Skip to content

Commit f89a378

Browse files
committed
[AzureADDS] Initial freshness updates and screenshots
1 parent 751cf36 commit f89a378

File tree

8 files changed

+23
-28
lines changed

8 files changed

+23
-28
lines changed

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/17/2019
13+
ms.date: 03/31/2020
1414
ms.author: iainfou
1515
---
1616

@@ -25,7 +25,7 @@ This article shows you how to create and join a Windows Server VM to an Azure AD
2525
To complete this tutorial, you need the following resources and privileges:
2626

2727
* An active Azure subscription.
28-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2929
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
-6.3 KB
Loading
-51 Bytes
Loading
-56 Bytes
Loading
-3.16 KB
Loading

articles/active-directory-domain-services/tutorial-create-forest-trust.md

Lines changed: 16 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 11/19/2019
12+
ms.date: 03/31/2020
1313
ms.author: iainfou
1414

1515
#Customer intent: As an identity administrator, I want to create a one-way outbound forest from an Azure Active Directory Domain Services resource forest to an on-premises Active Directory Domain Services forest to provide authentication and resource access between forests.
@@ -29,14 +29,14 @@ In this tutorial, you learn how to:
2929
> * Create a one-way outbound forest trust in Azure AD DS
3030
> * Test and validate the trust relationship for authentication and resource access
3131
32-
If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
32+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
3333

3434
## Prerequisites
3535

3636
To complete this tutorial, you need the following resources and privileges:
3737

3838
* An active Azure subscription.
39-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
39+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
4040
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
4141
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
4242
* An Azure Active Directory Domain Services managed domain created using a resource forest and configured in your Azure AD tenant.
@@ -57,7 +57,7 @@ Before you configure a forest trust in Azure AD DS, make sure your networking be
5757

5858
* Use private IP addresses. Don't rely on DHCP with dynamic IP address assignment.
5959
* Avoid overlapping IP address spaces to allow virtual network peering and routing to successfully communicate between Azure and on-premises.
60-
* An Azure virtual network needs a gateway subnet to configure a site-to-site (S2S) VPN or ExpressRoute connection
60+
* An Azure virtual network needs a gateway subnet to configure an [Azure site-to-site (S2S) VPN][vpn-gateway] or [ExpressRoute][expressroute] connection
6161
* Create subnets with enough IP addresses to support your scenario.
6262
* Make sure Azure AD DS has its own subnet, don't share this virtual network subnet with application VMs and services.
6363
* Peered virtual networks are NOT transitive.
@@ -72,7 +72,7 @@ To correctly resolve the Azure AD DS managed domain from the on-premises environ
7272
1. Select **Start | Administrative Tools | DNS**
7373
1. Right-select DNS server, such as *myAD01*, select **Properties**
7474
1. Choose **Forwarders**, then **Edit** to add additional forwarders.
75-
1. Add the IP addresses of the Azure AD DS managed domain, such as *10.0.1.4* and *10.0.1.5*.
75+
1. Add the IP addresses of the Azure AD DS managed domain, such as *10.0.2.4* and *10.0.2.5*.
7676

7777
## Create inbound forest trust in the on-premises domain
7878

@@ -83,10 +83,6 @@ To configure inbound trust on the on-premises AD DS domain, complete the followi
8383
1. Select **Start | Administrative Tools | Active Directory Domains and Trusts**
8484
1. Right-select domain, such as *onprem.contoso.com*, select **Properties**
8585
1. Choose **Trusts** tab, then **New Trust**
86-
87-
> [!NOTE]
88-
> If you don't see the **Trusts** menu option, check under **Properties** for the *Forest type*. Only *resource* forests can create trusts. If the forest type is *User*, you can't create trusts. There's currently no way to change the forest type of an Azure AD DS managed domain. You need to delete and recreate the managed domain as a resource forest.
89-
9086
1. Enter name on Azure AD DS domain name, such as *aaddscontoso.com*, then select **Next**
9187
1. Select the option to create a **Forest trust**, then to create a **One way: incoming** trust.
9288
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Azure portal for the Azure AD DS managed domain.
@@ -102,12 +98,16 @@ To create the outbound trust for the Azure AD DS managed domain in the Azure por
10298

10399
1. In the Azure portal, search for and select **Azure AD Domain Services**, then select your managed domain, such as *aaddscontoso.com*
104100
1. From the menu on the left-hand side of the Azure AD DS managed domain, select **Trusts**, then choose to **+ Add** a trust.
101+
102+
> [!NOTE]
103+
> If you don't see the **Trusts** menu option, check under **Properties** for the *Forest type*. Only *resource* forests can create trusts. If the forest type is *User*, you can't create trusts. There's currently no way to change the forest type of an Azure AD DS managed domain. You need to delete and recreate the managed domain as a resource forest.
104+
105105
1. Enter a display name that identifies your trust, then the on-premises trusted forest DNS name, such as *onprem.contoso.com*
106106
1. Provide the same trust password that was used when configuring the inbound forest trust for the on-premises AD DS domain in the previous section.
107-
1. Provide at least two DNS servers for the on-premises AD DS domain, such as *10.0.2.4* and *10.0.2.5*
107+
1. Provide at least two DNS servers for the on-premises AD DS domain, such as *10.1.1.4* and *10.1.1.5*
108108
1. When ready, **Save** the outbound forest trust
109109

