You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-local/deploy/deployment-prep-active-directory.md
+30-20Lines changed: 30 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Prepare Active Directory for Azure Local, version 23H2 deployment
3
3
description: Learn how to prepare Active Directory before you deploy Azure Local, version 23H2.
4
4
author: alkohli
5
5
ms.topic: how-to
6
-
ms.date: 11/25/2024
6
+
ms.date: 02/05/2025
7
7
ms.author: alkohli
8
8
ms.reviewer: alkohli
9
9
ms.service: azure-local
@@ -24,17 +24,15 @@ Active Directory requirements for Azure Local include:
24
24
25
25
> [!NOTE]
26
26
> - You can use your existing process to meet the above requirements. The script used in this article is optional and is provided to simplify the preparation.
27
-
> - When group policy inheritance is blocked at the OU level, enforced GPO's aren't blocked. Ensure that any applicable GPO, which are enforced, are also blocked using other methods, for example, using [WMI Filters](https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/fun-with-wmi-filters-in-group-policy/ba-p/395648).
27
+
> - When group policy inheritance is blocked at the OU level, GPOs with enforced option enabled aren't blocked. If applicable, ensure that these GPOs are blocked using other methods, for example using a [Windows Management Instrumentation (WMI) Filter](https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/fun-with-wmi-filters-in-group-policy/ba-p/395648). Apply the WMI filter to any enforced GPOs, to exclude machine computer accounts for your Azure Local instances from applying the GPOs. Once the filter is applied, enforced GPOs won't apply, based on the logic defined in the WMI filter.
28
28
29
29
To manually assign the required permissions for Active Directory, create an OU, and block GPO inheritance, see
30
30
[Custom Active Directory configuration for your Azure Local, version 23H2](../plan/configure-custom-settings-active-directory.md).
31
31
32
32
## Prerequisites
33
33
34
-
Before you begin, make sure you've done the following:
35
-
36
-
- Satisfy the [prerequisites](./deployment-prerequisites.md) for new deployments of Azure Local.
37
-
-[Download and install the version 2402 module from the PowerShell Gallery](https://www.powershellgallery.com/packages/AsHciADArtifactsPreCreationTool/10.2402). Run the following command from the folder where the module is located:
34
+
- Complete the [prerequisites](./deployment-prerequisites.md) for new deployments of Azure Local.
35
+
- Install version 2402 of the ['AsHciADArtifactsPreCreationTool'](https://www.powershellgallery.com/packages/AsHciADArtifactsPreCreationTool/10.2402) module. Run the following command to install the module from PowerShell Gallery:
@@ -43,7 +41,7 @@ Before you begin, make sure you've done the following:
43
41
> [!NOTE]
44
42
> Make sure to uninstall any previous versions of the module before installing the new version.
45
43
46
-
- You have obtained permissions to create an OU. If you don't have permissions, contact your Active Directory administrator.
44
+
- You require permissions to create an OU. If you don't have permissions, contact your Active Directory administrator.
47
45
48
46
- If you have a firewall between your Azure Local system and Active Directory, ensure that the proper firewall rules are configured. For specific guidance, see [Firewall requirements for Active Directory Web Services and Active Directory Gateway Management Service](../concepts/firewall-requirements.md). See also [How to configure a firewall for Active Directory domains and trusts](/troubleshoot/windows-server/active-directory/config-firewall-for-ad-domains-and-trusts#windows-server-2008-and-later-versions).
49
47
@@ -53,13 +51,12 @@ The `New-HciAdObjectsPreCreation` cmdlet of the AsHciADArtifactsPreCreationTool
53
51
54
52
|Parameter|Description|
55
53
|--|--|
56
-
|`-AzureStackLCMUserCredential`|A new user object that is created with the appropriate permissions for deployment. This account is the same as the user account used by the Azure Stack HCI deployment.<br> Make sure that only the username is provided. The name should not include the domain name, for example, `contoso\username`.<br>The password must conform to the length and complexity requirements. Use a password that is at least 12 characters long. The password must also contain three out of the four requirements: a lowercase character, an uppercase character, a numeral, and a special character.<br>For more information, see [password complexity requirements](/azure/active-directory-b2c/password-complexity?pivots=b2c-user-flow).<br> The name cannot be exactly the same as the local admin user. <br> The name can use *admin* as the username.|
57
-
|`-AsHciOUName`|A new Organizational Unit (OU) to store all the objects for the Azure Stack HCI deployment. Existing group policies and inheritance are blocked in this OU to ensure there's no conflict of settings. The OU must be specified as the distinguished name (DN). For more information, see the format of [Distinguished Names](/previous-versions/windows/desktop/ldap/distinguished-names).|
58
-
54
+
|`-AzureStackLCMUserCredential`|A new user object that is created with the appropriate permissions for deployment. This account is the same as the user account used by the Azure Local deployment.<br> Make sure that only the username is provided. The name shouldn't include the domain name, for example, `contoso\username`.<br>The password must conform to the length and complexity requirements. Use a password that is at least 12 characters long. The password must also contain three out of the four requirements: a lowercase character, an uppercase character, a numeral, and a special character.<br>For more information, see [password complexity requirements](/azure/active-directory-b2c/password-complexity?pivots=b2c-user-flow).<br> The name can't be exactly the same as the local admin user. <br> The name can use *admin* as the username.|
55
+
|`-AsHciOUName`|A new Organizational Unit (OU) to store all the objects for the Azure Local deployment. Existing group policies and inheritance are blocked in this OU to ensure there's no conflict of settings. The OU must be specified as the distinguished name (DN). For more information, see the format of [Distinguished Names](/previous-versions/windows/desktop/ldap/distinguished-names).|
59
56
60
57
> [!NOTE]
61
58
> - The `-AsHciOUName` path doesn't support the following special characters anywhere within the path: `&,",',<,>`.
