You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-create-forest-trust.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Tutorial - Create a forest trust in Azure AD Domain Services | Microsoft Docs
3
-
description: Learn how to create a one-way outbound forest to an on-premises AD DS domain in the Azure portal for Azure AD Domain Services
3
+
description: Learn how to create a one-way outbound forest to an on-premises AD DS domain in the Microsoft Entra admin center for Azure AD Domain Services
4
4
services: active-directory-ds
5
5
author: justinha
6
6
manager: amycolannino
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 03/02/2023
12
+
ms.date: 09/15/2023
13
13
ms.author: justinha
14
14
15
15
#Customer intent: As an identity administrator, I want to create a one-way outbound forest from an Azure Active Directory Domain Services forest to an on-premises Active Directory Domain Services forest to provide authentication and resource access between forests.
@@ -50,9 +50,9 @@ To complete this tutorial, you need the following resources and privileges:
50
50
> [!IMPORTANT]
51
51
> You need to use a minimum of *Enterprise* SKU for your managed domain. If needed, [change the SKU for a managed domain][howto-change-sku].
52
52
53
-
## Sign in to the Azure portal
53
+
## Sign in to the Microsoft Entra admin center
54
54
55
-
In this tutorial, you create and configure the outbound forest trust from Azure AD DS using the Azure portal. To get started, first sign in to the [Azure portal](https://portal.azure.com). You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to modify an Azure AD DS instance.
55
+
In this tutorial, you create and configure the outbound forest trust from Azure AD DS using the Microsoft Entra admin center. To get started, first sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to modify an Azure AD DS instance.
56
56
57
57
## Networking considerations
58
58
@@ -92,7 +92,7 @@ To correctly resolve the managed domain from the on-premises environment, you ma
92
92
93
93
## Create inbound forest trust in the on-premises domain
94
94
95
-
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Azure portal.
95
+
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Microsoft Entra admin center.
96
96
97
97
To configure inbound trust on the on-premises AD DS domain, complete the following steps from a management workstation for the on-premises AD DS domain:
98
98
@@ -101,8 +101,8 @@ To configure inbound trust on the on-premises AD DS domain, complete the followi
101
101
1. Choose **Trusts** tab, then **New Trust**.
102
102
1. Enter the name for Azure AD DS domain name, such as *aaddscontoso.com*, then select **Next**.
103
103
1. Select the option to create a **Forest trust**, then to create a **One way: incoming** trust.
104
-
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Azure portal for the managed domain.
105
-
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Azure portal in the next section.
104
+
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Microsoft Entra admin center for the managed domain.
105
+
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Microsoft Entra admin center in the next section.
106
106
1. Step through the next few windows with default options, then choose the option for **No, do not confirm the outgoing trust**.
107
107
1. Select **Finish**.
108
108
@@ -118,20 +118,20 @@ If the forest trust is no longer needed for an environment, complete the followi
118
118
119
119
With the on-premises AD DS domain configured to resolve the managed domain and an inbound forest trust created, now create the outbound forest trust. This outbound forest trust completes the trust relationship between the on-premises AD DS domain and the managed domain.
120
120
121
-
To create the outbound trust for the managed domain in the Azure portal, complete the following steps:
121
+
To create the outbound trust for the managed domain in the Microsoft Entra admin center, complete the following steps:
122
122
123
-
1. In the Azure portal, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
123
+
1. In the Microsoft Entra admin center, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
124
124
1. From the menu on the left-hand side of the managed domain, select **Trusts**, then choose to **+ Add** a trust.
125
125
1. Enter a display name that identifies your trust, then the on-premises trusted forest DNS name, such as *onprem.contoso.com*.
126
126
1. Provide the same trust password that was used to configure the inbound forest trust for the on-premises AD DS domain in the previous section.
127
127
1. Provide at least two DNS servers for the on-premises AD DS domain, such as *10.1.1.4* and *10.1.1.5*.
128
128
1. When ready, **Save** the outbound forest trust.
129
129
130
-

