You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/check-health.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Check the health of Azure Active Directory Domain Services | Microsoft Docs
3
-
description: Learn how to check the health of an Azure Active Directory Domain Services (Azure AD DS) managed domain and understand status messages using the Azure portal.
3
+
description: Learn how to check the health of an Azure Active Directory Domain Services (Azure AD DS) managed domain and understand status messages.
4
4
services: active-directory-ds
5
5
author: justinha
6
6
manager: amycolannino
@@ -10,25 +10,26 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 01/29/2023
13
+
ms.date: 09/13/2023
14
14
ms.author: justinha
15
15
16
16
---
17
17
# Check the health of an Azure Active Directory Domain Services managed domain
18
18
19
-
Azure Active Directory Domain Services (Azure AD DS) runs some background tasks to keep the managed domain healthy and up-to-date. These tasks include taking backups, applying security updates, and synchronizing data from Azure AD. If there are issues with the Azure AD DS managed domain, these tasks may not successfully complete. To review and resolve any issues, you can check the health status of a managed domain using the Azure portal.
19
+
Azure Active Directory Domain Services (Azure AD DS) runs some background tasks to keep the managed domain healthy and up-to-date. These tasks include taking backups, applying security updates, and synchronizing data from Azure AD. If there are issues with the Azure AD DS managed domain, these tasks may not successfully complete. To review and resolve any issues, you can check the health status of a managed domain using the Microsoft Entra admin center.
20
20
21
21
This article shows you how to view the Azure AD DS health status and understand the information or alerts shown.
22
22
23
23
## View the health status
24
24
25
-
The health status for a managed domain is viewed using the Azure portal. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:
25
+
The health status for a managed domain is viewed using the Microsoft Entra admin center. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:
26
26
27
-
1. In the Azure portal, search for and select **Azure AD Domain Services**.
27
+
1. Sign in to [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator).
28
+
1. Search for and select **Azure AD Domain Services**.
28
29
1. Select your managed domain, such as *aaddscontoso.com*.
29
30
1. On the left-hand side of the Azure AD DS resource window, select **Health**. The following example screenshot shows a healthy managed domain and the status of the last backup and Azure AD synchronization:
30
31
31
-

32
+

32
33
33
34
The *Last evaluated* timestamp of the health page shows when the managed domain was last checked. The health of a managed domain is evaluated every hour. If you make any changes to a managed domain, wait until the next evaluation cycle to view the updated health status.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/compare-identity-solutions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: overview
12
-
ms.date: 04/03/2023
12
+
ms.date: 09/13/2023
13
13
ms.author: justinha
14
14
15
15
#Customer intent: As an IT administrator or decision maker, I want to understand the differences between Active Directory Domain Services (AD DS), Azure AD, and Azure AD DS so I can choose the most appropriate identity solution for my organization.
@@ -24,7 +24,7 @@ Although the three Active Directory-based identity solutions share a common name
24
24
***Active Directory Domain Services (AD DS)** - Enterprise-ready lightweight directory access protocol (LDAP) server that provides key features such as identity and authentication, computer object management, group policy, and trusts.
25
25
* AD DS is a central component in many organizations with an on-premises IT environment, and provides core user account authentication and computer management features.
26
26
* For more information, see [Active Directory Domain Services overview in the Windows Server documentation][overview-adds].
27
-
***Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Microsoft 365, the Azure portal, or SaaS applications.
27
+
***Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Microsoft 365, the Microsoft Entra admin center, or SaaS applications.
28
28
* Azure AD can be synchronized with an on-premises AD DS environment to provide a single identity to users that works natively in the cloud.
29
29
* For more information about Azure AD, see [What is Azure Active Directory?][whatis-azuread]
30
30
***Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
@@ -34,7 +34,7 @@ Although the three Active Directory-based identity solutions share a common name
34
34
This overview article compares and contrasts how these identity solutions can work together, or would be used independently, depending on the needs of your organization.
