Active Directory, Azure

Creating an Azure AD Tenant and configuring AD Connect

Hey folks, welcome to the second part in this series of blog posts discussing Azure AD.

Part 1 can be found here – https://www.virtualmanc.co.uk/2019/12/27/active-directory-authentication-the-past-present-and-future/

In this post we will be creating an Azure AD Tenant and then installing AD Connect to perform a sync.  We will perform the following:

1) Create an Azure AD Tenant

2) Install AD Connect and perform a sync of our on-prem Active Directory domain

3) Verify that the objects have been synced

4) Test the logon

So lets begin.

Create the Azure AD Tenant

The first thing we need to do is actually create a new Azure AD Tenant.  This won’t actually cost anything so you can do this for free. All you need is an Azure account. 

1) To do this log into the Azure portal (https://portal.azure.com) and select “Create a resource” from the menu

image

2) Select Create to start the process

image

3) Enter the name of your Organization and also the domain name which you want to use. Note it says initial domain name, this can be changed to a custom domain name later if required.  You also need to enter the Country or region you are based from the drop down box.

Once you are happy with your select press Create.

image

You should now get a message saying the Directory is being created. This should take around 1-2 minutes.

image

And after a few minutes we should receive notification that the directory has been created successfully

image

And voila! We now have our brand new Azure AD Tenant.  We are now free to go and create users, groups, assign licenses etc.

image

Next up we will setup a sync with our on-prem Active Directory.

Install AD Connect and perform a sync of our on-prem Active Directory domain

So a Directory is pretty useless if it does not contain any users, groups or resources. If you are building a brand new infrastructure then you can go ahead and create users natively inside Azure AD. However, if you have an existing on-prem Active Directory domain we can import objects into Azure AD.  This is done using Azure AD Connect.

Note this does not have to be installed on a domain controller. It can be installed on any server running preferably Windows Server 2016 or Server 2019. 

1) Download Azure AD Connect

You can grab the install files from here  – https://www.microsoft.com/en-us/download/details.aspx?id=47594

image

2) Install AD Connect – once it has finished downloading run AzureADConnect.msi to begin the install

image

I just selected the Express Settings but if you need to change anything you can select the Custom install

image

3) Configure Azure AD Connect

We now need to tell the AD Connect the directory information of the source and destination.  You will need your Azure AD Global Administrator details and also your Enterprise Admin account details of the Active Directory domain you are syncing. 

If you are unsure of what account is your Global Administrator then you can check the Global Administrators group and it should tell you

image

Enter the Azure AD account details of the Global Administrator

image

Next enter the Account details of the Enterprise Administrator of your Active Directory domain

image

Now we need to configure the UPN suffixes.  If you have a custom domain configured then you would select it here. If you don’t (like me!) you can just tick the box at the bottom to continue.  It just means that all the user logon names will be the default directory name i.e. user1@virtualmanc.onmicrosoft.com

image

Once you are happy with all your selections press the Install button to continue.

It will run through the install process and you should see this message saying that Configuration is complete.

image

Verify that the objects have been synced

OK so now that we have completed the installation which performs a sync we need to verify that our objects have been replicated into Azure AD.   Here is what I have in my local Active Directory:

image

In the Azure Portal if you look at the Azure AD Connect tab you should see that the Sync Status is set to Enabled and a sync has been performed 

image

And here you can see the accounts.  Notice how the accounts synced from your on-prem Active Directory have the source set as Windows Server AD.  The accounts provisioned directly into Azure AD will have a source of Azure Active Directory

image

Testing the logon

So now that we have our on-prem accounts synced with Azure AD in theory we should be able to log into them from any device with an internet connection.  So lets give it a shot. Head over to https://portal.azure.com and sign in with the details of a synced account.  I used one of my Test users (testuser1@virtualmanc.onmicrosoft.com)

image

Enter the password for the account. Note this will be the password from your on-prem Active Directory, they are also migrated across. 

image

And voila! We have successfully logged into the Azure portal using our synced Azure AD account

image

I hope you enjoyed this post.  In the next post we will do something useful with our shiny new Azure AD Tenant. 

We can now use this for authentication for many different cloud services, VDI & DaaS solutions.  In the next post I will show an example of this.

Leave a Reply

Your email address will not be published. Required fields are marked *