Creating managed Azure AD Domain Services in Azure and adding a machine to that domain


Azure AD Domain Services is a PaaS offering in Azure that can either extend your on-premises Active Directory infrastructure or creating an entirely new Active directory domain services environment to manage user and device identities.

Azure AD Domain services can work hand in hand with Azure AD to extend management capabilities in Azure. It can also be in standalone mode.

To get started with Azure AD DS, you need to set up an Azure virtual network and a subnet within that virtual network.

Next, we start creating a new Azure AD Domain Services instance. I have selected the Enterprise SKU and forest type of resource because I want to take advantage of features such as creating forest trusts in the future. These kinds of features are not available in the Standard SKU. Next, attach it to your virtual network and then select the subnet.

Dis regard the subnet in this image and use your own subnet

Next, select the group membership and add your existent Global administrator to act as the Active Directory Domain services administrator.

Next, scope out all, then, take note of the settings that can't change after creating this instance and then click create.

This operation can take  45 minutes to an hour to complete.

Part Two

In the next part, we will join a new Windows server VM to our new Active directory domain services server. To accomplish this, we shall configure the following settings.

Browse to our service and configure the DNS settings such that the DNS Servers of our VNet on which the domain service is, are configured with the private IP Addresses of our domain service.

You can confirm the change by checking the DNS settings of the VNet, which changed from Azure-provided DNS to Custom.

Next, connect your Windows server 2016 VM to the same VNet that your Azure ADDS is and then log into the VM to add it to the domain.

Now this will fail because of the reason that Azure ADDS doesn't support the legacy password hashes that are supported on On-Premises Active directory environment and Azure AD using Azure AD Connect.

And you can see an error thrown as above. The way around this is by regenerating a user password in Azure AD such that it's supported by our new Instance of Azure ADDS.

After changing the password in Azure AD, you can successfully join the computer to the domain, and that means we can always log into that machine using the Azure AD credentials.