Skip to content

Instantly share code, notes, and snippets.

@jikuja
Created October 14, 2021 11:28
Show Gist options
  • Save jikuja/f4b5bbba9e34a18f8687a7399a82a02f to your computer and use it in GitHub Desktop.
Save jikuja/f4b5bbba9e34a18f8687a7399a82a02f to your computer and use it in GitHub Desktop.
Azure VM, Azure Virtual Desktop, domain, auth with Azure AD accounts

AD DS

  • Password hashes generated after AD DS creation
  • Synchronized credential information in Azure AD can't be re-used if you later create a managed domain - you must reconfigure the password hash synchronization to store the password hashes again. Previously domain-joined VMs or users won't be able to immediately authenticate - Azure AD needs to generate and store the password hashes in the new managed domain.
  • Azure AD Connect vs Azure AD Connect Cloud Sync
  • https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-password-hash-synchronization#password-hash-sync-process-for-azure-ad-domain-services
  • The steps to generate and store these password hashes are different for cloud-only user accounts created in Azure AD versus user accounts that are synchronized from your on-premises directory using Azure AD Connect.
  • Scoped synchronozation
    • By groups
  • Cipher selection
    • What is needed for VM or AVD?
  • Pricing
    • TODO
  • Only one Azure AD DS per directory

Network

Azure VM

  • To secure remote access to virtual machines (VMs) that run in an Azure Active Directory Domain Services (Azure AD DS) managed domain, you can use Remote Desktop Services (RDS) and Network Policy Server (NPS).
    • RD Connection Broker server, RD Web Access server, and RD Gateway server.
    • RD Session Host server.
  • Bastion host
    • Works on one Vnet only
    • 117 - 178 € / month + 0.0734 € / outbound gigabyte
  • JIT

Azure VM with Azure login

Not feasible:

When login with corrent credential/OS X (caused by unauthrized client)

Unable to connect We couldn't connect to the remote PC because your credentials did not work. The remote machine is AAD joined. If you are using your work account you must disable Network Level Authentication on the remote machine. If you are using a local account, verify your username and password. Error code: 0x2607

Azure VM with Azure AD DS

  • AD join is OS setting
  • Azure AD DS must exist on same VNet or peering must exists. Domain must be found with VNet DNS
  • Adding Admins, Users and RDP Users from Azure AD still must be handled manually

Azure Virtual Destop

  • License requirement
    • Windows 10 Enterprise multi-session or Windows 10 Enterprise Microsoft 365 E3, E5, A3, A5, F3, Business Premium Windows E3, E5, A3, A5
    • Windows Server 2012 R2, 2016, 2019 RDS Client Access License (CAL) with Software Assurance
  • A Windows Server Active Directory in sync with Azure Active Directory. You can configure this using Azure AD Connect (for hybrid organizations) or Azure AD Domain Services (for hybrid or cloud organizations).
    • A Windows Server AD in sync with Azure Active Directory. User is sourced from Windows Server AD and the Azure Virtual Desktop VM is joined to Azure AD Domain Services domain.
    • An Azure AD Domain Services domain. User is sourced from Azure Active Directory, and the Azure Virtual Desktop VM is joined to Azure AD Domain Services domain.
  • The user must be sourced from the same Active Directory that's connected to Azure AD. Azure Virtual Desktop does not support B2B or MSA accounts.
  • The Azure virtual machines you create for Azure Virtual Desktop must be:
    • Standard domain-joined or Hybrid AD-joined. Azure AD-joined virtual machines are available in preview.
  • https://docs.microsoft.com/en-us/azure/virtual-desktop/overview#supported-virtual-machine-os-images
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment