Skip to content

Commit c8cb94a

Browse files
authored
Merge pull request #233234 from MicrosoftDocs/main
4/03 PM Publish
2 parents 5ce0438 + 6584032 commit c8cb94a

File tree

152 files changed

+1385
-2304
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+1385
-2304
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11180,6 +11180,16 @@
1118011180
"source_path_from_root": "/articles/active-directory/governance/create-access-review-privileged-access-groups.md",
1118111181
"redirect_url": "/azure/active-directory/governance/create-access-review-pim-for-groups",
1118211182
"redirect_document_id": false
11183+
},
11184+
{
11185+
"source_path_from_root": "/articles/active-directory-domain-services/concepts-resource-forest.md",
11186+
"redirect_url": "/azure/active-directory-domain-services/concepts-forest-trust",
11187+
"redirect_document_id": false
11188+
},
11189+
{
11190+
"source_path_from_root": "/articles/active-directory-domain-services/create-resource-forest-powershell.md",
11191+
"redirect_url": "/azure/active-directory-domain-services/create-forest-trust-powershell",
11192+
"redirect_document_id": false
1118311193
}
1118411194
]
1118511195
}

articles/active-directory-domain-services/TOC.yml

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@
3737
href: template-create-instance.md
3838
- name: Configure scoped synchronization using Azure AD PowerShell
3939
href: powershell-scoped-synchronization.md
40-
- name: Create a resource forest and trust using Azure PowerShell
41-
href: create-resource-forest-powershell.md
40+
- name: Create a forest trust using Azure PowerShell
41+
href: create-forest-trust-powershell.md
4242
- name: Concepts
4343
items:
4444
- name: Administration basics
@@ -47,12 +47,8 @@
4747
href: scenarios.md
4848
- name: Replica sets
4949
href: concepts-replica-sets.md
50-
- name: Forests and trusts
51-
items:
52-
- name: Resource forests
53-
href: concepts-resource-forest.md
54-
- name: Forest trusts
55-
href: concepts-forest-trust.md
50+
- name: Forests trusts
51+
href: concepts-forest-trust.md
5652
- name: How Azure AD DS synchronization works
5753
href: synchronization.md
5854
- name: How password hash synchronization works

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/29/2023
12+
ms.date: 03/23/2023
1313
ms.author: justinha
1414

1515
---
@@ -69,8 +69,6 @@ By default, a managed domain is created as a *user* forest. This type of forest
6969

7070
In an Azure AD DS *resource* forest, users authenticate over a one-way forest *trust* from their on-premises AD DS. With this approach, the user objects and password hashes aren't synchronized to Azure AD DS. The user objects and credentials only exist in the on-premises AD DS. This approach lets enterprises host resources and application platforms in Azure that depend on classic authentication such LDAPS, Kerberos, or NTLM, but any authentication issues or concerns are removed.
7171

72-
For more information about forest types in Azure AD DS, see [What are resource forests?][concepts-forest] and [How do forest trusts work in Azure AD DS?][concepts-trust]
73-
7472
## Azure AD DS SKUs
7573

7674
In Azure AD DS, the available performance and features are based on the SKU. You select a SKU when you create the managed domain, and you can switch SKUs as your business requirements change after the managed domain has been deployed. The following table outlines the available SKUs and the differences between them:

articles/active-directory-domain-services/change-sku.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 01/29/2023
12+
ms.date: 03/23/2023
1313
ms.author: justinha
1414

1515
#Customer intent: As an identity administrator, I want to change the SKU for my Azure AD Domain Services managed domain to use different features as my business requirements change.
@@ -36,12 +36,9 @@ To complete this article, you need the following resources and privileges:
3636

3737
## SKU change limitations
3838

39-
You can change SKUs up or down after the managed domain has been deployed. However, if you use a resource forest and have created one-way outbound forest trusts from Azure AD DS to an on-premises AD DS environment, there are some limitations for the SKU change operation. The *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
39+
You can change SKUs up or down after the managed domain has been deployed. However, the *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
4040

41-
For example:
42-
43-
* You can't change down to the *Standard* SKU. Azure AD DS resource forest doesn't support the *Standard* SKU.
44-
* Or, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
41+
For example, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
4542

