You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Management concepts for Azure AD Domain Services | Microsoft Docs
3
+
description: Learn about how to administer an Azure Active Directory Domain Services managed domain and the behavior of user accounts and passwords
4
+
services: active-directory-ds
5
+
author: iainfoulds
6
+
manager: daveba
7
+
8
+
ms.service: active-directory
9
+
ms.subservice: domain-services
10
+
ms.workload: identity
11
+
ms.topic: conceptual
12
+
ms.date: 10/08/2019
13
+
ms.author: iainfou
14
+
15
+
---
16
+
17
+
# Management concepts for user accounts, passwords, and administration in Azure Active Directory Domain Services
18
+
19
+
When you create and run an Azure Active Directory Domain Services (AD DS) managed domain, there are some differences in behavior compared to a traditional on-premises AD DS environment. You use the same administrative tools in Azure AD DS as a self-managed domain, but you can't directly access the domain controllers (DC). There's also some differences in behavior for password policies and password hashes depending on the source of the user account creation.
20
+
21
+
This conceptual article details how to administer an Azure AD DS managed domain and the different behavior of user accounts depending on the way they're created.
22
+
23
+
## Domain management
24
+
25
+
In Azure AD DS, the domain controllers (DCs) that contain all the resources like users and groups, credentials, and policies are part of the managed service. For redundancy, two DCs are created as part of an Azure AD DS managed domain. You can't sign in to these DCs to perform management tasks. Instead, you create a management VM that's joined to the Azure AD DS managed domain, then install your regular AD DS management tools. You can use the Active Directory Administrative Center or Microsoft Management Console (MMC) snap-ins like DNS or Group Policy objects, for example.
26
+
27
+
## User account creation
28
+
29
+
User accounts can be created in Azure AD DS in multiple ways. Most user accounts are synchronized in from Azure AD, which can also include user account synchronized from an on-premises AD DS environment. You can also manually create accounts directly in Azure AD DS. Some features, like initial password synchronization or password policy, behave differently depending on how and where user accounts are created.
30
+
31
+
* The user account can be synchronized in from Azure AD. This includes cloud-only user accounts created directly in Azure AD, and hybrid user accounts synchronized from an on-premises AD DS environment using Azure AD Connect.
32
+
* The majority of user accounts in Azure AD DS are created through the synchronization process from Azure AD.
33
+
* The user account can be manually created in an Azure AD DS managed domain, and doesn't exist in Azure AD.
34
+
* If you need to create service accounts for applications that only run in Azure AD DS, you can manually create them in the managed domain. As synchronization is one-way from Azure AD, user accounts created in Azure AD DS aren't synchronized back to Azure AD.
35
+
36
+
## Password policy
37
+
38
+
Azure AD DS includes a default password policy that defines settings for things like account lockout, maximum password age, and password complexity. Settings like account lockout policy apply to all users in Azure AD DS, regardless of how the user was created as outlined in the previous section. A few settings, like minimum password length and password complexity, only apply to users created directly in Azure AD DS.
39
+
40
+
You can create your own custom password policies to override the default policy in Azure AD DS. These custom policies can then be applied to specific groups of users as needed.
41
+
42
+
For more information on the differences in how password policies are applied depending on the source of user creation, see [Password and account lockout policies on managed domains][password-policy].
43
+
44
+
## Password hashes
45
+
46
+
To authenticate users on the managed domain, Azure AD DS needs password hashes in a format that's suitable for NT LAN Manager (NTLM) and Kerberos authentication. Azure AD doesn't generate or store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Azure AD DS for your tenant. For security reasons, Azure AD also doesn't store any password credentials in clear-text form. Therefore, Azure AD can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
47
+
48
+
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD.
49
+
50
+
For users synchronized from an on-premises AD DS environment using Azure AD Connect, [enable synchronization of password hashes][hybrid-phs].
51
+
52
+
> [!IMPORTANT]
53
+
> Azure AD Connect only synchronizes legacy password hashes when you enable Azure AD DS for your Azure AD tenant. Legacy password hashes aren't used if you only use Azure AD Connect to synchronize an on-premises AD DS environment with Azure AD.
54
+
>
55
+
> If your legacy applications don't use NTLM authentication or LDAP simple binds, we recommend that you disable NTLM password hash synchronization for Azure AD DS. For more information, see [Disable weak cipher suites and NTLM credential hash synchronization][secure-domain].
56
+
57
+
Once appropriately configured, the usable password hashes are stored in the Azure AD DS managed domain. If you delete the Azure AD DS managed domain, any password hashes stored at that point are also deleted. Synchronized credential information in Azure AD can't be reused if you later create an Azure AD DS managed domain - you must reconfigure the password hash synchronization to store the password hashes again. Previously domain-joined VMs or users won't be able to immediately authenticate - Azure AD needs to generate and store the password hashes in the new Azure AD DS managed domain. For more information, see [Password hash sync process for Azure AD DS and Azure AD Connect][azure-ad-password-sync].
