AZ 800 STUDY GUIDE

Lab answer key: Implementing integration between AD DS and Microsoft Entra ID

Note: An interactive lab simulation is available that allows you to click through this lab at your own pace. You may find slight differences between the interactive simulation and the hosted lab, but the core concepts and ideas being demonstrated are the same.

Lab Setup

  1. Connect to SEA-ADM1 and, if needed, sign in as CONTOSO\Administrator with a password of Pa55w.rd.
  2. On SEA-ADM1, start Microsoft Edge, browse to the Azure portal, and authenticate with your Azure credentials.
  3. In the Azure portal, browse to Microsoft Entra ID.
  4. In the overview, select Manage Tenants and then select + Create.
  5. Microsoft Entra ID should be selected and then select Next:Configuration.
  6. In Organization name, enter a unique name, for example Contoso Organization.
  7. In Initial domain name, enter a unique name, for example Contoso35501731.
  8. Select Review + Create and then select Create.

    Note: Complete the Captcha, click Submit, and wait for the tenant creation to finish.

  9. In the notifications, select the created tenant in the message: Tenant creation was successful. Click here to navigate to your new tenant:(tenant link here)

Exercise 1: Preparing Microsoft Entra ID for AD DS integration

Task 1: Create a custom domain in Azure

  1. Connect to SEA-ADM1 and, if needed, sign in as CONTOSO\Administrator with a password of Pa55w.rd.
  2. On SEA-ADM1, start Microsoft Edge, browse to the Azure portal, and authenticate with your Azure credentials.
  3. In the Azure portal, browse to Microsoft Entra ID.
  4. On the Microsoft Entra ID page, select Custom domain names.
  5. On the Custom domain names page, select Add custom domain.
  6. In the Custom domain name pane, in the Custom domain name text box, enter contoso.com, and then select Add domain.
  7. On the contoso.com custom domain name page, review the Domain Name System (DNS) record types that you would use to verify the domain.
  8. Close the pane without verifying the domain name.

    Note: While, in general, you would use DNS records to verify a domain, this lab doesn’t require the use of a verified domain.

Task 2: Create a user with the Global Administrator role

  1. On SEA-ADM1, on the Microsoft Entra ID page in the Azure portal, select Users.
  2. On the All Users page, select + New User, from drop-down list select Create new user.
  3. On the Create new user page, under Identity, in the User principal name and Display name text boxes, enter admin.

    Note: Ensure the domain name drop-down menu for the User principal nam lists the default domain name ending with onmicrosoft.com.

  4. In the Password, select the Copy icon, and record the password as you’ll use it later in this lab.
  5. Select Next: Properties >.
  6. On the Properties tab, in the Usage location select United States, and then select Next: Assignments >.
  7. On the Assignments tab, select + Add role, and in the list of Directory roles, select Global administrator and then select the Select button.
  8. On the New user page, select Review + create, and then select Create.

Task 3: Change the password for the user with the Global Administrator role

  1. On the Azure portal, select your user account, and then select Sign out.
  2. On the Pick an account page, select Use another account.
  3. On the Sign in page, enter the fully-qualified username of the user account you previously created, and then select Next.
  4. For the current password, use the password that you wrote down in the previous step.
  5. Enter a complex password twice, and then select Sign in.

    Note: Record the complex password you used as you’ll use it later in this lab.

Exercise 2: Preparing on-premises AD DS for Microsoft Entra ID integration

Task 1: Install IdFix

  1. On SEA-ADM1, open Microsoft Edge, and then browse to https://github.com/microsoft/idfix.
  2. On the Github page, under ClickOnce Launch, select launch.
  3. On the status bar, select Open file.
  4. In the Application Install – Security Warning dialog box, select Install.
  5. In the IdFix Privacy Statement dialog box, review the disclaimer, and then select OK.

Task 2: Run IdFix

  1. In the IdFix window, select Query.
  2. If presented with the Schema Warning dialog box, select Yes.
  3. Review the list of objects from Active Directory, and observe the ERROR and ATTRIBUTE columns. In this scenario, the value of displayName for ContosoAdmin is blank, and the tool’s recommended new value appears in the UPDATE column.
  4. In the IdFix window, from the ACTION drop-down menu, select Edit, and then select Apply to automatically implement the recommended changes.
  5. In the Apply Pending dialog box, select Yes.
  6. Close the IdFix tool.

Exercise 3: Downloading, installing, and configuring Microsoft Entra Connect

Task 1: Install and configure Microsoft Entra Connect

Note: When you download the Microsoft Entra Connect application, the application still displays the older name, Azure AD Connect.

