Skip to content

Commit dde97fc

Browse files
authored
Merge pull request #94344 from iainfoulds/azureadds-freshness103119
[AzureADDS] Freshness updates and edits
2 parents 3148de5 + 18e90c0 commit dde97fc

File tree

6 files changed

+29
-19
lines changed

6 files changed

+29
-19
lines changed

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ If you have applications and services that need access to traditional authentica
3939

4040
With Azure AD DS, the core service components are deployed and maintained for you by Microsoft as a *managed* domain experience. You don't deploy, manage, patch, and secure the AD DS infrastructure for components like the VMs, Windows Server OS, or domain controllers (DCs).
4141

42-
Azure AD DS provides a smaller subset of features to traditional self-managed AD DS environment, which reduces some of the design and management complexity. For example, there's no AD forests, domain, sites, and replication links to design and maintain. For applications and services that run in the cloud and need access to traditional authentication mechanisms such as Kerberos or NTLM, Azure AD DS provides a managed domain experience with the minimal amount of administrative overhead.
42+
Azure AD DS provides a smaller subset of features to traditional self-managed AD DS environment, which reduces some of the design and management complexity. For example, there's no AD forests, domain, sites, and replication links to design and maintain. For applications and services that run in the cloud and need access to traditional authentication mechanisms such as Kerberos or NTLM, Azure AD DS provides a managed domain experience with the minimal amount of administrative overhead.
4343

4444
When you deploy and run a self-managed AD DS environment, you have to maintain all of the associated infrastructure and directory components. There's additional maintenance overhead with a self-managed AD DS environment, but you're then able to do additional tasks such as extend the schema or create forest trusts.
4545

articles/active-directory-domain-services/create-ou.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 08/07/2019
13+
ms.date: 10/31/2019
1414
ms.author: iainfou
1515

1616
---
@@ -20,6 +20,8 @@ Organizational units (OUs) in Active Directory Domain Services (AD DS) let you l
2020

2121
Azure AD DS managed domains include two built-in OUs - *AADDC Computers* and *AADDC Users*. The *AADDC Computers* OU contains computer objects for all computers that are joined to the managed domain. The *AADDC Users* OU includes users and groups synchronized in from the Azure AD tenant. As you create and run workloads that use Azure AD DS, you may need to create service accounts for applications to authenticate themselves. To organize these service accounts, you often create a custom OU in the Azure AD DS managed domain and then create service accounts within that OU.
2222

23+
In a hybrid environment, OUs created in an on-premises AD DS environment aren't synchronized to Azure AD DS. Azure AD DS managed domains use a flat OU structure. All user accounts and groups are stored in the *AADDC Users* container, despite being synchronized from different on-premises domains or forests, even if you've configured a hierarchical OU structure there.
24+
2325
This article shows you how to create an OU in your Azure AD DS managed domain.
2426

2527
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
@@ -45,7 +47,7 @@ When you create custom OUs in an Azure AD DS managed domain, you gain additional
4547
* To create custom OUs, users must be a member of the *AAD DC Administrators* group.
4648
* A user that creates a custom OU is granted administrative privileges (full control) over that OU and is the resource owner.
4749
* By default, the *AAD DC Administrators* group also has full control of the custom OU.
48-
* A default OU for *AADDC Users* is created that contains the synchronized user accounts from your Azure AD tenant.
50+
* A default OU for *AADDC Users* is created that contains all the synchronized user accounts from your Azure AD tenant.
4951
* You can't move users or groups from the *AADDC Users* OU to custom OUs that you create. Only user accounts or resources created in the Azure AD DS managed domain can be moved into custom OUs.
5052
* User accounts, groups, service accounts, and computer objects that you create under custom OUs aren't available in your Azure AD tenant.
5153
* These objects don't show up using the Azure AD Graph API or in the Azure AD UI; they're only available in your Azure AD DS managed domain.
@@ -57,6 +59,7 @@ To create a custom OU, you use the Active Directory Administrative Tools from a
5759
> [!NOTE]
5860
> To create a custom OU in an Azure AD DS managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
5961
62+
1. Sign in to your management VM. For steps on how to connect using the Azure portal, see [Connect to a Windows Server VM][connect-windows-server-vm].
6063
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
6164
1. To create and manage OUs, select **Active Directory Administrative Center** from the list of administrative tools.
6265
1. In the left pane, choose your Azure AD DS managed domain, such as *contoso.com*. A list of existing OUs and resources is shown:
@@ -87,3 +90,4 @@ For more information on using the administrative tools or creating and using ser
8790
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
8891
[create-azure-ad-ds-instance]: tutorial-create-instance.md
8992
[tutorial-create-management-vm]: tutorial-create-management-vm.md
93+
[connect-windows-server-vm]: join-windows-vm.md#connect-to-the-windows-server-vm

articles/active-directory-domain-services/manage-dns.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 08/07/2019
12+
ms.date: 10/31/2019
1313
ms.author: iainfou
1414

