Skip to content

Commit 961468f

Browse files
authored
Merge pull request #91228 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents 824e3d9 + 0b13817 commit 961468f

File tree

73 files changed

+543
-234
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+543
-234
lines changed

.vscode/extensions.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
{
2+
"recommendations": [
3+
"docsmsft.docs-authoring-pack"
4+
]
5+
}

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@
2525
href: powershell-create-instance.md
2626
- name: Concepts
2727
items:
28+
- name: Administration basics
29+
href: administration-concepts.md
2830
- name: Common deployment scenarios
2931
href: scenarios.md
3032
- name: How Azure AD DS synchronization works
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: Management concepts for Azure AD Domain Services | Microsoft Docs
3+
description: Learn about how to administer an Azure Active Directory Domain Services managed domain and the behavior of user accounts and passwords
4+
services: active-directory-ds
5+
author: iainfoulds
6+
manager: daveba
7+
8+
ms.service: active-directory
9+
ms.subservice: domain-services
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 10/08/2019
13+
ms.author: iainfou
14+
15+
---
16+
17+
# Management concepts for user accounts, passwords, and administration in Azure Active Directory Domain Services
18+
19+
When you create and run an Azure Active Directory Domain Services (AD DS) managed domain, there are some differences in behavior compared to a traditional on-premises AD DS environment. You use the same administrative tools in Azure AD DS as a self-managed domain, but you can't directly access the domain controllers (DC). There's also some differences in behavior for password policies and password hashes depending on the source of the user account creation.
20+
21+
This conceptual article details how to administer an Azure AD DS managed domain and the different behavior of user accounts depending on the way they're created.
22+
23+
## Domain management
24+
25+
In Azure AD DS, the domain controllers (DCs) that contain all the resources like users and groups, credentials, and policies are part of the managed service. For redundancy, two DCs are created as part of an Azure AD DS managed domain. You can't sign in to these DCs to perform management tasks. Instead, you create a management VM that's joined to the Azure AD DS managed domain, then install your regular AD DS management tools. You can use the Active Directory Administrative Center or Microsoft Management Console (MMC) snap-ins like DNS or Group Policy objects, for example.
26+
27+
## User account creation
28+
29+
User accounts can be created in Azure AD DS in multiple ways. Most user accounts are synchronized in from Azure AD, which can also include user account synchronized from an on-premises AD DS environment. You can also manually create accounts directly in Azure AD DS. Some features, like initial password synchronization or password policy, behave differently depending on how and where user accounts are created.
30+
31+
* The user account can be synchronized in from Azure AD. This includes cloud-only user accounts created directly in Azure AD, and hybrid user accounts synchronized from an on-premises AD DS environment using Azure AD Connect.
32+
* The majority of user accounts in Azure AD DS are created through the synchronization process from Azure AD.
33+
* The user account can be manually created in an Azure AD DS managed domain, and doesn't exist in Azure AD.
34+
* If you need to create service accounts for applications that only run in Azure AD DS, you can manually create them in the managed domain. As synchronization is one-way from Azure AD, user accounts created in Azure AD DS aren't synchronized back to Azure AD.
35+
36+
## Password policy
37+
38+
Azure AD DS includes a default password policy that defines settings for things like account lockout, maximum password age, and password complexity. Settings like account lockout policy apply to all users in Azure AD DS, regardless of how the user was created as outlined in the previous section. A few settings, like minimum password length and password complexity, only apply to users created directly in Azure AD DS.
39+
40+
You can create your own custom password policies to override the default policy in Azure AD DS. These custom policies can then be applied to specific groups of users as needed.
41+
42+
For more information on the differences in how password policies are applied depending on the source of user creation, see [Password and account lockout policies on managed domains][password-policy].
43+
44+
## Password hashes
45+
46+
To authenticate users on the managed domain, Azure AD DS needs password hashes in a format that's suitable for NT LAN Manager (NTLM) and Kerberos authentication. Azure AD doesn't generate or store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Azure AD DS for your tenant. For security reasons, Azure AD also doesn't store any password credentials in clear-text form. Therefore, Azure AD can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
47+
48+
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD.
49+
50+
For users synchronized from an on-premises AD DS environment using Azure AD Connect, [enable synchronization of password hashes][hybrid-phs].
51+
52+
> [!IMPORTANT]
53+
> Azure AD Connect only synchronizes legacy password hashes when you enable Azure AD DS for your Azure AD tenant. Legacy password hashes aren't used if you only use Azure AD Connect to synchronize an on-premises AD DS environment with Azure AD.
54+
>
55+
> If your legacy applications don't use NTLM authentication or LDAP simple binds, we recommend that you disable NTLM password hash synchronization for Azure AD DS. For more information, see [Disable weak cipher suites and NTLM credential hash synchronization][secure-domain].
56+
57+
Once appropriately configured, the usable password hashes are stored in the Azure AD DS managed domain. If you delete the Azure AD DS managed domain, any password hashes stored at that point are also deleted. Synchronized credential information in Azure AD can't be reused if you later create an Azure AD DS managed domain - you must reconfigure the password hash synchronization to store the password hashes again. Previously domain-joined VMs or users won't be able to immediately authenticate - Azure AD needs to generate and store the password hashes in the new Azure AD DS managed domain. For more information, see [Password hash sync process for Azure AD DS and Azure AD Connect][azure-ad-password-sync].
58+
59+
## Next steps
60+
61+
To get started, [create an Azure AD DS managed domain][create-instance].
62+
63+
<!-- INTERNAL LINKS -->
64+
[password-policy]: password-policy.md
65+
[hybrid-phs]: tutorial-configure-password-hash-sync.md#enable-synchronization-of-password-hashes
66+
[secure-domain]: secure-your-domain.md
67+
[azure-ad-password-sync]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
68+
[create-instance]: tutorial-create-instance.md
80.2 KB
Loading