4643
For more information on these limits, see [Azure AD DS SKU features and limits][concepts-sku].
4744

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: overview
12-
ms.date: 01/29/2023
12+
ms.date: 04/03/2023
1313
ms.author: justinha
1414

1515
#Customer intent: As an IT administrator or decision maker, I want to understand the differences between Active Directory Domain Services (AD DS), Azure AD, and Azure AD DS so I can choose the most appropriate identity solution for my organization.
@@ -27,7 +27,7 @@ Although the three Active Directory-based identity solutions share a common name
2727
* **Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Microsoft 365, the Azure portal, or SaaS applications.
2828
* Azure AD can be synchronized with an on-premises AD DS environment to provide a single identity to users that works natively in the cloud.
2929
* For more information about Azure AD, see [What is Azure Active Directory?][whatis-azuread]
30-
* **Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully-compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
30+
* **Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
3131
* Azure AD DS integrates with Azure AD, which itself can synchronize with an on-premises AD DS environment. This ability extends central identity use cases to traditional web applications that run in Azure as part of a lift-and-shift strategy.
3232
* To learn more about synchronization with Azure AD and on-premises, see [How objects and credentials are synchronized in a managed domain][synchronization].
3333

@@ -54,7 +54,6 @@ When you deploy and run a self-managed AD DS environment, you have to maintain a
5454
Common deployment models for a self-managed AD DS environment that provides identity to applications and services in the cloud include the following:
5555

5656
* **Standalone cloud-only AD DS** - Azure VMs are configured as domain controllers and a separate, cloud-only AD DS environment is created. This AD DS environment doesn't integrate with an on-premises AD DS environment. A different set of credentials is used to sign in and administer VMs in the cloud.
57-
* **Resource forest deployment** - Azure VMs are configured as domain controllers and an AD DS domain that's part of an existing forest is created. A trust relationship is then configured to an on-premises AD DS environment. Other Azure VMs can domain-join to this resource forest in the cloud. User authentication runs over a VPN / ExpressRoute connection to the on-premises AD DS environment.
5857
* **Extend on-premises domain to Azure** - An Azure virtual network connects to an on-premises network using a VPN / ExpressRoute connection. Azure VMs connect to this Azure virtual network, which lets them domain-join to the on-premises AD DS environment.
5958
* An alternative is to create Azure VMs and promote them as replica domain controllers from the on-premises AD DS domain. These domain controllers replicate over a VPN / ExpressRoute connection to the on-premises AD DS environment. The on-premises AD DS domain is effectively extended into Azure.
6059

@@ -114,7 +113,7 @@ With Azure AD DS-joined devices, applications can use the Kerberos and NTLM prot
114113
| Great for... | End-user mobile or desktop devices | Server VMs deployed in Azure |
115114

116115

117-
If on-prem AD DS and Azure AD are configured for federated authentication using ADFS then there is no (current/valid) password hash available in Azure DS. Azure AD user accounts created before fed auth was implemented might have an old password hash but this likely doesn't match a hash of their on-prem password. Hence Azure AD DS won't be able to validate the users credentials
116+
If on-premises AD DS and Azure AD are configured for federated authentication using AD FS, then there's no (current/valid) password hash available in Azure DS. Azure AD user accounts created before fed auth was implemented might have an old password hash but this likely doesn't match a hash of their on-premises password. Hence Azure AD DS won't be able to validate the users credentials
118117

119118
## Next steps
120119

articles/active-directory-domain-services/concepts-forest-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/29/2023
12+
ms.date: 03/02/2023
1313
ms.author: justinha
1414
---
1515

@@ -91,7 +91,7 @@ For example, when a one-way, forest trust is created between *Forest 1* (the tru
9191
* Members of *Forest 2* can't access resources located in *Forest 1* using the same trust.
9292

9393
> [!IMPORTANT]
94-
> Azure AD Domain Services resource forest only supports a one-way forest trust to on-premises Active Directory.
94+
> Azure AD Domain Services only supports a one-way forest trust to on-premises Active Directory.
9595
9696
### Forest trust requirements
9797

0 commit comments

Comments
 (0)