Skip to content

Commit ec110c8

Browse files
Merge pull request #251700 from Justinha/steps-ds-6
revised portal
2 parents c6a9f60 + 2bebec7 commit ec110c8

File tree

6 files changed

+49
-49
lines changed

6 files changed

+49
-49
lines changed

articles/active-directory-domain-services/tutorial-create-forest-trust.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tutorial - Create a forest trust in Azure AD Domain Services | Microsoft Docs
3-
description: Learn how to create a one-way outbound forest to an on-premises AD DS domain in the Azure portal for Azure AD Domain Services
3+
description: Learn how to create a one-way outbound forest to an on-premises AD DS domain in the Microsoft Entra admin center for Azure AD Domain Services
44
services: active-directory-ds
55
author: justinha
66
manager: amycolannino
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/02/2023
12+
ms.date: 09/15/2023
1313
ms.author: justinha
1414

1515
#Customer intent: As an identity administrator, I want to create a one-way outbound forest from an Azure Active Directory Domain Services forest to an on-premises Active Directory Domain Services forest to provide authentication and resource access between forests.
@@ -50,9 +50,9 @@ To complete this tutorial, you need the following resources and privileges:
5050
> [!IMPORTANT]
5151
> You need to use a minimum of *Enterprise* SKU for your managed domain. If needed, [change the SKU for a managed domain][howto-change-sku].
5252
53-
## Sign in to the Azure portal
53+
## Sign in to the Microsoft Entra admin center
5454

55-
In this tutorial, you create and configure the outbound forest trust from Azure AD DS using the Azure portal. To get started, first sign in to the [Azure portal](https://portal.azure.com). You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to modify an Azure AD DS instance.
55+
In this tutorial, you create and configure the outbound forest trust from Azure AD DS using the Microsoft Entra admin center. To get started, first sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to modify an Azure AD DS instance.
5656

5757
## Networking considerations
5858

@@ -92,7 +92,7 @@ To correctly resolve the managed domain from the on-premises environment, you ma
9292

9393
## Create inbound forest trust in the on-premises domain
9494

95-
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Azure portal.
95+
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Microsoft Entra admin center.
9696

9797
To configure inbound trust on the on-premises AD DS domain, complete the following steps from a management workstation for the on-premises AD DS domain:
9898

@@ -101,8 +101,8 @@ To configure inbound trust on the on-premises AD DS domain, complete the followi
101101
1. Choose **Trusts** tab, then **New Trust**.
102102
1. Enter the name for Azure AD DS domain name, such as *aaddscontoso.com*, then select **Next**.
103103
1. Select the option to create a **Forest trust**, then to create a **One way: incoming** trust.
104-
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Azure portal for the managed domain.
105-
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Azure portal in the next section.
104+
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Microsoft Entra admin center for the managed domain.
105+
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Microsoft Entra admin center in the next section.
106106
1. Step through the next few windows with default options, then choose the option for **No, do not confirm the outgoing trust**.
107107
1. Select **Finish**.
108108

@@ -118,20 +118,20 @@ If the forest trust is no longer needed for an environment, complete the followi
118118

119119
With the on-premises AD DS domain configured to resolve the managed domain and an inbound forest trust created, now create the outbound forest trust. This outbound forest trust completes the trust relationship between the on-premises AD DS domain and the managed domain.
120120

121-
To create the outbound trust for the managed domain in the Azure portal, complete the following steps:
121+
To create the outbound trust for the managed domain in the Microsoft Entra admin center, complete the following steps:
122122

123-
1. In the Azure portal, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
123+
1. In the Microsoft Entra admin center, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
124124
1. From the menu on the left-hand side of the managed domain, select **Trusts**, then choose to **+ Add** a trust.
125125
1. Enter a display name that identifies your trust, then the on-premises trusted forest DNS name, such as *onprem.contoso.com*.
126126
1. Provide the same trust password that was used to configure the inbound forest trust for the on-premises AD DS domain in the previous section.
127127
1. Provide at least two DNS servers for the on-premises AD DS domain, such as *10.1.1.4* and *10.1.1.5*.
128128
1. When ready, **Save** the outbound forest trust.
129129

130-
![Create outbound forest trust in the Azure portal](./media/tutorial-create-forest-trust/portal-create-outbound-trust.png)
130+
![Create outbound forest trust in the Microsoft Entra admin center](./media/tutorial-create-forest-trust/portal-create-outbound-trust.png)
131131

132132
If the forest trust is no longer needed for an environment, complete the following steps to remove it from Azure AD DS:
133133

134-
1. In the Azure portal, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
134+
1. In the Microsoft Entra admin center, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*.
135135
1. From the menu on the left-hand side of the managed domain, select **Trusts**, choose the trust, and click **Remove**.
136136
1. Provide the same trust password that was used to configure the forest trust and click **OK**.
137137

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tutorial - Create a customized Azure Active Directory Domain Services managed domain | Microsoft Docs
3-
description: In this tutorial, you learn how to create and configure a customized Azure Active Directory Domain Services managed domain and specify advanced configuration options using the Azure portal.
3+
description: In this tutorial, you learn how to create and configure a customized Azure Active Directory Domain Services managed domain and specify advanced configuration options using the Microsoft Entra admin center.
44
author: justinha
55
manager: amycolannino
66

