You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-configure-networking.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,18 +16,18 @@ ms.author: justinha
16
16
17
17
# Tutorial: Configure virtual networking for a Microsoft Entra Domain Services managed domain
18
18
19
-
To provide connectivity to users and applications, a Microsoft Entra Domain Services (Microsoft Entra DS) managed domain is deployed into an Azure virtual network subnet. This virtual network subnet should only be used for the managed domain resources provided by the Azure platform.
19
+
To provide connectivity to users and applications, a Microsoft Entra Domain Services managed domain is deployed into an Azure virtual network subnet. This virtual network subnet should only be used for the managed domain resources provided by the Azure platform.
20
20
21
-
When you create your own VMs and applications, they shouldn't be deployed into the same virtual network subnet. Instead, you should create and deploy your applications into a separate virtual network subnet, or in a separate virtual network that's peered to the Microsoft Entra DS virtual network.
21
+
When you create your own VMs and applications, they shouldn't be deployed into the same virtual network subnet. Instead, you should create and deploy your applications into a separate virtual network subnet, or in a separate virtual network that's peered to the Domain Services virtual network.
22
22
23
-
This tutorial shows you how to create and configure a dedicated virtual network subnet or how to peer a different network to the Microsoft Entra DS managed domain's virtual network.
23
+
This tutorial shows you how to create and configure a dedicated virtual network subnet or how to peer a different network to the Domain Services managed domain's virtual network.
24
24
25
25
In this tutorial, you learn how to:
26
26
27
27
> [!div class="checklist"]
28
-
> * Understand the virtual network connectivity options for domain-joined resources to Microsoft Entra DS
29
-
> * Create an IP address range and additional subnet in the Microsoft Entra DS virtual network
30
-
> * Configure virtual network peering to a network that's separate from Microsoft Entra DS
28
+
> * Understand the virtual network connectivity options for domain-joined resources to Domain Services
29
+
> * Create an IP address range and additional subnet in the Domain Services virtual network
30
+
> * Configure virtual network peering to a network that's separate from Domain Services
31
31
32
32
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
33
33
@@ -39,8 +39,8 @@ To complete this tutorial, you need the following resources and privileges:
39
39
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
40
40
* A Microsoft Entra tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
41
41
* If needed, [create a Microsoft Entra tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
42
-
* You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Microsoft Entra roles in your tenant to enable Microsoft Entra DS.
43
-
* You need Domain Services Contributor Azure role to create the required Microsoft Entra DS resources.
42
+
* You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Microsoft Entra roles in your tenant to enable Domain Services.
43
+
* You need Domain Services Contributor Azure role to create the required Domain Services resources.
44
44
* A Microsoft Entra Domain Services managed domain enabled and configured in your Microsoft Entra tenant.
45
45
* If needed, the first tutorial [creates and configures a Microsoft Entra Domain Services managed domain][create-azure-ad-ds-instance].
46
46
@@ -50,19 +50,19 @@ In this tutorial, you create and configure the managed domain using the Microsof
50
50
51
51
## Application workload connectivity options
52
52
53
-
In the previous tutorial, a managed domain was created that used some default configuration options for the virtual network. These default options created an Azure virtual network and virtual network subnet. The Microsoft Entra DS domain controllers that provide the managed domain services are connected to this virtual network subnet.
53
+
In the previous tutorial, a managed domain was created that used some default configuration options for the virtual network. These default options created an Azure virtual network and virtual network subnet. The Domain Services domain controllers that provide the managed domain services are connected to this virtual network subnet.
54
54
55
55
When you create and run VMs that need to use the managed domain, network connectivity needs to be provided. This network connectivity can be provided in one of the following ways:
56
56
57
57
* Create an additional virtual network subnet in the managed domain's virtual network. This additional subnet is where you create and connect your VMs.
58
-
* As the VMs are part of the same virtual network, they can automatically perform name resolution and communicate with the Microsoft Entra DS domain controllers.
58
+
* As the VMs are part of the same virtual network, they can automatically perform name resolution and communicate with the Domain Services domain controllers.