articles/active-directory-domain-services/password-policy.md

Lines changed: 42 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: article
13-
ms.date: 08/08/2019
13+
ms.date: 10/08/2019
1414
ms.author: iainfou
1515

1616
---
1717
# Password and account lockout policies on managed domains
1818

19-
To manage account security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control settings such as minimum password length, password expiration time, or password complexity. A default password policy is applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.
19+
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.
2020

21-
This article shows you how to create and configure a fine-grained password policy using the Active Directory Administrative Center.
21+
This article shows you how to create and configure a fine-grained password policy in Azure AD DS using the Active Directory Administrative Center.
2222

2323
## Before you begin
2424

@@ -34,65 +34,68 @@ To complete this article, you need the following resources and privileges:
3434
* If needed, complete the tutorial to [create a management VM][tutorial-create-management-vm].
3535
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
3636

37-
## Fine-grained password policies (FGPP) overview
37+
## Default password policy settings
3838

39-
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. For example, to secure privileged accounts you can apply stricter password settings than regular non-privileged accounts. You can create multiple FGPPs to specify password policies within an Azure AD DS managed domain.
39+
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. For example, to secure privileged accounts you can apply stricter account lockout settings than regular non-privileged accounts. You can create multiple FGPPs within an Azure AD DS managed domain and specify the order of priority to apply them to users.
4040

41-
The following password settings can be configured using FGPP:
41+
Policies are distributed through group association in an Azure AD DS managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.
4242

43-
* Minimum password length
44-
* Password history
45-
* Passwords must meet complexity requirements
46-
* Minimum password age
47-
* Maximum password age
48-
* Account lockout policy
49-
* Account lockout duration
50-
* Number of failed logon attempts allowed
51-
* Reset failed logon attempts count after
43+
Password policies behave a little differently depending on how the user account they're applied to was created. There are two ways a user account can be created in Azure AD DS:
5244