@@ -9,7 +9,7 @@ ms.subservice: domain-services
99
ms.workload: identity
1010
ms.custom: has-azure-ad-ps-ref
1111
ms.topic: tutorial
12-
ms.date: 04/03/2023
12+
ms.date: 09/15/2023
1313
ms.author: justinha
1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
1515
---
@@ -18,7 +18,7 @@ ms.author: justinha
1818

1919
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, LDAP, Kerberos/NTLM authentication that is fully compatible with Windows Server Active Directory. You consume these domain services without deploying, managing, and patching domain controllers yourself. Azure AD DS integrates with your existing Azure AD tenant. This integration lets users sign in using their corporate credentials, and you can use existing groups and user accounts to secure access to resources.
2020

21-
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows you how to define those advanced configuration options to create and configure an Azure AD DS managed domain using the Azure portal.
21+
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows you how to define those advanced configuration options to create and configure an Azure AD DS managed domain using the Microsoft Entra admin center.
2222

2323
In this tutorial, you learn how to:
2424

@@ -46,15 +46,15 @@ Although not required for Azure AD DS, it's recommended to [configure self-servi
4646
> [!IMPORTANT]
4747
> After you create a managed domain, you can't move it to a different subscription, resource group, or region. Take care to select the most appropriate subscription, resource group, and region when you deploy the managed domain.
4848
49-
## Sign in to the Azure portal
49+
## Sign in to the Microsoft Entra admin center
5050

51-
In this tutorial, you create and configure the managed domain using the Azure portal. To get started, first sign in to the [Azure portal](https://portal.azure.com).
51+
In this tutorial, you create and configure the managed domain using the Microsoft Entra admin center. To get started, first sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
5252

5353
## Create a managed domain and configure basic settings
5454

5555
To launch the **Enable Azure AD Domain Services** wizard, complete the following steps:
5656

57-
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.
57+
1. On the Microsoft Entra admin center menu or from the **Home** page, select **Create a resource**.
5858
1. Enter *Domain Services* into the search bar, then choose *Azure AD Domain Services* from the search suggestions.
5959
1. On the Azure AD Domain Services page, select **Create**. The **Enable Azure AD Domain Services** wizard is launched.
6060
1. Select the Azure **Subscription** in which you would like to create the managed domain.
@@ -83,7 +83,7 @@ The following DNS name restrictions also apply:
8383
* If the virtual network where you plan to enable the managed domain has a VPN connection with your on-premises network. In this scenario, ensure you don't have a domain with the same DNS domain name on your on-premises network.
8484
* If you have an existing Azure cloud service with that name on the Azure virtual network.
8585

86-
Complete the fields in the *Basics* window of the Azure portal to create a managed domain:
86+
Complete the fields in the *Basics* window of the Microsoft Entra admin center to create a managed domain:
8787

8888
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
8989
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
@@ -167,7 +167,7 @@ On the **Summary** page of the wizard, review the configuration settings for you
167167
1. To create the managed domain, select **Create**. A note is displayed that certain configuration options like DNS name or virtual network can't be changed once the Azure AD DS managed has been created. To continue, select **OK**.
168168
1. The process of provisioning your managed domain can take up to an hour. A notification is displayed in the portal that shows the progress of your Azure AD DS deployment. Select the notification to see detailed progress for the deployment.
169169

170-
![Notification in the Azure portal of the deployment in progress](./media/tutorial-create-instance-advanced/deployment-in-progress.png)
170+
![Notification in the Microsoft Entra admin center of the deployment in progress](./media/tutorial-create-instance-advanced/deployment-in-progress.png)
171171

172172
1. Select your resource group, such as *myResourceGroup*, then choose your managed domain from the list of Azure resources, such as *aaddscontoso.com*. The **Overview** tab shows that the managed domain is currently *Deploying*. You can't configure the managed domain until it's fully provisioned.
173173

@@ -193,7 +193,7 @@ With Azure AD DS successfully deployed, now configure the virtual network to all
193193
1. To update the DNS server settings for the virtual network, select the **Configure** button. The DNS settings are automatically configured for your virtual network.
194194

195195
> [!TIP]
196-
> If you selected an existing virtual network in the previous steps, any VMs connected to the network only get the new DNS settings after a restart. You can restart VMs using the Azure portal, Azure PowerShell, or the Azure CLI.
196+
> If you selected an existing virtual network in the previous steps, any VMs connected to the network only get the new DNS settings after a restart. You can restart VMs using the Microsoft Entra admin center, Azure PowerShell, or the Azure CLI.
197197
198198
## Enable user accounts for Azure AD DS
199199

@@ -208,7 +208,7 @@ To authenticate users on the managed domain, Azure AD DS needs password hashes i
208208
209209
The steps to generate and store these password hashes are different for cloud-only user accounts created in Azure AD versus user accounts that are synchronized from your on-premises directory using Azure AD Connect.
210210

211-
A cloud-only user account is an account that was created in your Azure AD directory using either the Azure portal or Azure AD PowerShell cmdlets. These user accounts aren't synchronized from an on-premises directory.
211+
A cloud-only user account is an account that was created in your Azure AD directory using either the Microsoft Entra admin center or Azure AD PowerShell cmdlets. These user accounts aren't synchronized from an on-premises directory.
212212

213213
In this tutorial, let's work with a basic cloud-only user account. For more information on the additional steps required to use Azure AD Connect, see [Synchronize password hashes for user accounts synced from your on-premises AD to your managed domain][on-prem-sync].
214214

0 commit comments

Comments
 (0)