Skip to content

Commit b1cd67e

Browse files
authored
Merge pull request #87494 from iainfoulds/azureadds-freshness090419
[AzureADDS] Freshness updates and revisions
2 parents 8f0f2c4 + da835fa commit b1cd67e

File tree

9 files changed

+355
-246
lines changed

9 files changed

+355
-246
lines changed

articles/active-directory-domain-services/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
href: tutorial-configure-password-hash-sync.md
2222
- name: Samples
2323
items:
24-
- name: Create an Azure AD DS instance using Azure PowerShell
24+
- name: Create a managed domain using Azure PowerShell
2525
href: powershell-create-instance.md
2626
- name: Concepts
2727
items:
Lines changed: 21 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,49 +1,47 @@
11
---
2-
title: 'Disable Azure Active Directory Domain Services | Microsoft Docs'
3-
description: Disable Azure Active Directory Domain Services using the Azure portal
2+
title: Disable Azure Active Directory Domain Services | Microsoft Docs'
3+
description: Learn how to disable Azure Active Directory Domain Services using the Azure portal
44
services: active-directory-ds
5-
documentationcenter: ''
65
author: iainfoulds
76
manager: daveba
8-
editor: curtand
97

108
ms.assetid: 89e407e1-e1e0-49d1-8b89-de11484eee46
119
ms.service: active-directory
1210
ms.subservice: domain-services
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
1612
ms.topic: conceptual
17-
ms.date: 05/14/2019
13+
ms.date: 09/04/2019
1814
ms.author: iainfou
1915

2016
---
2117
# Disable Azure Active Directory Domain Services using the Azure portal
22-
This article shows you how to use the Azure portal to disable Azure Active Directory (AD) Domain Services for your Azure AD directory.
18+
19+
If you no longer need a managed domain, you can delete an Azure Active Directory Domain Services (Azure AD DS) instance. There's no option to turn off or temporarily disable an Azure AD DS managed domain. Deleting the Azure AD DS managed domain doesn't delete or otherwise adversely impact the Azure AD tenant. This article shows you how to use the Azure portal to delete an Azure AD DS managed domain.
2320

2421
> [!WARNING]
25-
> **Deletion is permanent and cannot be reversed.**
26-
> Proceed with caution! When you delete the managed domain:
22+
> **Deletion is permanent and can't be reversed.**
23+
> When you delete an Azure AD DS managed domain, the following steps occur:
2724
> * Domain controllers for the managed domain are de-provisioned and removed from the virtual network.
28-
> * Data on the managed domain is deleted permanently. This includes custom OUs, GPOs, custom DNS records, service principals, GMSAs etc. that you have created on the managed domain.
25+
> * Data on the managed domain is deleted permanently. This data includes custom OUs, GPOs, custom DNS records, service principals, GMSAs, etc. that you created.
2926
> * Machines joined to the managed domain lose their trust relationship with the domain and need to be unjoined from the domain.
30-
> * You cannot sign in to these machines using corporate AD credentials. Use the local administrator credentials for the machine, instead.
31-
> Deleting the managed domain does not delete your Azure AD directory or otherwise adversely impact the directory.
27+
> * You can't sign in to these machines using corporate AD credentials. Instead, you must use the local administrator credentials for the machine.
3228
33-
Perform the following steps to delete your Azure AD Domain Services managed domain:
34-
1. Navigate to the [Azure AD Domain Services extension](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.AAD%2FdomainServices) in the Azure portal.
35-
2. Click the name of your managed domain.
29+
## Delete the managed domain
3630

37-
![Select domain to delete](./media/getting-started/domain-services-delete-select-domain.png)
31+
To delete an Azure AD DS managed domain, complete the following steps:
3832

39-
3. On the **Overview** page, click the **Delete** button.
33+
1. In the Azure portal, search for and select **Azure AD Domain Services**.
34+
1. Select the name of your Azure AD DS managed domain, such as *contoso.com*.
35+
1. On the **Overview** page, select **Delete**. To confirm the deletion, type the domain name of the managed domain again, then select **Delete**.
4036

41-
![Delete domain](./media/getting-started/domain-services-delete-domain.png)
37+
It can take 15-20 minutes or more to delete the Azure AD DS managed domain.
4238

43-
4. To confirm the deletion, type the DNS domain name of the managed domain. Click the **Delete** button when you are done.
39+
## Next steps
4440

