You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-windows-vm-template.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: conceptual
13
-
ms.date: 09/17/2019
13
+
ms.date: 03/31/2020
14
14
ms.author: iainfou
15
15
---
16
16
@@ -25,7 +25,7 @@ This article shows you how to create and join a Windows Server VM to an Azure AD
25
25
To complete this tutorial, you need the following resources and privileges:
26
26
27
27
* An active Azure subscription.
28
-
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28
+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
29
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
30
30
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31
31
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-create-forest-trust.md
+16-21Lines changed: 16 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 11/19/2019
12
+
ms.date: 03/31/2020
13
13
ms.author: iainfou
14
14
15
15
#Customer intent: As an identity administrator, I want to create a one-way outbound forest from an Azure Active Directory Domain Services resource forest to an on-premises Active Directory Domain Services forest to provide authentication and resource access between forests.
@@ -29,14 +29,14 @@ In this tutorial, you learn how to:
29
29
> * Create a one-way outbound forest trust in Azure AD DS
30
30
> * Test and validate the trust relationship for authentication and resource access
31
31
32
-
If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
32
+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
33
33
34
34
## Prerequisites
35
35
36
36
To complete this tutorial, you need the following resources and privileges:
37
37
38
38
* An active Azure subscription.
39
-
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
39
+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
40
40
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
41
41
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
42
42
* An Azure Active Directory Domain Services managed domain created using a resource forest and configured in your Azure AD tenant.
@@ -57,7 +57,7 @@ Before you configure a forest trust in Azure AD DS, make sure your networking be
57
57
58
58
* Use private IP addresses. Don't rely on DHCP with dynamic IP address assignment.
59
59
* Avoid overlapping IP address spaces to allow virtual network peering and routing to successfully communicate between Azure and on-premises.
60
-
* An Azure virtual network needs a gateway subnet to configure a site-to-site (S2S) VPN or ExpressRoute connection
60
+
* An Azure virtual network needs a gateway subnet to configure an [Azure site-to-site (S2S) VPN][vpn-gateway] or [ExpressRoute][expressroute] connection
61
61
* Create subnets with enough IP addresses to support your scenario.
62
62
* Make sure Azure AD DS has its own subnet, don't share this virtual network subnet with application VMs and services.
63
63
* Peered virtual networks are NOT transitive.
@@ -72,7 +72,7 @@ To correctly resolve the Azure AD DS managed domain from the on-premises environ
72
72
1. Select **Start | Administrative Tools | DNS**
73
73
1. Right-select DNS server, such as *myAD01*, select **Properties**
74
74
1. Choose **Forwarders**, then **Edit** to add additional forwarders.
75
-
1. Add the IP addresses of the Azure AD DS managed domain, such as *10.0.1.4* and *10.0.1.5*.
75
+
1. Add the IP addresses of the Azure AD DS managed domain, such as *10.0.2.4* and *10.0.2.5*.
76
76
77
77
## Create inbound forest trust in the on-premises domain
78
78
@@ -83,10 +83,6 @@ To configure inbound trust on the on-premises AD DS domain, complete the followi
83
83
1. Select **Start | Administrative Tools | Active Directory Domains and Trusts**
84
84
1. Right-select domain, such as *onprem.contoso.com*, select **Properties**
85
85
1. Choose **Trusts** tab, then **New Trust**
86
-
87
-
> [!NOTE]
88
-
> If you don't see the **Trusts** menu option, check under **Properties** for the *Forest type*. Only *resource* forests can create trusts. If the forest type is *User*, you can't create trusts. There's currently no way to change the forest type of an Azure AD DS managed domain. You need to delete and recreate the managed domain as a resource forest.
89
-
90
86
1. Enter name on Azure AD DS domain name, such as *aaddscontoso.com*, then select **Next**
91
87
1. Select the option to create a **Forest trust**, then to create a **One way: incoming** trust.
92
88
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Azure portal for the Azure AD DS managed domain.
@@ -102,12 +98,16 @@ To create the outbound trust for the Azure AD DS managed domain in the Azure por
102
98
103
99
1. In the Azure portal, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*
104
100
1. From the menu on the left-hand side of the Azure AD DS managed domain, select **Trusts**, then choose to **+ Add** a trust.
101
+
102
+
> [!NOTE]
103
+
> If you don't see the **Trusts** menu option, check under **Properties** for the *Forest type*. Only *resource* forests can create trusts. If the forest type is *User*, you can't create trusts. There's currently no way to change the forest type of an Azure AD DS managed domain. You need to delete and recreate the managed domain as a resource forest.
104
+
105
105
1. Enter a display name that identifies your trust, then the on-premises trusted forest DNS name, such as *onprem.contoso.com*
106
106
1. Provide the same trust password that was used when configuring the inbound forest trust for the on-premises AD DS domain in the previous section.