53-
FGPP only affects users created in Azure AD DS. Cloud users and domain users synchronized into the Azure AD DS managed domain from Azure AD aren't affected by the password policies.
45+
* The user account can be synchronized in from Azure AD. This includes cloud-only user accounts created directly in Azure, and hybrid user accounts synchronized from an on-premises AD DS environment using Azure AD Connect.
46+
* The majority of user accounts in Azure AD DS are created through the synchronization process from Azure AD.
47+
* The user account can be manually created in an Azure AD DS managed domain, and doesn't exist in Azure AD.
5448

55-
Policies are distributed through group association in the Azure AD DS managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.
56-
57-
## Default fine-grained password policy settings
58-
59-
In an Azure AD DS managed domain, the following password policies are configured by default and applied to all users:
60-
61-
* **Minimum password length (characters):** 7
62-
* **Maximum password age (lifetime):** 90 days
63-
* **Passwords must meet complexity requirements**
64-
65-
The following account lockout policies are then configured by default:
49+
All users, regardless of how they're created, have the following account lockout policies applied by the default password policy in Azure AD DS:
6650

6751
* **Account lockout duration:** 30
6852
* **Number of failed logon attempts allowed:** 5
6953
* **Reset failed logon attempts count after:** 30 minutes
54+
* **Maximum password age (lifetime):** 90 days
7055

7156
With these default settings, user accounts are locked out for 30 minutes if five invalid passwords are used within 2 minutes. Accounts are automatically unlocked after 30 minutes.
7257

73-
You can't modify or delete the default built-in fine-grained password policy. Instead, members of the *AAD DC Administrators* group can a create custom FGPP and configure it to override (take precedence over) the default built-in FGPP, as shown in the next section.
58+
Account lockouts only occur within the managed domain. User accounts are only locked out in Azure AD DS, and only due to failed sign-in attempts against the managed domain. User accounts that were synchronized in from Azure AD or on-premises aren't locked out in their source directories, only in Azure AD DS.
59+
60+
If you have an Azure AD password policy that specifies a maximum password age greater than 90 days, that password age is applied to the default policy in Azure AD DS. You can configure a custom password policy to define a different maximum password age in Azure AD DS. Take care if you have a shorter maximum password age configured in an Azure AD DS password policy than in Azure AD or an on-premises AD DS environment. In that scenario, a user's password may expire in Azure AD DS before they're prompted to change in Azure AD on an on-premises AD DS environment.
7461

75-
## Create a custom fine-grained password policy
62+
For user accounts created manually in an Azure AD DS managed domain, the following additional password settings are also applied from the default policy. These settings don't apply to user accounts synchronized in from Azure AD, as a user can't update their password directly in Azure AD DS.
7663

77-
As you build and applications in Azure, you may want to configure a custom FGPP. Some examples of the need to create a custom FGPP include to set a different account lockout policy, or to configure a default password lifetime setting for the managed domain.
64+
* **Minimum password length (characters):** 7
65+
* **Passwords must meet complexity requirements**
66+
67+
You can't modify the account lockout or password settings in the default password policy. Instead, members of the *AAD DC Administrators* group can create custom password policies and configure it to override (take precedence over) the default built-in policy, as shown in the next section.
68+
69+
## Create a custom password policy
70+
71+
As you build and run applications in Azure, you may want to configure a custom password policy. For example, you could create a policy to set different account lockout policy settings.
7872

79-
You can create a custom FGPP and apply it to specific groups in your Azure AD DS managed domain. This configuration effectively overrides the default FGPP. You can also create custom fine-grained password policies and apply them to any custom OUs you create in the Azure AD DS managed domain.
73+
Custom password policies are applied to groups in an Azure AD DS managed domain. This configuration effectively overrides the default policy.
8074

81-
To create a fine-grained password policy, you use the Active Directory Administrative Tools from a domain-joined VM. The Active Directory Administrative Center lets you view, edit, and create resources in an Azure AD DS managed domain, including OUs.
75+
To create a custom password policy, you use the Active Directory Administrative Tools from a domain-joined VM. The Active Directory Administrative Center lets you view, edit, and create resources in an Azure AD DS managed domain, including OUs.
8276