58
+
59
+
## Next steps
60
+
61
+
To get started, [create an Azure AD DS managed domain][create-instance].
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/password-policy.md
+42-39Lines changed: 42 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,15 +10,15 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: article
13
-
ms.date: 08/08/2019
13
+
ms.date: 10/08/2019
14
14
ms.author: iainfou
15
15
16
16
---
17
17
# Password and account lockout policies on managed domains
18
18
19
-
To manage account security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control settings such as minimum password length, password expiration time, or password complexity. A default password policy is applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.
19
+
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.
20
20
21
-
This article shows you how to create and configure a fine-grained password policy using the Active Directory Administrative Center.
21
+
This article shows you how to create and configure a fine-grained password policy in Azure AD DS using the Active Directory Administrative Center.
22
22
23
23
## Before you begin
24
24
@@ -34,65 +34,68 @@ To complete this article, you need the following resources and privileges:
34
34
* If needed, complete the tutorial to [create a management VM][tutorial-create-management-vm].
35
35
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
36
36
37
-
## Fine-grained password policies (FGPP) overview
37
+
## Default password policy settings
38
38
39
-
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. For example, to secure privileged accounts you can apply stricter password settings than regular non-privileged accounts. You can create multiple FGPPs to specify password policies within an Azure AD DS managed domain.
39
+
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. For example, to secure privileged accounts you can apply stricter account lockout settings than regular non-privileged accounts. You can create multiple FGPPs within an Azure AD DS managed domain and specify the order of priority to apply them to users.
40
40
41
-
The following password settings can be configured using FGPP:
41
+
Policies are distributed through group association in an Azure AD DS managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.
42
42
43
-
* Minimum password length
44
-
* Password history
45
-
* Passwords must meet complexity requirements
46
-
* Minimum password age
47
-
* Maximum password age
48
-
* Account lockout policy
49
-
* Account lockout duration
50
-
* Number of failed logon attempts allowed
51
-
* Reset failed logon attempts count after
43
+
Password policies behave a little differently depending on how the user account they're applied to was created. There are two ways a user account can be created in Azure AD DS:
52
44
53
-
FGPP only affects users created in Azure AD DS. Cloud users and domain users synchronized into the Azure AD DS managed domain from Azure AD aren't affected by the password policies.
45
+
* The user account can be synchronized in from Azure AD. This includes cloud-only user accounts created directly in Azure, and hybrid user accounts synchronized from an on-premises AD DS environment using Azure AD Connect.
46
+
* The majority of user accounts in Azure AD DS are created through the synchronization process from Azure AD.
47
+
* The user account can be manually created in an Azure AD DS managed domain, and doesn't exist in Azure AD.
54
48
55
-
Policies are distributed through group association in the Azure AD DS managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.
56
-
57
-
## Default fine-grained password policy settings
58
-
59
-
In an Azure AD DS managed domain, the following password policies are configured by default and applied to all users:
60
-
61
-
***Minimum password length (characters):** 7
62
-
***Maximum password age (lifetime):** 90 days
63
-
***Passwords must meet complexity requirements**
64
-
65
-
The following account lockout policies are then configured by default:
49
+
All users, regardless of how they're created, have the following account lockout policies applied by the default password policy in Azure AD DS:
With these default settings, user accounts are locked out for 30 minutes if five invalid passwords are used within 2 minutes. Accounts are automatically unlocked after 30 minutes.
72
57
73
-
You can't modify or delete the default built-in fine-grained password policy. Instead, members of the *AAD DC Administrators* group can a create custom FGPP and configure it to override (take precedence over) the default built-in FGPP, as shown in the next section.
58
+
Account lockouts only occur within the managed domain. User accounts are only locked out in Azure AD DS, and only due to failed sign-in attempts against the managed domain. User accounts that were synchronized in from Azure AD or on-premises aren't locked out in their source directories, only in Azure AD DS.
59
+
60
+
If you have an Azure AD password policy that specifies a maximum password age greater than 90 days, that password age is applied to the default policy in Azure AD DS. You can configure a custom password policy to define a different maximum password age in Azure AD DS. Take care if you have a shorter maximum password age configured in an Azure AD DS password policy than in Azure AD or an on-premises AD DS environment. In that scenario, a user's password may expire in Azure AD DS before they're prompted to change in Azure AD on an on-premises AD DS environment.
74
61
75
-
## Create a custom fine-grained password policy
62
+
For user accounts created manually in an Azure AD DS managed domain, the following additional password settings are also applied from the default policy. These settings don't apply to user accounts synchronized in from Azure AD, as a user can't update their password directly in Azure AD DS.
76
63
77
-
As you build and applications in Azure, you may want to configure a custom FGPP. Some examples of the need to create a custom FGPP include to set a different account lockout policy, or to configure a default password lifetime setting for the managed domain.
