Skip to content

Commit ed843b7

Browse files
committed
[AzureADDS] Edits and revisions
1 parent 90946a0 commit ed843b7

File tree

1 file changed

+22
-22
lines changed

1 file changed

+22
-22
lines changed

articles/active-directory-domain-services/troubleshoot.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Active Directory Domain Services troubleshooting | Microsoft Docs'
3-
description: Learn how to troubleshooting common errors when you create or manage Azure Active Directory Domain Services
3+
description: Learn how to troubleshoot common errors when you create or manage Azure Active Directory Domain Services
44
services: active-directory-ds
55
author: iainfoulds
66
manager: daveba
@@ -33,38 +33,38 @@ If you have problems enabling Azure AD DS, review the following common errors an
3333

3434
### Domain Name conflict
3535

36-
**Error message:**
36+
**Error message**
3737

3838
*The name contoso.com is already in use on this network. Specify a name that is not in use.*
3939

40-
**Resolution:**
40+
**Resolution**
4141

42-
Check that you don't have an existing AD DS environment with the same domain name on the virtual network. For example, you may have an AD DS domain that runs on Azure VMs named *contoso.com*. When you try to enable an Azure AD DS managed domain with the same domain name of *contoso.com* on the virtual network, the requested operation fails.
42+
Check that you don't have an existing AD DS environment with the same domain name on the virtual network. For example, you may have an AD DS domain named *contoso.com* that runs on Azure VMs. When you try to enable an Azure AD DS managed domain with the same domain name of *contoso.com* on the virtual network, the requested operation fails.
4343

44-
This failure is due to name conflicts for the domain name on the virtual network. A DNS lookup checks if an existing AD DS environment responds on the requested domain name. To resolve this failure, use a different name to set up your Azure AD DS managed domain, or de-provision the existing AD DS domain and then enable Azure AD DS.
44+
This failure is due to name conflicts for the domain name on the virtual network. A DNS lookup checks if an existing AD DS environment responds on the requested domain name. To resolve this failure, use a different name to set up your Azure AD DS managed domain, or de-provision the existing AD DS domain and then try again to enable Azure AD DS.
4545

4646
### Inadequate permissions
4747

48-
**Error message:**
48+
**Error message**
4949

5050
*Domain Services could not be enabled in this Azure AD tenant. The service does not have adequate permissions to the application called 'Azure AD Domain Services Sync'. Delete the application called 'Azure AD Domain Services Sync' and then try to enable Domain Services for your Azure AD tenant.*
5151

52-
**Resolution:**
52+
**Resolution**
5353

5454
Check if there's an application named *Azure AD Domain Services Sync* in your Azure AD directory. If this application exists, delete it and then try again to enable Azure AD DS. To check for an existing application and delete it if needed, complete the following steps:
5555

5656
1. In the Azure portal, select **Azure Active Directory** from the left-hand navigation menu.
57-
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type* drop-down menu, then select **Apply**.
57+
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
5858
1. In the search box, enter *Azure AD Domain Services Sync*. If the application exists, select it and choose **Delete**.
5959
1. Once you've deleted the application, try to enable Azure AD DS again.
6060

6161
### Invalid configuration
6262

63-
**Error message:**
63+
**Error message**
6464

6565
*Domain Services could not be enabled in this Azure AD tenant. The Domain Services application in your Azure AD tenant does not have the required permissions to enable Domain Services. Delete the application with the application identifier d87dcbc6-a371-462e-88e3-28ad15ec4e64 and then try to enable Domain Services for your Azure AD tenant.*
6666

67-
**Resolution:**
67+
**Resolution**
6868

6969
Check if you have an existing application named *AzureActiveDirectoryDomainControllerServices* with an application identifier of *d87dcbc6-a371-462e-88e3-28ad15ec4e64* in your Azure AD directory. If this application exists, delete it and then try again to enable Azure AD DS.
7070

@@ -104,18 +104,18 @@ if ($sp -ne $null)
104104

105105
### Microsoft Graph disabled
106106

107-
**Error message:**
107+
**Error message**
108108

109-
Domain Services could not be enabled in this Azure AD tenant. The Microsoft Azure AD application is disabled in your Azure AD tenant. Enable the application with the application identifier 00000002-0000-0000-c000-000000000000 and then try to enable Domain Services for your Azure AD tenant.
109+
*Domain Services could not be enabled in this Azure AD tenant. The Microsoft Azure AD application is disabled in your Azure AD tenant. Enable the application with the application identifier 00000002-0000-0000-c000-000000000000 and then try to enable Domain Services for your Azure AD tenant.*
110110

111-
**Resolution:**
111+
**Resolution**
112112

113-
Check you've disabled an application with the identifier *00000002-0000-0000-c000-000000000000*. This application is the Microsoft Azure AD application and provides Graph API access to your Azure AD tenant. To synchronize your Azure AD tenant, this application must be enabled.
113+
Check if you've disabled an application with the identifier *00000002-0000-0000-c000-000000000000*. This application is the Microsoft Azure AD application and provides Graph API access to your Azure AD tenant. To synchronize your Azure AD tenant, this application must be enabled.
114114

115115
To check the status of this application and enable it if needed, complete the following steps:
116116

117117
1. In the Azure portal, select **Azure Active Directory** from the left-hand navigation menu.
118-
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type* drop-down menu, then select **Apply**.
118+
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
119119
1. In the search box, enter *00000002-0000-0000-c000-00000000000*. Select the application, then choose **Properties**.
120120
1. If **Enabled for users to sign-in** is set to *No*, set the value to *Yes*, then select **Save**.
121121
1. Once you've enabled the application, try to enable Azure AD DS again.
@@ -124,12 +124,12 @@ To check the status of this application and enable it if needed, complete the fo
124124