45-
![Delete domain confirmation](./media/getting-started/domain-services-delete-domain-confirm.png)
41+
Consider [sharing feedback][feedback] for the features that you would like to see in Azure AD DS.
4642

47-
It can take 15-20 minutes or more to delete the managed domain.
43+
If you want to get started with Azure AD DS again, see [Create and configure an Azure Active Directory Domain Services instance][create-instance].
4844

49-
Consider [sharing feedback](contact-us.md) to help us understand what features would help you chose Azure AD Domain Services in the future. This feedback helps us evolve the service to better suit your deployment needs and use-cases.
45+
<!-- INTERNAL LINKS -->
46+
[feedback]: contact-us.md
47+
[create-instance]: tutorial-create-instance.md
Lines changed: 69 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -1,81 +1,100 @@
11
---
2-
title: 'Azure Active Directory Domain Services: Enable kerberos constrained delegation | Microsoft Docs'
3-
description: Enable kerberos constrained delegation on Azure Active Directory Domain Services managed domains
2+
title: Kerberos constrained delegation for Azure AD Domain Services | Microsoft Docs
3+
description: Learn how to enable resource-based Kerberos constrained delegation (KCD) in an Azure Active Directory Domain Services managed domain.
44
services: active-directory-ds
5-
documentationcenter: ''
65
author: iainfoulds
76
manager: daveba
8-
editor: curtand
97

108
ms.assetid: 938a5fbc-2dd1-4759-bcce-628a6e19ab9d
119
ms.service: active-directory
1210
ms.subservice: domain-services
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
1612
ms.topic: conceptual
17-
ms.date: 05/13/2019
13+
ms.date: 09/04/2019
1814
ms.author: iainfou
1915

2016
---
17+
# Configure Kerberos constrained delegation (KCD) in Azure Active Directory Domain Services
2118

22-
# Configure Kerberos constrained delegation (KCD) on a managed domain
23-
Many applications need to access resources in the context of the user. Active Directory supports a mechanism called Kerberos delegation, which enables this use-case. Further, you can restrict delegation so that only specific resources can be accessed in the context of the user. Azure AD Domain Services managed domains are different from traditional Active Directory domains since they are more securely locked down.
19+
As you run applications, there may be a need for those applications to access resources in the context of a different user. Active Directory Domain Services (AD DS) supports a mechanism called *Kerberos delegation* that enables this use-case. Kerberos *constrained* delegation (KCD) then builds on this mechanism to define specific resources that can be accessed in the context of the user. Azure Active Directory Domain Services (Azure AD DS) managed domains are more securely locked down that traditional on-premises AD DS environments, so use a more secure *resource-based* KCD.
2420

25-
This article shows you how to configure Kerberos constrained delegation on an Azure AD Domain Services managed domain.
21+
This article shows you how to configure resource-basd Kerberos constrained delegation in an Azure AD DS managed domain.
2622

27-
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
23+
## Prerequisites
2824

29-
## Kerberos constrained delegation (KCD)
30-
Kerberos delegation enables an account to impersonate another security principal (such as a user) to access resources. Consider a web application that accesses a back-end web API in the context of a user. In this example, the web application (running in the context of a service account or a computer/machine account) impersonates the user when accessing the resource (back-end web API). Kerberos delegation is insecure since it does not restrict the resources the impersonating account can access in the context of the user.
25+
To complete this article, you need the following resources:
3126

32-
Kerberos constrained delegation (KCD) restricts the services/resources to which the specified server can act on the behalf of a user. Traditional KCD requires domain administrator privileges to configure a domain account for a service and it restricts the account to a single domain.
27+
* An active Azure subscription.
28+
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29+
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
30+
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31+
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32+
* If needed, [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33+
* A Windows Server management VM that is joined to the Azure AD DS managed domain.
34+
* If needed, complete the tutorial to [create a Windows Server VM and join it to a managed domain][create-join-windows-vm] then [install the AD DS management tools][tutorial-create-management-vm].
35+
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
3336

34-
Traditional KCD also has a few issues associated with it. In earlier operating systems, if the domain administrator configured account-based KCD for the service, the service administrator had no useful way to know which front-end services delegated to the resource services they owned. And any front-end service that could delegate to a resource service represented a potential attack point. If a server that hosted a front-end service was compromised, and it was configured to delegate to resource services, the resource services could also be compromised.
37+
## Kerberos constrained delegation overview
3538