107
-
1. Provide at least two DNS servers for the on-premises AD DS domain, such as *10.0.2.4* and *10.0.2.5*
107
+
1. Provide at least two DNS servers for the on-premises AD DS domain, such as *10.1.1.4* and *10.1.1.5*
108
108
1. When ready, **Save** the outbound forest trust
109
109
110
-
[Create outbound forest trust in the Azure portal](./media/create-forest-trust/portal-create-outbound-trust.png)
110
+

111
111
112
112
## Validate resource authentication
113
113
@@ -124,18 +124,14 @@ The following common scenarios let you validate that forest trust correctly auth
124
124
125
125
You should have Windows Server virtual machine joined to the Azure AD DS resource domain. Use this virtual machine to test your on-premises user can authenticate on a virtual machine.
126
126
127
-
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using Remote Desktop and your Azure AD DS administrator credentials. If you get a Network Level Authentication (NLA) error, check the user account you used is not a domain user account.
128
-
129
-
> [!NOTE]
130
-
> To securely connect to your VMs joined to Azure AD Domain Services, you can use the [Azure Bastion Host Service](https://docs.microsoft.com/azure/bastion/bastion-overview) in supported Azure regions.
131
-
127
+
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using [Azure Bastion](https://docs.microsoft.com/azure/bastion/bastion-overview) and your Azure AD DS administrator credentials.
132
128
1. Open a command prompt and use the `whoami` command to show the distinguished name of the currently authenticated user:
133
129
134
130
```console
135
131
whoami /fqdn
136
132
```
137
133
138
-
1. Use the `runas` command to authenticate as a user from the on-premises domain. In the following command, replace `[email protected]` with the UPN of a user from the trusted on-premises domain. The command prompts you for the user’s password:
134
+
1. Use the `runas` command to authenticate as a user from the on-premises domain. In the following command, replace `[email protected]` with the UPN of a user from the trusted on-premises domain. The command prompts you for the user's password:
@@ -150,10 +146,7 @@ Using the Windows Server VM joined to the Azure AD DS resource forest, you can t
150
146
151
147
#### Enable file and printer sharing
152
148
153
-
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using Remote Desktop and your Azure AD DS administrator credentials. If you get a Network Level Authentication (NLA) error, check the user account you used is not a domain user account.
154
-
155
-
> [!NOTE]
156
-
> To securely connect to your VMs joined to Azure AD Domain Services, you can use the [Azure Bastion Host Service](https://docs.microsoft.com/azure/bastion/bastion-overview) in supported Azure regions.
149
+
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using [Azure Bastion](https://docs.microsoft.com/azure/bastion/bastion-overview) and your Azure AD DS administrator credentials.
157
150
158
151
1. Open **Windows Settings**, then search for and select **Network and Sharing Center**.
159
152
1. Choose the option for **Change advanced sharing** settings.
@@ -219,3 +212,5 @@ For more conceptual information about forest types in Azure AD DS, see [What are
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-create-instance-advanced.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: domain-services
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 11/19/2019
11
+
ms.date: 03/31/2020
12
12
ms.author: iainfou
13
13
14
14
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -18,7 +18,7 @@ ms.author: iainfou
18
18
19
19
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, LDAP, Kerberos/NTLM authentication that is fully compatible with Windows Server Active Directory. You consume these domain services without deploying, managing, and patching domain controllers yourself. Azure AD DS integrates with your existing Azure AD tenant. This integration lets users sign in using their corporate credentials, and you can use existing groups and user accounts to secure access to resources.
20
20
21
-
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows how to define those advanced configuration options to create and configure an Azure AD DS instance using the Azure portal.
21
+
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows you how to define those advanced configuration options to create and configure an Azure AD DS instance using the Azure portal.
22
22
23
23
In this tutorial, you learn how to:
24
24
@@ -28,14 +28,14 @@ In this tutorial, you learn how to:
28
28
> * Add administrative users to domain management
29
29
> * Enable password hash synchronization
30
30
31
-
If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
31
+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
32
32
33
33
## Prerequisites
34
34
35
35
To complete this tutorial, you need the following resources and privileges:
36
36
37
37
* An active Azure subscription.
38
-
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
38
+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
39
39
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
40
40
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
41
41
* You need *global administrator* privileges in your Azure AD tenant to enable Azure AD DS.
@@ -88,7 +88,7 @@ Complete the fields in the *Basics* window of the Azure portal to create an Azur
88
88
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
89
89
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
90
90
91
-
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
91
+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there's a minimum of three separate zones in all enabled regions.
92
92
93
93
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
0 commit comments