110-
[Create outbound forest trust in the Azure portal](./media/create-forest-trust/portal-create-outbound-trust.png)
110+
![Create outbound forest trust in the Azure portal](./media/tutorial-create-forest-trust/portal-create-outbound-trust.png)
111111

112112
## Validate resource authentication
113113

@@ -124,18 +124,14 @@ The following common scenarios let you validate that forest trust correctly auth
124124

125125
You should have Windows Server virtual machine joined to the Azure AD DS resource domain. Use this virtual machine to test your on-premises user can authenticate on a virtual machine.
126126

127-
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using Remote Desktop and your Azure AD DS administrator credentials. If you get a Network Level Authentication (NLA) error, check the user account you used is not a domain user account.
128-
129-
> [!NOTE]
130-
> To securely connect to your VMs joined to Azure AD Domain Services, you can use the [Azure Bastion Host Service](https://docs.microsoft.com/azure/bastion/bastion-overview) in supported Azure regions.
131-
127+
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using [Azure Bastion](https://docs.microsoft.com/azure/bastion/bastion-overview) and your Azure AD DS administrator credentials.
132128
1. Open a command prompt and use the `whoami` command to show the distinguished name of the currently authenticated user:
133129

134130
```console
135131
whoami /fqdn
136132
```
137133

138-
1. Use the `runas` command to authenticate as a user from the on-premises domain. In the following command, replace `[email protected]` with the UPN of a user from the trusted on-premises domain. The command prompts you for the users password:
134+
1. Use the `runas` command to authenticate as a user from the on-premises domain. In the following command, replace `[email protected]` with the UPN of a user from the trusted on-premises domain. The command prompts you for the user's password:
139135

140136
```console
141137
Runas /u:[email protected] cmd.exe
@@ -150,10 +146,7 @@ Using the Windows Server VM joined to the Azure AD DS resource forest, you can t
150146

151147
#### Enable file and printer sharing
152148

153-
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using Remote Desktop and your Azure AD DS administrator credentials. If you get a Network Level Authentication (NLA) error, check the user account you used is not a domain user account.
154-
155-
> [!NOTE]
156-
> To securely connect to your VMs joined to Azure AD Domain Services, you can use the [Azure Bastion Host Service](https://docs.microsoft.com/azure/bastion/bastion-overview) in supported Azure regions.
149+
1. Connect to the Windows Server VM joined to the Azure AD DS resource forest using [Azure Bastion](https://docs.microsoft.com/azure/bastion/bastion-overview) and your Azure AD DS administrator credentials.
157150

158151
1. Open **Windows Settings**, then search for and select **Network and Sharing Center**.
159152
1. Choose the option for **Change advanced sharing** settings.
@@ -219,3 +212,5 @@ For more conceptual information about forest types in Azure AD DS, see [What are
219212
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
220213
[create-azure-ad-ds-instance-advanced]: tutorial-create-instance-advanced.md
221214
[howto-change-sku]: change-sku.md
215+
[vpn-gateway]: ../vpn-gateway/vpn-gateway-about-vpngateways.md
216+
[expressroute]: ../expressroute/expressroute-introduction.md

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 11/19/2019
11+
ms.date: 03/31/2020
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -18,7 +18,7 @@ ms.author: iainfou
1818

1919
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, LDAP, Kerberos/NTLM authentication that is fully compatible with Windows Server Active Directory. You consume these domain services without deploying, managing, and patching domain controllers yourself. Azure AD DS integrates with your existing Azure AD tenant. This integration lets users sign in using their corporate credentials, and you can use existing groups and user accounts to secure access to resources.
2020

21-
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows how to define those advanced configuration options to create and configure an Azure AD DS instance using the Azure portal.
21+
You can [create a managed domain using default configuration options][tutorial-create-instance] for networking and synchronization, or manually define these settings. This tutorial shows you how to define those advanced configuration options to create and configure an Azure AD DS instance using the Azure portal.
2222

2323
In this tutorial, you learn how to:
2424

@@ -28,14 +28,14 @@ In this tutorial, you learn how to:
2828
> * Add administrative users to domain management
2929
> * Enable password hash synchronization
3030
31-
If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
31+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
3232

3333
## Prerequisites
3434

3535
To complete this tutorial, you need the following resources and privileges:
3636

3737
* An active Azure subscription.
38-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
38+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3939
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
4040
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
4141
* You need *global administrator* privileges in your Azure AD tenant to enable Azure AD DS.
@@ -88,7 +88,7 @@ Complete the fields in the *Basics* window of the Azure portal to create an Azur
8888
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
8989
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
9090

91-
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, theres a minimum of three separate zones in all enabled regions.
91+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there's a minimum of three separate zones in all enabled regions.
9292

9393
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
9494

0 commit comments

Comments
 (0)