  1. On SEA-ADM1, in the Microsoft Edge window displaying the Azure portal, browse to Microsoft Entra ID.
  2. On the Microsoft Entra ID page, select Microsoft Entra Connect.
  3. On the **Microsoft Entra ConnectGet started** page, select Connect Sync.
  4. On the **Microsoft Entra ConnectConnect Sync** page, select Download Microsoft Entra Connect.
  5. On the newly opened page, under Azure AD Connect V2, select Download.
  6. On the status bar, select Open file.
  7. On the Microsoft Azure Active Directory Connect page, select the I agree to the license terms and privacy notice checkbox, and then select Continue.
  8. On the Express Settings page, select Use express settings.
  9. On the Connect to Azure AD page, enter the username and password of the Azure AD Global Administrator user account you created in exercise 1, and then select Next.
  10. In the Sign-in to your account page, sign-in with the newly created user, and then select Next.
  11. On the Connect to AD DS page, enter the following credentials, and then select Next:
    • Username: CONTOSO\Administrator
    • Password: Pa55w.rd
  12. On the Azure AD sign-in configuration page, note that the new domain you added is in the list of Active Directory UPN Suffixes, but its status is listed as Not verified.

    Note: The domain name provided does not have to be a verified domain. While you typically would verify a domain prior to installing Microsoft Entra Connect, this lab doesn’t require that verification step.

  13. Select the Continue without matching all UPN suffixes to verified domains checkbox, and then select Next.
  14. On the Ready to configure page, review the list of actions, and then select Install.
  15. On the Configuration complete page, select Exit.

Exercise 4: Verifying integration between AD DS and Microsoft Entra ID

Task 1: Verify synchronization in the Azure portal

  1. On SEA-ADM1, switch to the Microsoft Edge window displaying the Azure portal.
  2. Refresh the Microsoft Entra Connect page and review the information under Provision from Active Directory.
  3. On the Microsoft Entra ID page, select Users.
  4. Note that the user list includes users synced from Active Directory.

    Note: After the directory synchronization starts, it can take 15 minutes for Active Directory objects to appear in the Microsoft Entra ID portal.

  5. In Microsoft Edge, go back to the Microsoft Entra ID page.
  6. On the Microsoft Entra ID page, select Groups.
  7. Note the list of groups synced from Active Directory.

Task 2: Update a user account in Active Directory

  1. On SEA-ADM1, in Server Manager, on the Tools menu, select Active Directory Users and Computers.
  2. In Active Directory Users and Computers, expand the Sales organizational unit (OU), and then open the properties for Sumesh Rajan.
  3. In the properties of the user, select the Organization tab.
  4. In the Job Title text box, enter Manager, and then select OK.

Task 3: Create a user account in Active Directory

  1. In Active Directory Users and Computers, right-click or access the context menu for the Sales OU, select New, and then select User.
  2. In the New Object – User window, enter the following user details for each field, and then select Next:
    • First name: Jordan
    • Last name: Mitchell
    • User logon name: Jordan
  3. In the Password and Confirm password fields, enter Pa55w.rd, and then select Next.
  4. Select Finish.

Task 4: Sync changes to Microsoft Entra ID

  1. On SEA-ADM1, on the Start menu, select Windows PowerShell.
  2. In the Windows PowerShell console, enter the following command, and then press Enter to trigger synchronization:
    Code
    Start-ADSyncSyncCycle
    

    Note: Once the synchronization cycle starts, it can take 15 minutes for Active Directory objects to appear in the Microsoft Entra ID portal.

Task 5: Verify changes in Microsoft Entra ID

  1. On SEA-ADM1, switch to the Microsoft Edge window displaying the Azure portal and go back to the Microsoft Entra ID page.
  2. On the Microsoft Entra ID page, select Users.
  3. On the All Users page, search for the user Sumesh.
  4. Open the properties page of the user Sumesh Rajan, and then verify that the Job title attribute has been synced from Active Directory.
  5. In Microsoft Edge, go back to the All Users page.
  6. On the All Users page, search for the user Jordan.
  7. Open the properties page of the user Jordan Mitchell and review the attributes of the user account that was synced from Active Directory.

