The #1 reason customers email (and tweet and in-message) me is to ask us to add support for Azure Resource Manager based virtual networks to Azure AD Domain Services.
So I'm excited to announce the public preview of Azure AD Domain Services support for virtual networks created using the Azure Resource Manager deployment model . You can now create new managed AD domains in virtual networks that were provisioned using Azure Resource Manager. This public preview release makes deployment of Azure AD Domain Services much easier for you!
If you follow the blog, you already know that Azure AD Domain Services is pretty cool. It provides managed AD domain services like domain join, group policy, LDAP, and Kerberos/NTLM authentication, and all those services are fully compatible with Windows Server Active Directory.
Azure Resource Manager provides a consistent management layer for the tasks you perform through Azure PowerShell, Azure CLI, Azure portal, REST API, and development tools. Learn more about Azure Resource Manager. The resource manager deployment model is widely used across Azure and is now the preferred way to deploy new Azure workloads.
This new public preview lets you create a managed AD domain in a resource manager virtual network from the Azure portal. To do this, you'll use the brand-new wizard experience we previewed recently .
Here's how to get started with the preview:
Note: If you are using Azure AD Domain Services in a classic virtual network for production purposes, do not disable Azure AD Domain Services. You will lose state within the managed AD domain, such as domain joined computers, any custom OUs you've created, and objects within them. We will be supporting the migration process of existing managed AD domains from classic virtual networks to resource manager virtual networks later this year.
As always, your feedback is very important to us! Please share your comments, questions, or concerns on our discussion forum , send us an email at firstname.lastname@example.org , or comment below. We're listening!
Alex Simons (Twitter: @Alex_A_Simons )
Director of Program Management
Microsoft Identity Division
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.