8377
> [!NOTE]
84-
> To create a fine-grained password policy in an Azure AD DS managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
78+
> To create a custom password policy in an Azure AD DS managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
8579
8680
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
8781
1. To create and manage OUs, select **Active Directory Administrative Center** from the list of administrative tools.
8882
1. In the left pane, choose your Azure AD DS managed domain, such as *contoso.com*.
89-
1. Open the **System** container, then the **Password Settings** container.
83+
1. Open the **System** container, then the **Password Settings Container**.
84+
85+
A built-in password policy for the Azure AD DS managed domain is shown. You can't modify this built-in policy. Instead, create a custom password policy to override the default policy.
86+
87+
![Create a password policy in the Active Directory Administrative Center](./media/password-policy/create-password-policy-adac.png)
9088

91-
A built-in FGPP for the Azure AD DS managed domain is shown. You can't modify this built-in FGPP. Instead, create a new custom FGPP to override the default FGPP.
9289
1. In the **Tasks** panel on the right, select **New > Password Settings**.
93-
1. In the **Create Password Settings** dialog, enter a name for the policy, such as *MyCustomFGPP*. Set the precedence to appropriately to override the default FGPP (which is *200*), such as *1*.
90+
1. In the **Create Password Settings** dialog, enter a name for the policy, such as *MyCustomFGPP*.
91+
1. When multiple password policies exist, the policy with the highest precedence, or priority, is applied to a user. The lower the number, the higher the priority. The default password policy has a priority of *200*.
92+
93+
Set the precedence for your custom password policy to override the default, such as *1*.
94+
95+
1. Edit other password policy settings as desired. Remember the following key points:
9496

95-
Edit other password policy settings as desired, such as **Enforce password history** to require the user to create a password that's different from the previous *24* passwords.
97+
* Settings like password complexity, age, or expiration time only to users manually created in an Azure AD DS managed domain.
98+
* Account lockout settings apply to all users, but only take effect within the managed domain.
9699

97100
![Create a custom fine-grained password policy](./media/how-to/custom-fgpp.png)
98101

@@ -101,7 +104,7 @@ To create a fine-grained password policy, you use the Active Directory Administr
101104

102105
![Select the users and groups to apply the password policy to](./media/how-to/fgpp-applies-to.png)
103106

104-
1. Fine-grained password policies can only be applied to groups. In the **Locations** dialog, expand the domain name, such as *contoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
107+
1. Password policies can only be applied to groups. In the **Locations** dialog, expand the domain name, such as *contoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
105108

106109
![Select the OU that the group belongs to](./media/how-to/fgpp-container.png)
107110

@@ -113,7 +116,7 @@ To create a fine-grained password policy, you use the Active Directory Administr
113116

114117
## Next steps
115118

116-
For more information about fine-grained password policies and using the Active Directory Administration Center, see the following articles:
119+
For more information about password policies and using the Active Directory Administration Center, see the following articles:
117120

118121
* [Learn about fine-grained password policies](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc770394(v=ws.10))
119122
* [Configure fine-grained password policies using AD Administration Center](/windows-server/identity/ad-ds/get-started/adac/introduction-to-active-directory-administrative-center-enhancements--level-100-#fine_grained_pswd_policy_mgmt)

articles/azure-functions/functions-create-first-function-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Azure Functions Core Tools integrates with Visual Studio Code to let you run and
9191
9292
You can also execute the GET request from a browser.
9393
94-
When you call the HttpTrigger endpoint without passing a `name` parameter either as a query parameter or in the body, the function returns a 500 error. When you review the code in run.ps1, you see that this error occurs by design.
94+
When you call the HttpTrigger endpoint without passing a `name` parameter either as a query parameter or in the body, the function returns a [HttpStatusCode]::BadRequest error. When you review the code in run.ps1, you see that this error occurs by design.
9595
9696
1. To stop debugging, press Shift + F5.
9797

0 commit comments

Comments
 (0)