Exercise 5: Implementing Microsoft Entra ID integration features in AD DS

Task 1: Enable self-service password reset in Azure

  1. On SEA-ADM1, in the Microsoft Edge window displaying the Azure portal, browse to the Microsoft Entra ID page.
  2. On the Microsoft Entra ID page, select Licenses.
  3. On the Licenses page, select All products.
  4. On the All products page, select + Try/Buy.
  5. On the Activate page, under Microsoft Entra ID P2, select Free trial, and then select Activate.
  6. Browse to the All products page and select Microsoft Entra ID P2.
  7. On the Microsoft Entra ID P2 | Licensed users page, select + Assign.
  8. On the Assign license page, select + Add users and groups.
  9. On the Add users and groups page, search for admin, select the admin account from the list of results, and then select Select.
  10. Back on the Assign license page, select Review + assign, and then select Assign.

    Note: This is necessary in order to implement Microsoft Entra ID password protection later in this lab.

  11. Go back to the Microsoft Entra ID page.
  12. On the Microsoft Entra ID page, select Password reset.
  13. On the Password reset page, note that you can select the scope of users to which to apply the configuration.

    Note: Don’t enable the password reset feature because it will break the configuration steps that are required later in this lab.

Task 2: Enable password writeback in Microsoft Entra Connect

  1. On SEA-ADM1, on the Start menu, search and select Azure Ad Connect.
  2. In the Microsoft Azure Active Directory Connect window, select Configure.
  3. On the Additional tasks page, select Customize synchronization options, and then select Next.
  4. On the Connect to Azure AD page, enter the username and password of the Azure AD Global Administrator user account you created in exercise 1, and then select Next.
  5. On the Connect your directories page, select Next.
  6. On the Domain and OU filtering page, select Next.
  7. On the Optional features page, select Password writeback, and then select Next.

    Note: Password writeback is required for self-service password reset of Active Directory users. This allows passwords changed by users in Microsoft Entra ID to sync to the Active Directory.

  8. On the Ready to configure page, review the list of actions to be performed, and then select Configure.
  9. On the Configuration complete page, select Exit.

Task 3: Enable pass-through authentication in Microsoft Entra Connect

  1. On SEA-ADM1, on the Start menu, search and select Azure Ad Connect.
  2. In the Microsoft Azure Active Directory Connect window, select Configure.
  3. On the Additional tasks page, select Change user sign-in, then select Next.
  4. On the Connect to Azure AD page, enter the username and password of the Azure AD Global Administrator user account you created in exercise 1, and then select Next.
  5. On the User sign-in page, select Pass-through authentication.
  6. Verify that the Enable single sign-on checkbox is selected, and then select Next.
  7. On the Enable single sign-on page, select Enter credentials.
  8. In the Forest credentials dialog box, enter the following credentials, and then select OK:
    • Username: Administrator
    • Password: Pa55w.rd
  9. On the Enable single sign-on page, verify that there’s a green check mark next to Enter credentials, and then select Next.
  10. On the Ready to configure page, review the list of actions to be performed, and then select Configure.
  11. On the Configuration complete page, select Exit.

Task 4: Verify pass-through authentication in Azure

  1. On SEA-ADM1, switch to the Microsoft Edge window displaying the Azure portal and go back to the Microsoft Entra ID page.
  2. On the Microsoft Entra ID page in the Azure portal, select Microsoft Entra Connect.
  3. On the **Microsoft Entra ConnectGet started** page, select Connect Sync.
  4. On the **Microsoft Entra ConnectConnect Sync** page, review the information under User Sign-In.
  5. Under User Sign-In, select Seamless single sign-on.
  6. On the Seamless single sign-on page, note the on-premises domain name.
  7. In Microsoft Edge, go back to the Microsoft Entra Connect page.
  8. On the Microsoft Entra Connect page, under User Sign-In, select Pass-through authentication.
  9. On the Passthrough Authentication page, note the SEA-ADM1 server name under Authentication Agent.

    Note: To install the Microsoft Entra ID Authentication Agent on multiple servers in your environment, you can download its binaries from the Pass-through authentication page in the Azure portal.

Task 5: Install and register the Azure AD Password Protection proxy service and DC agent

  1. On SEA-ADM1, start Microsoft Edge, go to the https://www.microsoft.com/en-us/download/details.aspx?id=57071.
  2. On the Azure AD Password Protection page, select Download.
  3. On the Choose the download you want page, select the AzureADPasswordProtectionProxySetup.exe and the AzureADPasswordProtectionDCAgentSetup.msi files, and then select Download.
  4. In the Download multiple files dialog box, select Allow.

    Note: We recommend installing the proxy service on a server that isn’t a domain controller. In addition, the proxy service should not be installed on the same server as the Microsoft Entra Connect agent. You will install the proxy service on SEA-SVR1 and the Password Protection DC Agent on SEA-DC1.