64
+
***Minimum password length (characters):** 7
65
+
***Passwords must meet complexity requirements**
66
+
67
+
You can't modify the account lockout or password settings in the default password policy. Instead, members of the *AAD DC Administrators* group can create custom password policies and configure it to override (take precedence over) the default built-in policy, as shown in the next section.
68
+
69
+
## Create a custom password policy
70
+
71
+
As you build and run applications in Azure, you may want to configure a custom password policy. For example, you could create a policy to set different account lockout policy settings.
78
72
79
-
You can create a custom FGPP and apply it to specific groups in your Azure AD DS managed domain. This configuration effectively overrides the default FGPP. You can also create custom fine-grained password policies and apply them to any custom OUs you create in the Azure AD DS managed domain.
73
+
Custom password policies are applied to groups in an Azure AD DS managed domain. This configuration effectively overrides the default policy.
80
74
81
-
To create a fine-grained password policy, you use the Active Directory Administrative Tools from a domain-joined VM. The Active Directory Administrative Center lets you view, edit, and create resources in an Azure AD DS managed domain, including OUs.
75
+
To create a custom password policy, you use the Active Directory Administrative Tools from a domain-joined VM. The Active Directory Administrative Center lets you view, edit, and create resources in an Azure AD DS managed domain, including OUs.
82
76
83
77
> [!NOTE]
84
-
> To create a fine-grained password policy in an Azure AD DS managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
78
+
> To create a custom password policy in an Azure AD DS managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
85
79
86
80
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
87
81
1. To create and manage OUs, select **Active Directory Administrative Center** from the list of administrative tools.
88
82
1. In the left pane, choose your Azure AD DS managed domain, such as *contoso.com*.
89
-
1. Open the **System** container, then the **Password Settings** container.
83
+
1. Open the **System** container, then the **Password Settings Container**.
84
+
85
+
A built-in password policy for the Azure AD DS managed domain is shown. You can't modify this built-in policy. Instead, create a custom password policy to override the default policy.
86
+
87
+

90
88
91
-
A built-in FGPP for the Azure AD DS managed domain is shown. You can't modify this built-in FGPP. Instead, create a new custom FGPP to override the default FGPP.
92
89
1. In the **Tasks** panel on the right, select **New > Password Settings**.
93
-
1. In the **Create Password Settings** dialog, enter a name for the policy, such as *MyCustomFGPP*. Set the precedence to appropriately to override the default FGPP (which is *200*), such as *1*.
90
+
1. In the **Create Password Settings** dialog, enter a name for the policy, such as *MyCustomFGPP*.
91
+
1. When multiple password policies exist, the policy with the highest precedence, or priority, is applied to a user. The lower the number, the higher the priority. The default password policy has a priority of *200*.
92
+
93
+
Set the precedence for your custom password policy to override the default, such as *1*.
94
+
95
+
1. Edit other password policy settings as desired. Remember the following key points:
94
96
95
-
Edit other password policy settings as desired, such as **Enforce password history** to require the user to create a password that's different from the previous *24* passwords.
97
+
* Settings like password complexity, age, or expiration time only to users manually created in an Azure AD DS managed domain.
98
+
* Account lockout settings apply to all users, but only take effect within the managed domain.
96
99
97
100

98
101
@@ -101,7 +104,7 @@ To create a fine-grained password policy, you use the Active Directory Administr
101
104
102
105

103
106
104
-
1.Fine-grained password policies can only be applied to groups. In the **Locations** dialog, expand the domain name, such as *contoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
107
+
1.Password policies can only be applied to groups. In the **Locations** dialog, expand the domain name, such as *contoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
105
108
106
109

107
110
@@ -113,7 +116,7 @@ To create a fine-grained password policy, you use the Active Directory Administr
113
116
114
117
## Next steps
115
118
116
-
For more information about fine-grained password policies and using the Active Directory Administration Center, see the following articles:
119
+
For more information about password policies and using the Active Directory Administration Center, see the following articles:
117
120
118
121
*[Learn about fine-grained password policies](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc770394(v=ws.10))
119
122
*[Configure fine-grained password policies using AD Administration Center](/windows-server/identity/ad-ds/get-started/adac/introduction-to-active-directory-administrative-center-enhancements--level-100-#fine_grained_pswd_policy_mgmt)
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-create-first-function-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ Azure Functions Core Tools integrates with Visual Studio Code to let you run and
91
91
92
92
You can also execute the GET request from a browser.
93
93
94
-
When you call the HttpTrigger endpoint without passing a `name` parameter either as a query parameter or in the body, the function returns a 500 error. When you review the code in run.ps1, you see that this error occurs by design.
94
+
When you call the HttpTrigger endpoint without passing a `name` parameter either as a query parameter or in the body, the function returns a [HttpStatusCode]::BadRequest error. When you review the code in run.ps1, you see that this error occurs by design.
0 commit comments