36-
> [!NOTE]
37-
> On an Azure AD Domain Services managed domain, you do not have domain administrator privileges. Therefore, **traditional account-based KCD cannot be configured on a managed domain**. Use resource-based KCD as described in this article. This mechanism is also more secure.
38-
>
39-
>
39+
Kerberos delegation lets one account impersonate another account to access resources. For example, a web application that accesses a back-end web component can impersonate itself as a different user account when it makes the back-end connection. Kerberos delegation is insecure as it doesn't limit what resources the impersonating account can access.
4040

41-
## Resource-based KCD
42-
From Windows Server 2012 onwards, service administrators gain the ability to configure constrained delegation for their service. In this model, the back-end service administrator can allow or deny specific front-end services from using KCD. This model is known as **resource-based KCD**.
41+
Kerberos constrained delegation (KCD) restricts the services or resources that a specified server or application can connect when impersonating another identity. Traditional KCD requires domain administrator privileges to configure a domain account for a service, and it restricts the account to run on a single domain. Traditional KCD also has a few issues. For example, in earlier operating systems, the service administrator had no useful way to know which front-end services delegated to the resource services they owned. Any front-end service that could delegate to a resource service was a potential attack point. If a server that hosted a front-end service configured to delegate to resource services was compromised, the resource services could also be compromised.
4342

44-
Resource-based KCD is configured using PowerShell. You use the `Set-ADComputer` or `Set-ADUser` cmdlets, depending on whether the impersonating account is a computer account or a user account/service account.
43+
In an Azure AD DS managed domain, you don't have domain administrator privileges. As a result, traditional account-based KCD can't be configured in an Azure AD DS a managed domain. Resource-based KCD can instead be used, which is also more secure.
4544

46-
### Configure resource-based KCD for a computer account on a managed domain
47-
Assume you have a web app running on the computer 'contoso-webapp.contoso.com'. It needs to access the resource (a web API running on 'contoso-api.contoso.com') in the context of domain users. Here's how you would set up resource-based KCD for this scenario:
45+
### Resource-based KCD
4846

49-
1. [Create a custom OU](create-ou.md). You can delegate permissions to manage this custom OU to users within the managed domain.
50-
2. Join both virtual machines (the one running the web app and the one running the web API) to the managed domain. Create these computer accounts within the custom OU.
51-
3. Now, configure resource-based KCD using the following PowerShell command:
47+
Windows Server 2012 and later gives service administrators the ability to configure constrained delegation for their service. This model is known as resource-based KCD. With this approach, the back-end service administrator can allow or deny specific front-end services from using KCD.
5248

53-
```powershell
54-
$ImpersonatingAccount = Get-ADComputer -Identity contoso-webapp.contoso.com
55-
Set-ADComputer contoso-api.contoso.com -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
56-
```
49+
Resource-based KCD is configured using PowerShell. You use the [Set-ADComputer][Set-ADComputer] or [Set-ADUser][Set-ADUser] cmdlets, depending on whether the impersonating account is a computer account or a user account / service account.
5750

58-
> [!NOTE]
59-
> The computer accounts for the web app and the web API need to be in a custom OU where you have permissions to configure resource-based KCD. You cannot configure resource-based KCD for a computer account in the built-in 'AAD DC Computers' container.
60-
>
51+
## Configure resource-based KCD for a computer account
6152

62-
### Configure resource-based KCD for a user account on a managed domain
63-
Assume you have a web app running as a service account 'appsvc' and it needs to access the resource (a web API running as a service account - 'backendsvc') in the context of domain users. Here's how you would set up resource-based KCD for this scenario.
53+
In this scenario, let's assume you have a web app that runs on the computer named *contoso-webapp.contoso.com*. The web app needs to access a web API that runs on the computer named *contoso-api.contoso.com* in the context of domain users. Complete the following steps to configure this scenario:
6454