130
+

131
131
132
132
If the forest trust is no longer needed for an environment, complete the following steps to remove it from Azure AD DS:
133
133
134
-
1. In the Azure portal, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
134
+
1. In the Microsoft Entra admin center, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
135
135
1. From the menu on the left-hand side of the managed domain, select **Trusts**, choose the trust, and click **Remove**.
136
136
1. Provide the same trust password that was used to configure the forest trust and click **OK**.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-create-instance-advanced.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Tutorial - Create a customized Azure Active Directory Domain Services managed domain | Microsoft Docs
3
-
description: In this tutorial, you learn how to create and configure a customized Azure Active Directory Domain Services managed domain and specify advanced configuration options using the Azure portal.
3
+
description: In this tutorial, you learn how to create and configure a customized Azure Active Directory Domain Services managed domain and specify advanced configuration options using the Microsoft Entra admin center.
4
4
author: justinha
5
5
manager: amycolannino
6
6
@@ -9,7 +9,7 @@ ms.subservice: domain-services
9
9
ms.workload: identity
10
10
ms.custom: has-azure-ad-ps-ref
11
11
ms.topic: tutorial
12
-
ms.date: 04/03/2023
12
+
ms.date: 09/15/2023
13
13
ms.author: justinha
14
14
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
15
15
---
@@ -18,7 +18,7 @@ ms.author: justinha
18
18
19
19
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, LDAP, Kerberos/NTLM authentication that is fully compatible with Windows Server Active Directory. You consume these domain services without deploying, managing, and patching domain controllers yourself. Azure AD DS integrates with your existing Azure AD tenant. This integration lets users sign in using their corporate credentials, and you can use existing groups and user accounts to secure access to resources.
20
20
21
-
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows you how to define those advanced configuration options to create and configure an Azure AD DS managed domain using the Azure portal.
21
+
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows you how to define those advanced configuration options to create and configure an Azure AD DS managed domain using the Microsoft Entra admin center.
22
22
23
23
In this tutorial, you learn how to:
24
24
@@ -46,15 +46,15 @@ Although not required for Azure AD DS, it's recommended to [configure self-servi
46
46
> [!IMPORTANT]
47
47
> After you create a managed domain, you can't move it to a different subscription, resource group, or region. Take care to select the most appropriate subscription, resource group, and region when you deploy the managed domain.
48
48
49
-
## Sign in to the Azure portal
49
+
## Sign in to the Microsoft Entra admin center
50
50
51
-
In this tutorial, you create and configure the managed domain using the Azure portal. To get started, first sign in to the [Azure portal](https://portal.azure.com).
51
+
In this tutorial, you create and configure the managed domain using the Microsoft Entra admin center. To get started, first sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
52
52
53
53
## Create a managed domain and configure basic settings
54
54
55
55
To launch the **Enable Azure AD Domain Services** wizard, complete the following steps:
56
56
57
-
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
57
+
1. On the Microsoft Entra admin center menu or from the **Home** page, select **Create a resource**.
58
58
1. Enter *Domain Services* into the search bar, then choose *Azure AD Domain Services* from the search suggestions.
59
59
1. On the Azure AD Domain Services page, select **Create**. The **Enable Azure AD Domain Services** wizard is launched.
60
60
1. Select the Azure **Subscription** in which you would like to create the managed domain.
@@ -83,7 +83,7 @@ The following DNS name restrictions also apply:
83
83
* If the virtual network where you plan to enable the managed domain has a VPN connection with your on-premises network. In this scenario, ensure you don't have a domain with the same DNS domain name on your on-premises network.
84
84
* If you have an existing Azure cloud service with that name on the Azure virtual network.
85
85
86
-
Complete the fields in the *Basics* window of the Azure portal to create a managed domain:
86
+
Complete the fields in the *Basics* window of the Microsoft Entra admin center to create a managed domain:
87
87
88
88
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
89
89
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
@@ -167,7 +167,7 @@ On the **Summary** page of the wizard, review the configuration settings for you
167
167
1. To create the managed domain, select **Create**. A note is displayed that certain configuration options like DNS name or virtual network can't be changed once the Azure AD DS managed has been created. To continue, select **OK**.
168
168
1. The process of provisioning your managed domain can take up to an hour. A notification is displayed in the portal that shows the progress of your Azure AD DS deployment. Select the notification to see detailed progress for the deployment.
169
169
170
-

170
+

171
171
172
172
1. Select your resource group, such as *myResourceGroup*, then choose your managed domain from the list of Azure resources, such as *aaddscontoso.com*. The **Overview** tab shows that the managed domain is currently *Deploying*. You can't configure the managed domain until it's fully provisioned.
173
173
@@ -193,7 +193,7 @@ With Azure AD DS successfully deployed, now configure the virtual network to all
193
193
1. To update the DNS server settings for the virtual network, select the **Configure** button. The DNS settings are automatically configured for your virtual network.
194
194
195
195
> [!TIP]
196
-
> If you selected an existing virtual network in the previous steps, any VMs connected to the network only get the new DNS settings after a restart. You can restart VMs using the Azure portal, Azure PowerShell, or the Azure CLI.
196
+
> If you selected an existing virtual network in the previous steps, any VMs connected to the network only get the new DNS settings after a restart. You can restart VMs using the Microsoft Entra admin center, Azure PowerShell, or the Azure CLI.
197
197
198
198
## Enable user accounts for Azure AD DS
199
199
@@ -208,7 +208,7 @@ To authenticate users on the managed domain, Azure AD DS needs password hashes i
208
208
209
209
The steps to generate and store these password hashes are different for cloud-only user accounts created in Azure AD versus user accounts that are synchronized from your on-premises directory using Azure AD Connect.
210
210
211
-
A cloud-only user account is an account that was created in your Azure AD directory using either the Azure portal or Azure AD PowerShell cmdlets. These user accounts aren't synchronized from an on-premises directory.
211
+
A cloud-only user account is an account that was created in your Azure AD directory using either the Microsoft Entra admin center or Azure AD PowerShell cmdlets. These user accounts aren't synchronized from an on-premises directory.
212
212
213
213
In this tutorial, let's work with a basic cloud-only user account. For more information on the additional steps required to use Azure AD Connect, see [Synchronize password hashes for user accounts synced from your on-premises AD to your managed domain][on-prem-sync].
0 commit comments