35
35
36
36
> [!div class="nextstepaction"]
37
-
> [To get started, create an Azure AD DS managed domain using the Azure portal][tutorial-create]
37
+
> [To get started, create an Azure AD DS managed domain using the Microsoft Entra admin center][tutorial-create]
38
38
39
39
## Azure AD DS and self-managed AD DS
40
40
@@ -117,7 +117,7 @@ If on-premises AD DS and Azure AD are configured for federated authentication us
117
117
118
118
## Next steps
119
119
120
-
To get started with using Azure AD DS, [create an Azure AD DS managed domain using the Azure portal][tutorial-create].
120
+
To get started with using Azure AD DS, [create an Azure AD DS managed domain using the Microsoft Entra admin center][tutorial-create].
121
121
122
122
You can also learn more about
123
123
[management concepts for user accounts, passwords, and administration in Azure AD DS][administration-concepts] and [how objects and credentials are synchronized in a managed domain][synchronization].
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/concepts-forest-trust.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 03/02/2023
12
+
ms.date: 09/13/2023
13
13
ms.author: justinha
14
14
---
15
15
@@ -107,7 +107,7 @@ Before you can create a forest trust, you need to verify you have the correct Do
107
107
108
108
To create a forest trust, you must be a member of the Domain Admins group (in the forest root domain) or the Enterprise Admins group in Active Directory. Each trust is assigned a password that the administrators in both forests must know. Members of Enterprise Admins in both forests can create the trusts in both forests at once and, in this scenario, a password that is cryptographically random is automatically generated and written for both forests.
109
109
110
-
A managed domain forest supports up to five one-way outbound forest trusts to on-premises forests. The outbound forest trust for Azure AD Domain Services is created in the Azure portal. You don't manually create the trust with the managed domain itself. The incoming forest trust must be configured by a user with the privileges previously noted in the on-premises Active Directory.
110
+
A managed domain forest supports up to five one-way outbound forest trusts to on-premises forests. The outbound forest trust for Azure AD Domain Services is created in the Microsoft Entra admin center. You don't manually create the trust with the managed domain itself. The incoming forest trust must be configured by a user with the privileges previously noted in the on-premises Active Directory.
#Customer intent: As an identity administrator, I want to create an Azure AD Domain Services forest and one-way outbound trust from an Azure Active Directory Domain Services forest to an on-premises Active Directory Domain Services forest using Azure PowerShell to provide authentication and resource access between forests.
@@ -52,9 +52,9 @@ To complete this article, you need the following resources and privileges:
52
52
* You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
53
53
* You need [Domain Services Contributor](../role-based-access-control/built-in-roles.md#contributor) Azure role to create the required Azure AD DS resources.
54
54
55
-
## Sign in to the Azure portal
55
+
## Sign in to the Microsoft Entra admin center
56
56
57
-
In this article, you create and configure the outbound forest trust from a managed domain using the Azure portal. To get started, first sign in to the [Azure portal](https://portal.azure.com).
57
+
In this article, you create and configure the outbound forest trust from a managed domain using the Microsoft Entra admin center. To get started, first sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
58
58
59
59
## Deployment process
60
60
@@ -161,7 +161,7 @@ Before you start, make sure you understand the [network considerations and recom
161
161
* Confirm that your on-premises domain controller can connect to the managed VM using `ping` or remote desktop, for example.
162
162
* Verify that your management VM can connect to your on-premises domain controllers, again using a utility such as `ping`.
163
163
164
-
1. In the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain, such as *aaddscontoso.com* and wait for the status to report as **Running**.
164
+
1. In the Microsoft Entra admin center, search for and select **Azure AD Domain Services**. Choose your managed domain, such as *aaddscontoso.com* and wait for the status to report as **Running**.
165
165
166
166
When running, [update DNS settings for the Azure virtual network](tutorial-create-instance.md#update-dns-settings-for-the-azure-virtual-network) and then [enable user accounts for Azure AD DS](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) to finalize the configurations for your managed domain.
167
167
@@ -226,7 +226,7 @@ To correctly resolve the managed domain from the on-premises environment, you ma
226
226
227
227
## Create inbound forest trust in the on-premises domain
228
228
229
-
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Azure portal.
229
+
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Microsoft Entra admin center.
