Forum Discussion
BlairMuller
Oct 11, 2023Copper Contributor
Kerberos Realm Domain Trust setup between the two domains - Authenticate automatically
We’ve established an Azure Virtual Desktop environment for our client ClientDomain Transport using AADDS: Joined to: aadds.ClientDomain.com.au UPN Suffix: ClientDomain.com.au UPN (pre-Windows 2000...
LeonPavesic
Oct 11, 2023Silver Contributor
Hi BlairMuller,
To allow AADDS users to authenticate with AD DS resources automatically, you need to configure the following:
- Kerberos realm trust: Make sure that the two domains are configured to trust each other, and that the trust relationship is bidirectional.
- SPNs: Register the SPNs for the AD DS resources that the AADDS users need to access.
- Permissions: Make sure that the AADDS users have the appropriate permissions on the AD DS resources.
- UPN suffix: Make sure that the AADDS users are using the UPN suffix of the AADDS domain when they authenticate to the AD DS resources.
Here are some additional tips for troubleshooting authentication issues between AADDS and AD DS:
- Make sure that the time and date are synchronized between the two domains.
- Make sure that the DNS servers are configured correctly.
- Make sure that the firewall is not blocking any necessary traffic.
Here are some useful links to this issue:
- Troubleshooting sign in problems in Microsoft Entra Domain Services: https://learn.microsoft.com/en-us/entra/identity/domain-services/troubleshoot-sign-in
- How to enable Azure AD DS authentication for your Azure File Shares: https://learn.microsoft.com/en-us/azure/storage/files/storage-files-identity-ad-ds-enable
- Techniques to troubleshoot Active Directory issues: https://www.techtarget.com/searchwindowsserver/tip/Techniques-to-troubleshoot-Active-Directory-issues
Please click Mark as Best Response & Like if my post helped you to solve your issue.
This will help others to find the correct solution easily. It also closes the item.
If the post was useful in other ways, please consider giving it Like.
Kindest regards,
Leon Pavesic
(LinkedIn)