59
59
* Configure Azure virtual network peering from the managed domain's virtual network to one or more separate virtual networks. These separate virtual networks are where you create and connect your VMs.
60
-
* When you configure virtual network peering, you must also configure DNS settings to use name resolution back to the Microsoft Entra DS domain controllers.
60
+
* When you configure virtual network peering, you must also configure DNS settings to use name resolution back to the Domain Services domain controllers.
61
61
62
62
Usually, you only use one of these network connectivity options. The choice is often down to how you wish to manage separate your Azure resources.
63
63
64
-
* If you want to manage Microsoft Entra DS and connected VMs as one group of resources, you can create an additional virtual network subnet for VMs.
65
-
* If you want to separate the management of Microsoft Entra DS and then any connected VMs, you can use virtual network peering.
64
+
* If you want to manage Domain Services and connected VMs as one group of resources, you can create an additional virtual network subnet for VMs.
65
+
* If you want to separate the management of Domain Services and then any connected VMs, you can use virtual network peering.
66
66
* You may also choose to use virtual network peering to provide connectivity to existing VMs in your Azure environment that are connected to an existing virtual network.
67
67
68
68
In this tutorial, you only need to configure one these virtual network connectivity options.
@@ -97,7 +97,7 @@ When you create a VM that needs to use the managed domain, make sure you select
97
97
98
98
## Configure virtual network peering
99
99
100
-
You may have an existing Azure virtual network for VMs, or wish to keep your managed domain virtual network separate. To use the managed domain, VMs in other virtual networks need a way to communicate with the Microsoft Entra DS domain controllers. This connectivity can be provided using Azure virtual network peering.
100
+
You may have an existing Azure virtual network for VMs, or wish to keep your managed domain virtual network separate. To use the managed domain, VMs in other virtual networks need a way to communicate with the Domain Services domain controllers. This connectivity can be provided using Azure virtual network peering.
101
101
102
102
With Azure virtual network peering, two virtual networks are connected together, without the need for a virtual private network (VPN) device. Network peering lets you quickly connect virtual networks and define traffic flows across your Azure environment.
103
103
@@ -119,26 +119,26 @@ To peer a virtual network to the managed domain virtual network, complete the fo
119
119
120
120
Leave any other defaults for virtual network access or forwarded traffic unless you have specific requirements for your environment, then select **OK**.
121
121
122
-
1. It takes a few moments to create the peering on both the Microsoft Entra DS virtual network and the virtual network you selected. When ready, the **Peering status** reports *Connected*, as shown in the following example:
122
+
1. It takes a few moments to create the peering on both the Domain Services virtual network and the virtual network you selected. When ready, the **Peering status** reports *Connected*, as shown in the following example:
123
123
124
124

125
125
126
126
Before VMs in the peered virtual network can use the managed domain, configure the DNS servers to allow for correct name resolution.
127
127
128
128
### Configure DNS servers in the peered virtual network
129
129
130
-
For VMs and applications in the peered virtual network to successfully talk to the managed domain, the DNS settings must be updated. The IP addresses of the Microsoft Entra DS domain controllers must be configured as the DNS servers on the peered virtual network. There are two ways to configure the domain controllers as DNS servers for the peered virtual network:
130
+
For VMs and applications in the peered virtual network to successfully talk to the managed domain, the DNS settings must be updated. The IP addresses of the Domain Services domain controllers must be configured as the DNS servers on the peered virtual network. There are two ways to configure the domain controllers as DNS servers for the peered virtual network:
131
131
132
-
* Configure the Azure virtual network DNS servers to use the Microsoft Entra DS domain controllers.
132
+
* Configure the Azure virtual network DNS servers to use the Domain Services domain controllers.
133
133
* Configure the existing DNS server in use on the peered virtual network to use conditional DNS forwarding to direct queries to the managed domain. These steps vary depending on the existing DNS server in use.
134
134
135
-
In this tutorial, let's configure the Azure virtual network DNS servers to direct all queries to the Microsoft Entra DS domain controllers.