65-
1. [Create a custom OU](create-ou.md). You can delegate permissions to manage this custom OU to users within the managed domain.
66-
2. Join the virtual machine running the backend web API/resource to the managed domain. Create its computer account within the custom OU.
67-
3. Create the service account (for example, 'appsvc') used to run the web app within the custom OU.
68-
4. Now, configure resource-based KCD using the following PowerShell command:
55+
1. [Create a custom OU](create-ou.md). You can delegate permissions to manage this custom OU to users within the Azure AD DS managed domain.
56+
1. [Domain-join the virtual machines][create-join-windows-vm], both the one that runs the web app, and the one that runs the web API, to the Azure AD DS managed domain. Create these computer accounts in the custom OU from the previous step.
6957

70-
```powershell
71-
$ImpersonatingAccount = Get-ADUser -Identity appsvc
72-
Set-ADUser backendsvc -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
73-
```
58+
> [!NOTE]
59+
> The computer accounts for the web app and the web API must be in a custom OU where you have permissions to configure resource-based KCD. You can't configure resource-based KCD for a computer account in the built-in *AAD DC Computers* container.
7460
75-
> [!NOTE]
76-
> Both the computer account for the backend web API and the service account need to be in a custom OU where you have permissions to configure resource-based KCD. You cannot configure resource-based KCD for a computer account in the built-in 'AAD DC Computers' container or for user accounts in the built-in 'AAD DC Users' container. Thus, you cannot use user accounts synchronized from Azure AD to set up resource-based KCD.
77-
>
61+
1. Finally, configure resource-based KCD using the [Set-ADComputer][Set-ADComputer] PowerShell cmdlet. From your domain-joined management VM and logged in as user account that's a member of the *Azure AD DC administrators* group, run the following cmdlets. Provide your own computer names as needed:
62+
63+
```powershell
64+
$ImpersonatingAccount = Get-ADComputer -Identity contoso-webapp.contoso.com
65+
Set-ADComputer contoso-api.contoso.com -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
66+
```
7867
79-
## Related Content
80-
* [Azure AD Domain Services - Getting Started guide](tutorial-create-instance.md)
81-
* [Kerberos Constrained Delegation Overview](https://technet.microsoft.com/library/jj553400.aspx)
68+
## Configure resource-based KCD for a user account
69+
70+
In this scenario, let's assume you have a web app that runs as a service account named *appsvc*. The web app needs to access a web API that runs as a service account named *backendsvc* in the context of domain users. Complete the following steps to configure this scenario:
71+
72+
1. [Create a custom OU](create-ou.md). You can delegate permissions to manage this custom OU to users within the Azure AD DS managed domain.
73+
1. [Domain-join the virtual machines][create-join-windows-vm] that run the backend web API/resource to the Azure AD DS managed domain. Create its computer account within the custom OU.
74+
1. Create the service account (for example, 'appsvc') used to run the web app within the custom OU.
75+
76+
> [!NOTE]
77+
> Again, the computer account for the web API VM, and the service account for the web app, must be in a custom OU where you have permissions to configure resource-based KCD. You can't configure resource-based KCD for accounts in the built-in *AAD DC Computers* or *AAD DC Users* containers. This also means that you can't use user accounts synchronized from Azure AD to set up resource-based KCD. You must create and use service accounts specifically created in Azure AD DS.
78+
79+
1. Finally, configure resource-based KCD using the [Set-ADUser][Set-ADUser] PowerShell cmdlet. From your domain-joined management VM and logged in as user account that's a member of the *Azure AD DC administrators* group, run the following cmdlets. Provide your own service names as needed:
80+
81+
```powershell
82+
$ImpersonatingAccount = Get-ADUser -Identity appsvc
83+
Set-ADUser backendsvc -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
84+
```
85+
86+
## Next steps
87+
88+
To learn more about how delegation works in Active Directory Domain Services, see [Kerberos Constrained Delegation Overview][kcd-technet].
89+
90+
<!-- INTERNAL LINKS -->
91+
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
92+
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
93+
[create-azure-ad-ds-instance]: tutorial-create-instance.md
94+
[create-join-windows-vm]: join-windows-vm.md
95+
[tutorial-create-management-vm]: tutorial-create-management-vm.md
96+
[Set-ADComputer]: /powershell/module/addsadministration/set-adcomputer
97+
[Set-ADUser]: /powershell/module/addsadministration/set-aduser
98+
99+
<!-- EXTERNAL LINKS -->
100+
[kcd-technet]: https://technet.microsoft.com/library/jj553400.aspx

0 commit comments

Comments
 (0)