125125
If one or more users in your Azure AD tenant can't sign in to the Azure AD DS managed domain, complete the following troubleshooting steps:
126126

127-
* **Credentials format** - Try using the UPN format to specify credentials, such as `[email protected]`. The UPN format is the recommended way to specify credentials in Azure AD DS. Make sure that this UPN is configured correctly in Azure AD.
127+
* **Credentials format** - Try using the UPN format to specify credentials, such as `[email protected]`. The UPN format is the recommended way to specify credentials in Azure AD DS. Make sure this UPN is configured correctly in Azure AD.
128128

129129
The *SAMAccountName* for your account, such as *CONTOSO\driley* may be autogenerated if there are multiple users with the same UPN prefix in your tenant or if your UPN prefix is overly long. Therefore, the *SAMAccountName* format for your account may be different from what you expect or use in your on-premises domain.
130130

131131
* **Password synchronization** - Make sure that you've enabled password synchronization for [cloud-only users][cloud-only-passwords] or for [hybrid environments using Azure AD Connect][hybrid-phs].
132-
* **Hybrid synchronized accounts:** If the affected user accounts are synchronized from an on-premises directory, verify the following:
132+
* **Hybrid synchronized accounts:** If the affected user accounts are synchronized from an on-premises directory, verify the following areas:
133133

134134
* You've deployed or updated to the [latest recommended release of Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
135135
* You've configured Azure AD Connect to [perform a full synchronization][hybrid-phs].
@@ -144,24 +144,24 @@ If one or more users in your Azure AD tenant can't sign in to the Azure AD DS ma
144144
* **Cloud-only accounts**: If the affected user account is a cloud-only user account, make sure that the [user has changed their password after you enabled Azure AD DS][cloud-only-passwords]. This password reset causes the required credential hashes for Azure AD Domain Services to be generated.
145145

146146
* **Verify the user account is active**: By default, five invalid password attempts within 2 minutes on the managed domain cause a user account to be locked out for 30 minutes. The user can't sign in while the account is locked out. After 30 minutes, the user account is automatically unlocked.
147-
* Invalid password attempts on the Azure AD DS managed domain don't lock out the user account in Azure AD. The user account is locked out only within the managed domain. Check the user account status in the Active Directory Administrative Console (ADAC) using the [management VM][management-vm], not in Azure AD.
147+
* Invalid password attempts on the Azure AD DS managed domain don't lock out the user account in Azure AD. The user account is locked out only within the managed domain. Check the user account status in the *Active Directory Administrative Console (ADAC)* using the [management VM][management-vm], not in Azure AD.
148148
* You can also [configure fine grained password policies][password-policy] to change the default lockout threshold and duration.
149149

150150
* **External accounts** - Check that the affected user account isn't an external account in the Azure AD tenant. Examples of external accounts include Microsoft accounts like `[email protected]` or user accounts from an external Azure AD directory. Azure AD DS doesn't store credentials for external user accounts so they can't sign in to the managed domain.
151151

152152
## There are one or more alerts on your managed domain
153153

154-
If there are active alerts on the Azure AD DS managed domain, it may indicate there are issues that prevent the authentication process from working correctly.
154+
If there are active alerts on the Azure AD DS managed domain, it may prevent the authentication process from working correctly.
155155

156156
To see if there are any active alerts, [check the health status of an Azure AD DS managed domain][check-health]. If any alerts are shown, [troubleshoot and resolve them][troubleshoot-alerts].
157157

158158
## Users removed from your Azure AD tenant are not removed from your managed domain
159159

160-
Azure AD protects you from accidental deletion of user objects. When you delete a user account from your Azure AD tenant, the corresponding user object is moved to the recycle bin. When this delete operation is synchronized to your Azure AD DS managed domain, it causes the corresponding user account to be marked disabled. This feature helps you recover or undelete the user account later.
160+
Azure AD protects against accidental deletion of user objects. When you delete a user account from an Azure AD tenant, the corresponding user object is moved to the recycle bin. When this delete operation is synchronized to your Azure AD DS managed domain, the corresponding user account is marked as disabled. This feature helps you recover, or undelete, the user account.
161161

162-
The user account remains in the disabled state in your Azure AD DS managed domain, even if you re-create a user account with the same UPN in your Azure AD directory. To remove the user account from your Azure AD DS managed domain, you need to forcibly delete it from your Azure AD tenant.
162+
The user account remains in the disabled state in the Azure AD DS managed domain, even if you re-create a user account with the same UPN in the Azure AD directory. To remove the user account from the Azure AD DS managed domain, you need to forcibly delete it from the Azure AD tenant.
163163

164-
To remove the user account fully from your managed domain, delete the user permanently from your Azure AD tenant. Use the [Remove-MsolUser][Remove-MsolUser] PowerShell cmdlet with the `-RemoveFromRecycleBin` parameter.
164+
To fully remove a user account from an Azure AD DS managed domain, delete the user permanently from your Azure AD tenant using the [Remove-MsolUser][Remove-MsolUser] PowerShell cmdlet with the `-RemoveFromRecycleBin` parameter.
165165

166166
## Next steps
167167

0 commit comments

Comments
 (0)