135
+
In this tutorial, let's configure the Azure virtual network DNS servers to direct all queries to the Domain Services domain controllers.
136
136
137
137
1. In the Microsoft Entra admin center, select the resource group of the peered virtual network, such as *myResourceGroup*. From the list of resources, choose the peered virtual network, such as *myVnet*.
138
138
1. In the left-hand menu of the virtual network window, select **DNS servers**.
139
-
1. By default, a virtual network uses the built-in Azure-provided DNS servers. Choose to use **Custom** DNS servers. Enter the IP addresses for the Microsoft Entra DS domain controllers, which are usually *10.0.2.4* and *10.0.2.5*. Confirm these IP addresses on the **Overview** window of your managed domain in the portal.
139
+
1. By default, a virtual network uses the built-in Azure-provided DNS servers. Choose to use **Custom** DNS servers. Enter the IP addresses for the Domain Services domain controllers, which are usually *10.0.2.4* and *10.0.2.5*. Confirm these IP addresses on the **Overview** window of your managed domain in the portal.
140
140
141
-

141
+

142
142
143
143
1. When ready, select **Save**. It takes a few moments to update the DNS servers for the virtual network.
144
144
1. To apply the updated DNS settings to the VMs, restart VMs connected to the peered virtual network.
@@ -150,9 +150,9 @@ When you create a VM that needs to use the managed domain, make sure you select
150
150
In this tutorial, you learned how to:
151
151
152
152
> [!div class="checklist"]
153
-
> * Understand the virtual network connectivity options for domain-joined resources to Microsoft Entra DS
154
-
> * Create an IP address range and additional subnet in the Microsoft Entra DS virtual network
155
-
> * Configure virtual network peering to a network that's separate from Microsoft Entra DS
153
+
> * Understand the virtual network connectivity options for domain-joined resources to Domain Services
154
+
> * Create an IP address range and additional subnet in the Domain Services virtual network
155
+
> * Configure virtual network peering to a network that's separate from Domain Services
156
156
157
157
To see this managed domain in action, create and join a virtual machine to the domain.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-configure-password-hash-sync.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,17 +8,17 @@ ms.service: active-directory
8
8
ms.subservice: domain-services
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 04/03/2023
11
+
ms.date: 09/21/2023
12
12
ms.author: justinha
13
13
14
14
#Customer intent: As an server administrator, I want to learn how to enable password hash synchronization with Microsoft Entra Connect to create a hybrid environment using an on-premises AD DS domain.
15
15
---
16
16
17
17
# Tutorial: Enable password synchronization in Microsoft Entra Domain Services for hybrid environments
18
18
19
-
For hybrid environments, a Microsoft Entra tenant can be configured to synchronize with an on-premises Active Directory Domain Services (AD DS) environment using Microsoft Entra Connect. By default, Microsoft Entra Connect doesn't synchronize legacy NT LAN Manager (NTLM) and Kerberos password hashes that are needed for Microsoft Entra Domain Services (Microsoft Entra DS).
19
+
For hybrid environments, a Microsoft Entra tenant can be configured to synchronize with an on-premises Active Directory Domain Services (AD DS) environment using Microsoft Entra Connect. By default, Microsoft Entra Connect doesn't synchronize legacy NT LAN Manager (NTLM) and Kerberos password hashes that are needed for Microsoft Entra Domain Services.
20
20
21
-
To use Microsoft Entra DS with accounts synchronized from an on-premises AD DS environment, you need to configure Microsoft Entra Connect to synchronize those password hashes required for NTLM and Kerberos authentication. After Microsoft Entra Connect is configured, an on-premises account creation or password change event also then synchronizes the legacy password hashes to Microsoft Entra ID.
21
+
To use Domain Services with accounts synchronized from an on-premises AD DS environment, you need to configure Microsoft Entra Connect to synchronize those password hashes required for NTLM and Kerberos authentication. After Microsoft Entra Connect is configured, an on-premises account creation or password change event also then synchronizes the legacy password hashes to Microsoft Entra ID.