62
-
> - Moving the computer objects to a different OU after the deployment is complete is also not supported.
59
+
> - After the deployment is complete, moving the computer objects to a different OU isn't supported.
63
60
64
61
## Prepare Active Directory
65
62
@@ -75,30 +72,43 @@ To create a dedicated OU, follow these steps:
75
72
New-HciAdObjectsPreCreation -AzureStackLCMUserCredential (Get-Credential) -AsHciOUName "<OU name or distinguished name including the domain components>"
76
73
77
74
1. When prompted, provide the username and password for the deployment.
78
-
79
-
1. Make sure that only the username is provided. The name should not include the domain name, for example, `contoso\username`. **Username must be between 1 to 64 characters and only contain letters, numbers, hyphens, and underscores and may not start with a hyphen or number.**
80
-
1. Make sure that the password meets complexity and length requirements. **Use a password that is at least 12 characters long and contains: a lowercase character, an uppercase character, a numeral, and a special character.**
81
75
76
+
1. Make sure that only the username is provided. The name shouldn't include the domain name, for example, `contoso\username`. **Username must be between 1 to 64 characters and only contain letters, numbers, hyphens, and underscores and may not start with a hyphen or number.**
77
+
1. Make sure that the password meets complexity and length requirements. **Use a password that is at least 12 characters long and contains: a lowercase character, an uppercase character, a numeral, and a special character.**
82
78
83
-
Here is a sample output from a successful completion of the script:
79
+
Here's a sample output from a successful completion of the script:
1. Verify that the OU is created. If using a Windows Server client, go to **Server Manager > Tools > Active Directory Users and Computers**.
89
+
1. Verify that the OU is created. If using a Windows Server client, go to **Server Manager > Tools > Active Directory Users and Computers**.
94
90
95
-
1. An OU with the specified name should be created and within that OU, you'll see the deployment user.
91
+
1. An OU with the specified name is created. This OU contains the new LCM deployment user account.
96
92
97
93
:::image type="content" source="media/deployment-prep-active-directory/active-directory-11.png" alt-text="Screenshot of Active Directory Computers and Users window." lightbox="media/deployment-prep-active-directory/active-directory-11.png":::
98
94
99
-
100
95
> [!NOTE]
101
-
> If you are repairing a single machine, do not delete the existing OU. If the machine volumes are encrypted, deleting the OU removes the BitLocker recovery keys.
96
+
> If you're repairing a single machine, don't delete the existing OU. If the machine volumes are encrypted, deleting the OU removes the BitLocker recovery keys.
97
+
98
+
## Considerations for large scale deployments
99
+
100
+
The Lifecycle Manager (LCM) user account is utilized during Azure Local instance deployments that use Active Directory (AD), or for any add-node/repair operations for existing instances. The LCM user account is responsible for performing domain join actions, which necessitates the LCM user identity having delegated permissions to add computer accounts to the target Organizational Unit (OU) in the on-premises domain. During the deployment of Azure Local, the LCM user account is added to the local administrators' group of the physical machines.
101
+
102
+
To mitigate the risk of a compromised LCM user account credential, we advise that for each Azure Local instance, you have a dedicated LCM user account with a unique password.
103
+
104
+
We recommend that you follow these best practices for OU creation:
105
+
106
+
- For each Azure Local instance, create an individual OU within Active Directory. This approach helps manage computer account, CNO, LCM user account, and physical machine computer accounts within the scope of a single OU for each instance.
107
+
- When deploying multiple instances at-scale, for easier management:
108
+
- Create an OU under a single parent OU for each instance.
109
+
- Disable GPO inheritance at the parent OU level.
110
+
111
+
The preceding recommendations are automated, when you use the `New-HciAdObjectsPreCreation` cmdlet to [Prepare Active Directory](#active-directory-preparation-module).
This article describes how to manage GPU-P with Arc virtual machines (VMs) for Azure Local. For using GPU-P management on AKS enabled by Azure Arc, see [Use GPUs for compute-intensive workloads](/azure/aks/hybrid/deploy-gpu-node-pool#create-a-new-workload-cluster-with-a-gpu-enabled-node-pool).
16
-
17
-
GPU Partitioning (GPU-P) allows you to share a graphical processing unit (GPU) with multiple workloads by splitting the GPU into dedicated fractional partitions.
15
+
This article describes how to manage GPU-P with Arc virtual machines (VMs) for Azure Local. GPU Partitioning (GPU-P) allows you to share a graphical processing unit (GPU) with multiple workloads by splitting the GPU into dedicated fractional partitions.
18
16
19
17
> [!IMPORTANT]
20
18
> This feature is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -103,4 +101,4 @@ For more information on the GPU attach command, see [az stack-hci-vm gpu](/cli/a
103
101
104
102
## Next steps
105
103
106
-
-[Manage GPUs using Discrete Device Assignment](./gpu-manage-via-device.md)
104
+
-[Manage GPUs using Discrete Device Assignment](./gpu-manage-via-device.md)
0 commit comments