
97
-
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
97
+
1. Now initialize Kerberos using the `kinit` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
98
98
99
-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
99
+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain:
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `[email protected]`:
105
+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a part of the Azure AD DS managed domain that you specified in the previous `kinit` command, such as `[email protected]`:
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-coreos-linux-vm.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
30
30
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
31
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32
32
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33
-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33
+
* A user account that's a part of the Azure AD DS managed domain.
34
34
35
35
## Create and connect to a CoreOS Linux VM
36
36
@@ -130,9 +130,9 @@ With the SSSD configuration file updated, now join the virtual machine to the ma
130
130
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
131
131
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
132
132
133
-
1. Now join the VM to the Azure AD DS managed domain using the `adcli join` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
133
+
1. Now join the VM to the Azure AD DS managed domain using the `adcli join` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
134
134
135
-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group.
135
+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-rhel-linux-vm.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
30
30
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
31
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32
32
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33
-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33
+
* A user account that's a part of the Azure AD DS managed domain.
34
34
35
35
## Create and connect to a RHEL Linux VM
36
36
@@ -104,15 +104,15 @@ Now that the required packages are installed on the VM, join the VM to the Azure
104
104
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
105
105
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
106
106
107
-
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
107
+
1. Now initialize Kerberos using the `kinit` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
108
108
109
-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
109
+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain:
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `[email protected]`:
115
+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a part of the Azure AD DS managed domain that you specified in the previous `kinit` command, such as `[email protected]`:
@@ -138,7 +138,7 @@ Successfully enrolled machine in realm
138
138
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
139
139
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
140
140
141
-
1. First, join the domain using the `adcli join` command, this command will also creates the keytab to authenticate the machine. Use a user account that's a member of the *AAD DC Administrators* group.
141
+
1. First, join the domain using the `adcli join` command, this command will also creates the keytab to authenticate the machine. Use a user account that's a part of the Azure AD DS managed domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-ubuntu-linux-vm.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
30
30
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
31
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32
32
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33
-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33
+
* A user account that's a part of the Azure AD DS managed domain.
34
34
35
35
## Create and connect to an Ubuntu Linux VM
36
36
@@ -129,15 +129,15 @@ Now that the required packages are installed on the VM and NTP is configured, jo
129
129
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
130
130
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
131
131
132
-
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
132
+
1. Now initialize Kerberos using the `kinit` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
133
133
134
-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
134
+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain:
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `[email protected]`:
140
+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a part of the Azure AD DS managed domain that you specified in the previous `kinit` command, such as `[email protected]`:
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-windows-vm-template.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
30
30
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
31
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32
32
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33
-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33
+
* A user account that's a part of the Azure AD DS managed domain.
34
34
35
35
## Azure Resource Manager template overview
36
36
@@ -90,7 +90,7 @@ To create a Windows Server VM then join it to an Azure AD DS managed domain, com
90
90
| DNS Label Prefix | Enter a DNS name to use for the VM, such as *myvm*. |
91
91
| VM size | Specify a VM size, such as *Standard_DS2_v2*. |
92
92
| Domain To Join | The Azure AD DS managed domain DNS name, such as *aaddscontoso.com*. |
93
-
| Domain Username | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a member of the *Azure AD DC administrators* group. |
93
+
| Domain Username | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a part of the Azure AD DS managed domain. |
94
94
| Domain Password | The password for the user account specified in the previous setting. |
95
95
| Optional OU Path | The custom OU in which to add the VM. If you don't specify a value for this parameter, the VM is added to the default *AAD DC Computers* OU. |
96
96
| VM Admin Username | Specify a local administrator account to create on the VM. |
@@ -100,7 +100,7 @@ To create a Windows Server VM then join it to an Azure AD DS managed domain, com
100
100
101
101
> [!WARNING]
102
102
> **Handle passwords with caution.**
103
-
> The template parameter file requests the password for a user account that's a member of the *Azure AD DC administrators* group. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
103
+
> The template parameter file requests the password for a user account that's a part of the Azure AD DS managed domain. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
104
104
105
105
It takes a few minutes for the deployment to complete successfully. When finished, the Windows VM is created and joined to the Azure AD DS managed domain. The VM can be managed or signed into using domain accounts.
106
106
@@ -119,15 +119,15 @@ To join an existing Windows Server VM to an Azure AD DS managed domain, complete
119
119
| Resource group | Choose the resource group with your existing VM. |
120
120
| Location | Select the location of your existing VM. |
121
121
| VM list | Enter the comma-separated list of the existing VM(s) to join to the Azure AD DS managed domain, such as *myVM1,myVM2*. |
122
-
| Domain Join User Name | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a member of the *Azure AD DC administrators* group. |
122
+
| Domain Join User Name | The user account in the Azure AD DS managed domain that should be used to join the VM to the managed domain, such as `[email protected]`. This account must be a part of the Azure AD DS managed domain. |
123
123
| Domain Join User Password | The password for the user account specified in the previous setting. |
124
124
| Optional OU Path | The custom OU in which to add the VM. If you don't specify a value for this parameter, the VM is added to the default *AAD DC Computers* OU. |
125
125
126
126
1. Review the terms and conditions, then check the box for **I agree to the terms and conditions stated above**. When ready, select **Purchase** to join the VM to the Azure AD DS managed domain.
127
127
128
128
> [!WARNING]
129
129
> **Handle passwords with caution.**
130
-
> The template parameter file requests the password for a user account that's a member of the *Azure AD DC administrators* group. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
130
+
> The template parameter file requests the password for a user account that's a part of the Azure AD DS managed domain. Don't manually enter values into this file and leave it accessible on file shares or other shared locations.
131
131
132
132
It takes a few moments for the deployment to complete successfully. When finished, the specified Windows VMs are joined to the Azure AD DS managed domain and can be managed or signed into using domain accounts.
0 commit comments