22
22
23
23
You don't need to perform these steps if you use cloud-only accounts with no on-premises AD DS environment.
24
24
@@ -48,16 +48,16 @@ To complete this tutorial, you need the following resources:
48
48
49
49
Microsoft Entra Connect is used to synchronize objects like user accounts and groups from an on-premises AD DS environment into a Microsoft Entra tenant. As part of the process, password hash synchronization enables accounts to use the same password in the on-premises AD DS environment and Microsoft Entra ID.
50
50
51
-
To authenticate users on the managed domain, Microsoft Entra DS needs password hashes in a format that's suitable for NTLM and Kerberos authentication. Microsoft Entra ID doesn't store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Microsoft Entra DS for your tenant. For security reasons, Microsoft Entra ID also doesn't store any password credentials in clear-text form. Therefore, Microsoft Entra ID can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
51
+
To authenticate users on the managed domain, Domain Services needs password hashes in a format that's suitable for NTLM and Kerberos authentication. Microsoft Entra ID doesn't store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Domain Services for your tenant. For security reasons, Microsoft Entra ID also doesn't store any password credentials in clear-text form. Therefore, Microsoft Entra ID can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
52
52
53
-
Microsoft Entra Connect can be configured to synchronize the required NTLM or Kerberos password hashes for Microsoft Entra DS. Make sure that you have completed the steps to [enable Microsoft Entra Connect for password hash synchronization][enable-azure-ad-connect]. If you had an existing instance of Microsoft Entra Connect, [download and update to the latest version][azure-ad-connect-download] to make sure you can synchronize the legacy password hashes for NTLM and Kerberos. This functionality isn't available in early releases of Microsoft Entra Connect or with the legacy DirSync tool. Microsoft Entra Connect version *1.1.614.0* or later is required.
53
+
Microsoft Entra Connect can be configured to synchronize the required NTLM or Kerberos password hashes for Domain Services. Make sure that you have completed the steps to [enable Microsoft Entra Connect for password hash synchronization][enable-azure-ad-connect]. If you had an existing instance of Microsoft Entra Connect, [download and update to the latest version][azure-ad-connect-download] to make sure you can synchronize the legacy password hashes for NTLM and Kerberos. This functionality isn't available in early releases of Microsoft Entra Connect or with the legacy DirSync tool. Microsoft Entra Connect version *1.1.614.0* or later is required.
54
54
55
55
> [!IMPORTANT]
56
-
> Microsoft Entra Connect should only be installed and configured for synchronization with on-premises AD DS environments. It's not supported to install Microsoft Entra Connect in a Microsoft Entra DS managed domain to synchronize objects back to Microsoft Entra ID.
56
+
> Microsoft Entra Connect should only be installed and configured for synchronization with on-premises AD DS environments. It's not supported to install Microsoft Entra Connect in a Domain Services managed domain to synchronize objects back to Microsoft Entra ID.
57
57
58
58
## Enable synchronization of password hashes
59
59
60
-
With Microsoft Entra Connect installed and configured to synchronize with Microsoft Entra ID, now configure the legacy password hash sync for NTLM and Kerberos. A PowerShell script is used to configure the required settings and then start a full password synchronization to Microsoft Entra ID. When that Microsoft Entra Connect password hash synchronization process is complete, users can sign in to applications through Microsoft Entra DS that use legacy NTLM or Kerberos password hashes.
60
+
With Microsoft Entra Connect installed and configured to synchronize with Microsoft Entra ID, now configure the legacy password hash sync for NTLM and Kerberos. A PowerShell script is used to configure the required settings and then start a full password synchronization to Microsoft Entra ID. When that Microsoft Entra Connect password hash synchronization process is complete, users can sign in to applications through Domain Services that use legacy NTLM or Kerberos password hashes.
61
61
62
62
1. On the computer with Microsoft Entra Connect installed, from the Start menu, open the **Microsoft Entra Connect > Synchronization Service**.
63
63
1. Select the **Connectors** tab. The connection information used to establish the synchronization between the on-premises AD DS environment and Microsoft Entra ID are listed.
0 commit comments