1515
---
@@ -19,7 +19,9 @@ In Azure Active Directory Domain Services (Azure AD DS), a key component is DNS
1919

2020
As you run your own applications and services, you may need to create DNS records for machines that aren't joined to the domain, configure virtual IP addresses for load balancers, or set up external DNS forwarders. Users who belong to the *AAD DC Administrators* group are granted DNS administration privileges on the Azure AD DS managed domain and can create and edit custom DNS records.
2121

22-
This article shows you how to install the DNS Server tools then use the DNS console to manage records.
22+
In a hybrid environment, DNS zones and records configured in an on-premises AD DS environment aren't synchronized to Azure AD DS. To define and use your own DNS entries, create records in the Azure AD DS DNS server or use conditional forwarders that point to existing DNS servers in your environment.
23+
24+
This article shows you how to install the DNS Server tools then use the DNS console to manage records in Azure AD DS.
2325

2426
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
2527

@@ -39,10 +41,10 @@ To complete this article, you need the following resources and privileges:
3941

4042
## Install DNS Server tools
4143

42-
To create and modify DNS, you need to install the DNS Server tools. These tools can be installed as a feature in Windows Server. For more information on how to install the administrative tools on a Windows client, see install [Remote Server Administration Tools (RSAT)][install-rsat].
44+
To create and modify DNS records in Azure AD DS, you need to install the DNS Server tools. These tools can be installed as a feature in Windows Server. For more information on how to install the administrative tools on a Windows client, see install [Remote Server Administration Tools (RSAT)][install-rsat].
4345

4446
1. Sign in to your management VM. For steps on how to connect using the Azure portal, see [Connect to a Windows Server VM][connect-windows-server-vm].
45-
1. **Server Manager** should open by default when you sign in to the VM. If not, on the **Start** menu, select **Server Manager**.
47+
1. If **Server Manager** doesn't open by default when you sign in to the VM, select the **Start** menu, then choose **Server Manager**.
4648
1. In the *Dashboard* pane of the **Server Manager** window, select **Add Roles and Features**.
4749
1. On the **Before You Begin** page of the *Add Roles and Features Wizard*, select **Next**.
4850
1. For the *Installation Type*, leave the **Role-based or feature-based installation** option checked and select **Next**.

articles/active-directory-domain-services/manage-group-policy.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,16 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 08/05/2019
12+
ms.date: 10/31/2019
1313
ms.author: iainfou
1414

1515
---
1616
# Administer Group Policy in an Azure AD Domain Services managed domain
1717

1818
Settings for user and computer objects in Azure Active Directory Domain Services (Azure AD DS) are often managed using Group Policy Objects (GPOs). Azure AD DS includes built-in GPOs for the *AADDC Users* and *AADDC Computers* containers. You can customize these built-in GPOs to configure Group Policy as needed for your environment. Members of the *Azure AD DC administrators* group have Group Policy administration privileges in the Azure AD DS domain, and can also create custom GPOs and organizational units (OUs). More more information on what Group Policy is and how it works, see [Group Policy overview][group-policy-overview].
1919

20+
In a hybrid environment, group policies configured in an on-premises AD DS environment aren't synchronized to Azure AD DS. To define configuration settings for users or computers in Azure AD DS, edit one of the default GPOs or create a custom GPO.
21+
2022
This article shows you how to install the Group Policy Management tools, then edit the built-in GPOs and create custom GPOs.
2123

2224
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
@@ -76,7 +78,7 @@ There are two built-in Group Policy Objects (GPOs) in an Azure AD DS managed dom
7678

7779
![Built-in GPOs applied to the default 'AADDC Computers' and 'AADDC Users' containers](./media/active-directory-domain-services-admin-guide/builtin-gpos.png)
7880

79-
1. These built-in GPOs can be customized to configure specific group policies on your Azure AD DS managed domain. Right-select one of the GPOs, such as *AADDC Computers GPO*, then select **Edit...**.
81+
1. These built-in GPOs can be customized to configure specific group policies on your Azure AD DS managed domain. Right-select one of the GPOs, such as *AADDC Computers GPO*, then choose **Edit...**.
8082

8183
![Choose the option to 'Edit' one of the built-in GPOs](./media/active-directory-domain-services-admin-guide/edit-builtin-gpo.png)
8284

articles/active-directory-domain-services/scenarios.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,25 +10,25 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 08/22/2019
13+
ms.date: 10/31/2019
1414
ms.author: iainfou
1515

1616
---
1717
# Common use-cases and scenarios for Azure Active Directory Domain Services
1818