230
230
231
231
To configure inbound trust on the on-premises AD DS domain, complete the following steps from a management workstation for the on-premises AD DS domain:
232
232
@@ -235,8 +235,8 @@ To configure inbound trust on the on-premises AD DS domain, complete the followi
235
235
1. Choose **Trusts** tab, then **New Trust**
236
236
1. Enter the name of the managed domain, such as *aaddscontoso.com*, then select **Next**
237
237
1. Select the option to create a **Forest trust**, then to create a **One way: incoming** trust.
238
-
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Azure portal for the managed domain.
239
-
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Azure portal in the next section.
238
+
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Microsoft Entra admin center for the managed domain.
239
+
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Microsoft Entra admin center in the next section.
240
240
1. Step through the next few windows with default options, then choose the option for **No, do not confirm the outgoing trust**. You can't validate the trust relation because your delegated admin account to the managed domain doesn't have the required permissions. This behavior is by design.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/create-ou.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 01/29/2023
13
+
ms.date: 09/15/2023
14
14
ms.author: justinha
15
15
16
16
---
@@ -62,7 +62,7 @@ To create a custom OU, you use the Active Directory Administrative Tools from a
62
62
> [!NOTE]
63
63
> To create a custom OU in a managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
64
64
65
-
1. Sign in to your management VM. For steps on how to connect using the Azure portal, see [Connect to a Windows Server VM][connect-windows-server-vm].
65
+
1. Sign in to your management VM. For steps on how to connect using the Microsoft Entra admin center, see [Connect to a Windows Server VM][connect-windows-server-vm].
66
66
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
67
67
1. To create and manage OUs, select **Active Directory Administrative Center** from the list of administrative tools.
68
68
1. In the left pane, choose your managed domain, such as *aaddscontoso.com*. A list of existing OUs and resources is shown:
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/csp.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 01/29/2023
12
+
ms.date: 09/15/2023
13
13
ms.author: justinha
14
14
15
15
---
@@ -91,4 +91,4 @@ The following important considerations apply when administering a managed domain
91
91
92
92
## Next steps
93
93
94
-
To get started, [enroll in the Azure CSP program](/partner-center/enrolling-in-the-csp-program). You can then enable Azure AD Domain Services using the [Azure portal](tutorial-create-instance.md) or [Azure PowerShell](powershell-create-instance.md).
94
+
To get started, [enroll in the Azure CSP program](/partner-center/enrolling-in-the-csp-program). You can then enable Azure AD Domain Services using the [Microsoft Entra admin center](tutorial-create-instance.md) or [Azure PowerShell](powershell-create-instance.md).
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/delete-aadds.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Delete Azure Active Directory Domain Services | Microsoft Docs
3
-
description: Learn how to disable, or delete, an Azure Active Directory Domain Services managed domain using the Azure portal
3
+
description: Learn how to disable, or delete, an Azure Active Directory Domain Services managed domain
4
4
services: active-directory-ds
5
5
author: justinha
6
6
manager: amycolannino
@@ -10,15 +10,15 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 01/29/2023
13
+
ms.date: 09/15/2023
14
14
ms.author: justinha
15
15
16
16
---
17
-
# Delete an Azure Active Directory Domain Services managed domain using the Azure portal
17
+
# Delete an Azure Active Directory Domain Services managed domain
18
18
19
19
If you no longer need an Azure Active Directory Domain Services (Azure AD DS) managed domain, you can delete it. There's no option to turn off or temporarily disable an Azure AD DS managed domain. Deleting the managed domain doesn't delete or otherwise adversely impact the Azure AD tenant.
20
20
21
-
This article shows you how to use the Azure portal to delete a managed domain.
21
+
This article shows you how to use the Microsoft Entra admin center to delete a managed domain.
22
22
23
23
> [!WARNING]
24
24
> **Deletion is permanent and can't be reversed.**
@@ -33,7 +33,8 @@ This article shows you how to use the Azure portal to delete a managed domain.
33
33
34
34
To delete a managed domain, complete the following steps:
35
35
36
-
1. In the Azure portal, search for and select **Azure AD Domain Services**.
36
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator).
37
+
1. Search for and select **Azure AD Domain Services**.
37
38
1. Select the name of your managed domain, such as *aaddscontoso.com*.
38
39
1. On the **Overview** page, select **Delete**. To confirm the deletion, type the domain name of the managed domain again, then select **Delete**.
0 commit comments