Skip to content

This tutorial outlines the implementation of on-premises Active Directory within two Azure virtual machines.

Notifications You must be signed in to change notification settings

eddielaformjr/configure-ad

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 

Repository files navigation

Microsoft Active Directory Logo

On-Premises Active Directory Deployed in the Cloud (Azure)

This tutorial outlines the implementation of on-premises Active Directory within two Azure virtual machines.

Environments and Technologies Used

  • Microsoft Azure (Virtual Machines/Compute)
  • Remote Desktop
  • Active Directory Domain Services
  • PowerShell

Operating Systems Used

  • Windows Server 2022
  • Windows 10 (21H2)

Deployment and Configuration Steps

Step 1: Setup Resources in Azure

  • Create two virtual machines
    • If you need help creating your virtual machines, please see my tutorial here
    • The first virtual machine will be the Domain Controller
      • Name: DC-1
      • Image: Windows Server 2022
      • Take note of the virtual network (vNet) that is automatically created

Azure Free Account

- Set DC-1's Virtual Network Interface Card (vNIC) private IP address to be static
	- Go to DC-1's network settings
	- Select Networking
	- Select the link next to Network Interface
	- Select IP Configurations > ipconfig1
	- Change the assignment from dynamic to static 
		- This ensures DC-1's IP address will not change

Azure Free Account Azure Free Services Azure Free Services

- The second virtual machine will be the Client
	- Name: Client-1
	- Image: Windows 10 Pro
	- Use the same resource group and vNet as DC-1

Azure Free Account Azure Free Services

Step 2: Ensure Connectivity Between the Client and Domain Controller

  • Login to Client-1 using Microsoft Remote Desktop
  • Search for Command Prompt and open it
  • Ping DC-1's private IP Address (for example, 10.1.0.4)
    • Type "ping -t 10.1.0.4" into the command-line interface
    • The ping request continually times out due to the firewall settings
      • To fix this, we need to enable ICMPv4 on DC-1's local Windows firewall

Azure Free Account

  • Login to DC-1 using Microsoft Remote Desktop
    • Start > Windows Administrative Tools > Windows Defender Firewall with Advanced Security > Inbound Rules
    • Sort the list by protocols
    • Find "Core Networking Diagnostics" and "ICMPv4" and enable these two inbound rules

Azure Free Account Azure Free Services

  • Log back into Client-1 and the command line will automatically begin pinging DC-1 successfully

Azure Free Account

Step 3: Install Active Directory

  • Log back into DC-1
    • Open Server Manager
    • Select "Add Roles and Features" > Follow the prompts
    • At Server Roles, check "Active Directory Domain Services."
      • Ignore how the picture below already says "Installed"
    • Select Add Features > select Next
    • Complete the installation

Azure Free Account Azure Free Services

  • At the top right of the Server Manager Dashboard, click on the flag
  • Select "Promote This Server to a Domain Controller"

Azure Free Account

  • Select "Add a New Forest"
    • Root domain name: mydomain.com
  • Select Next
  • Create a password
  • Select Next and follow the prompts
  • Select Install to complete the installation

Azure Free Account

  • DC-1 will automatically restart
  • Log back into DC-1 as user: mydomain.com\labuser

Azure Free Account

Step 4: Create an Admin and Normal User Account in Active Directory v1.15.8

  • On DC-1, open Server Manager
  • Click Tools at the top-right of the screen
  • Select Active Directory Users and Computers

Azure Free Account

  • Right-click mydomain.com > New > Select Oranizational Unit (OU)
  • Create two OUs
    • Name the first "_EMPLOYEES"
    • Name the second "_ADMINS"

Azure Free Account

  • Right-click mydomain.com and click Referesh to sort the new organizational units to the top
  • Go to the _ADMINS OU
  • Right-click the name of the OU > New > User
    • First/Last name: Jane Doe
    • User login name: jane_admin
    • Select Next
    • Create a password
    • Uncheck all boxes
    • Select Next and then select Finish

Azure Free Account Azure Free Account

  • Go to the _ADMINS OU
  • Right-click Jane Doe > select Properties
    • Click the tab named "Member of" > select Add
    • Type in the names of your domain administrators
    • Select "Check Names" > OK > Apply
  • Log out of DC-1 as "labuser" and log back in as “mydomain.com\jane_admin”

Azure Free Account Azure Free Services

Step 5: Join Client-1 to your domain (mydomain.com)

  • Go back to the Azure portal
  • Navigate to the Client-1 Virtual Machine
  • On the left-hand side of the screen select Networking
  • Select the link next to the NIC > select DNS Server > Custom
  • Type in DC-1's private IP address
  • Click Save
  • After it is done updating, select Restart and select Yes

Azure Free Account Azure Free Services Azure Free Services

  • Log back into Client-1 using Microsoft Remote Desktop as the original local admin (labuser)
  • Right-click the Start menu and select System
  • On right-hand side of the screen, select Rename This PC (Advanced) > Change
  • Under "Member of," select Domain
  • Type "mydomain.com" and select OK
    • Username: mydomain.com\jane_admin
    • Type in password and press OK
  • Restart the computer

Azure Free Account Azure Free Services

Step 6: Setup Remote Desktop for non-administrative users on Client-1

  • Log back into Client-1
  • Use mydomain.com\jane_admin
  • Right-click the Start menu and select System
  • On the right-hand side of the screen, select Remote Desktop
  • Under User Accounts, click "Select Users That Can Remotely Access This PC > select Add
  • Type in the name of your domain users
  • Select "Check Names" > OK > OK

Azure Free Account Azure Free Services

Step 7: Create as many additional users as you would like and attempt to log into Client-1 with one of the users' profiles

  • Log back into DC-1 as jane_admin
  • Search for "Powershell_ise,"
  • Right-click on Powershell_ise and open it as an administrator
  • At the top-left of the screen select New Script and paste the contents of the following script into it
    • You can find the script here

Azure Free Account Azure Free Services

  • Click the green arrow button near the top-middle of the screen
    • This will run the script
  • Once the users have been created, go back to Active Directory Users and Computers > mydomain.com > _EMPLOYEES - You will see all the accounts that were created
  • You can now log into Client-1 with one of the accounts that were created
    • Try logging into Client-1 as user "base.milu" using the password "Password1"

Azure Free Account Azure Free Services Azure Free Services

Azure Free Account Azure Free Services

🎉Congratulations! You have implementated on-premises Active Directory and created users within an Azure virtual machine!🎉

About

This tutorial outlines the implementation of on-premises Active Directory within two Azure virtual machines.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published