19-
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, LDAP, and Kerberos / NTLM authentication. Azure AD DS integrates with your existing Azure AD tenant, which makes it possible for users to sign in using their existing credentials. You use these domain services without the need to deploy, manage, and patch domain controllers in the cloud, which provides a smoother lift-and-shift of on-premises resources to Azure.
19+
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos / NTLM authentication. Azure AD DS integrates with your existing Azure AD tenant, which makes it possible for users to sign in using their existing credentials. You use these domain services without the need to deploy, manage, and patch domain controllers in the cloud, which provides a smoother lift-and-shift of on-premises resources to Azure.
2020

2121
This article outlines some common business scenarios where Azure AD DS provides value and meets those needs.
2222

2323
## Secure administration of Azure virtual machines
2424

2525
To let you use a single set of AD credentials, Azure virtual machines (VMs) can be joined to an Azure AD DS managed domain. This approach reduces credential management issues such as maintaining local administrator accounts on each VM or separate accounts and passwords between environments.
2626

27-
VMs that are joined to an Azure AD DS managed domain can also be managed and secured using Group Policy. Required security baselines can be applied to VMs to lock them down in accordance with corporate security guidelines. For example, you can use group policy management capabilities to restrict the types of applications that can be launched on the VM.
27+
VMs that are joined to an Azure AD DS managed domain can also be managed and secured using group policy. Required security baselines can be applied to VMs to lock them down in accordance with corporate security guidelines. For example, you can use group policy management capabilities to restrict the types of applications that can be launched on the VM.
2828

2929
![Streamlined administration of Azure virtual machines](./media/active-directory-domain-services-scenarios/streamlined-vm-administration.png)
3030

31-
Let's look at a common example scenario. As servers and other infrastructure reaches end-of-life, Contoso wants to move applications currently hosted on premises to the cloud. Their current IT standard mandates that servers hosting corporate applications must be domain-joined and managed using group policy. Contoso's IT administrator would prefer to domain join VMs deployed in Azure to make administration easier as users can then sign in using their corporate credentials. When domain-joined, VMs can also be configured to comply with required security baselines using Group Policy. Contoso would prefer not to deploy, monitor, and manage their own domain controllers in Azure.
31+
Let's look at a common example scenario. As servers and other infrastructure reaches end-of-life, Contoso wants to move applications currently hosted on premises to the cloud. Their current IT standard mandates that servers hosting corporate applications must be domain-joined and managed using group policy. Contoso's IT administrator would prefer to domain join VMs deployed in Azure to make administration easier as users can then sign in using their corporate credentials. When domain-joined, VMs can also be configured to comply with required security baselines using group policy objects (GPOs). Contoso would prefer not to deploy, monitor, and manage their own domain controllers in Azure.
3232

3333
Azure AD DS is a great fit for this use-case. An Azure AD DS managed domain lets you domain-join VMs, use a single set of credentials, and apply group policy. As a managed domain, you don't have to configure and maintain the domain controllers yourself.
3434

@@ -59,7 +59,7 @@ The following deployment considerations apply to this example use case:
5959

6060
## Lift-and-shift on-premises applications that use LDAP read to access the directory
6161

62-
Like the previous example scenario, let's assume Contoso has an on-premises line-of-business (LOB) application that was developed almost a decade ago. This application is directory aware and was designed to use Lightweight Directory Access Protocol (LDAP) to read information/attributes about users from AD DS. The application doesn't modify attributes or otherwise write to the directory.
62+
Like the previous example scenario, let's assume Contoso has an on-premises line-of-business (LOB) application that was developed almost a decade ago. This application is directory aware and was designed to use LDAP to read information/attributes about users from AD DS. The application doesn't modify attributes or otherwise write to the directory.
6363

6464
Contoso wants to migrate this application to Azure and retire the aging on-premises hardware currently hosting this application. The application can't be rewritten to use modern directory APIs such as the REST-based Azure AD Graph API. A lift-and-shift option is desired where the application can be migrated to run in the cloud, without modifying code or rewriting the application.
6565

@@ -95,7 +95,7 @@ You can use Azure AD DS to provide managed domain services to remote desktop ser
9595

9696
## Domain-joined HDInsight clusters (preview)
9797

98-
You can set up an Azure HDInsight cluster that is joined to an Azure AD DS managed domain with Apache Ranger enabled. This feature is currently in preview. You can create and apply Hive policies through Apache Ranger, and allow users, such as data scientists, to connect to Hive using ODBC-based tools like Excel or Tableau. We continue to work to add other workloads, such as HBase, Spark, and Storm to domain-joined HDInsight.
98+
You can set up an Azure HDInsight cluster that is joined to an Azure AD DS managed domain with Apache Ranger enabled. You can create and apply Hive policies through Apache Ranger, and allow users, such as data scientists, to connect to Hive using ODBC-based tools like Excel or Tableau. We continue to work to add other workloads, such as HBase, Spark, and Storm to domain-joined HDInsight.
9999

100100
For more information about this deployment scenario, see [how to configure domain-joined HDInsight clusters][hdinsight]
101101

0 commit comments

Comments
 (0)