  5. On SEA-ADM1, switch to the Windows PowerShell console window.
  6. In the Windows PowerShell console, enter the following command, and then press Enter to remove the Zone.Identifier alternate data stream indicating that files have been downloaded from internet:
    Code
    Get-ChildItem -Path "$env:USERPROFILE\Downloads" -File | Unblock-File
    
  7. Run the following commands to create the C:\Temp directory on SEA-SVR1, copy the AzureADPasswordProtectionProxySetup.exe installer to that directory, and then invoke the installation:
    Code
    New-Item -Type Directory -Path '\\SEA-SVR1.contoso.com\C$\Temp' -Force
    Copy-Item -Path "$env:USERPROFILE\Downloads\AzureADPasswordProtectionProxySetup.exe" -Destination '\\SEA-SVR1.contoso.com\C$\Temp\'
    Invoke-Command -ComputerName SEA-SVR1.contoso.com -ScriptBlock { Start-Process -FilePath C:\Temp\AzureADPasswordProtectionProxySetup.exe -ArgumentList '/quiet /log C:\Temp\AzureADPPProxyInstall.log' -Wait }
    
  8. Run the following commands to create the C:\Temp directory on SEA-DC1, copy the AzureADPasswordProtectionDCAgentSetup.msi installer to that directory, invoke the installation, and restart the domain controller after the installation completes:
    Code
    New-Item -Type Directory -Path '\\SEA-DC1.contoso.com\C$\Temp' -Force
    Copy-Item -Path "$env:USERPROFILE\Downloads\AzureADPasswordProtectionDCAgentSetup.msi" -Destination '\\SEA-DC1.contoso.com\C$\Temp\'
    Invoke-Command -ComputerName SEA-DC1.contoso.com -ScriptBlock { Start-Process msiexec.exe -ArgumentList '/i C:\Temp\AzureADPasswordProtectionDCAgentSetup.msi /quiet /qn /norestart /log C:\Temp\AzureADPPInstall.log' -Wait }
    Restart-Computer -ComputerName SEA-DC1.contoso.com -Force
    
  9. Run the following commands to validate that the installations resulted in the creation of services necessary to implement Azure AD Password Protection:
    Code
    Get-Service -Computer SEA-SVR1 -Name AzureADPasswordProtectionProxy | fl
    Get-Service -Computer SEA-DC1 -Name AzureADPasswordProtectionDCAgent | fl
    

    Note: Verify that each service has the Running status.

  10. In the Windows PowerShell console, enter the following command and press Enter to start a PowerShell Remoting session to SEA-SVR1:
    Code
    Enter-PSSession -ComputerName SEA-SVR1
    
  11. From the [SEA-SVR1] prompt, enter the following command and press Enter to register the proxy service with Active Directory (replace the <Azure_AD_Global_Admin> placeholder with the fully-qualified user principal name of the AD Global Administrator account you created in exercise 1):
    Code
    Register-AzureADPasswordProtectionProxy -AccountUpn <Azure_AD_Global_Admin> -AuthenticateUsingDeviceCode
    
  12. As instructed, open another Microsoft Edge window, browse to https://microsoft.com/devicelogin and when prompted, enter the code included in the message displayed in the PowerShell Remoting session.
  13. When prompted, authenticate by using the Azure AD Global Administrator user account you created in exercise 1, and then select Continue.
  14. Switch back to the PowerShell Remoting session, enter the following command and press Enter to exit the PowerShell Remoting session to SEA-SVR1:
    Code
    Exit-PSsession
    
  15. In the Windows PowerShell console, enter the following command and press Enter to start a PowerShell Remoting session to SEA-DC1:
    Code
    Enter-PSSession -ComputerName SEA-DC1
    
  16. From the [SEA-DC1] prompt, enter the following command and press Enter to register the proxy service with Active Directory (replace the <Azure_AD_Global_Admin> placeholder with the fully-qualified user principal name of the Azure AD Global Administrator user account you created in exercise 1):
    Code
    Register-AzureADPasswordProtectionForest -AccountUpn <Azure_AD_Global_Admin> -AuthenticateUsingDeviceCode
    
  17. As instructed, open another Microsoft Edge window, browse to https://microsoft.com/devicelogin and when prompted, enter the code included in the message displayed in the PowerShell Remoting session.
  18. When prompted, authenticate by using the Microsoft Entra ID Global Administrator user account you created in exercise 1, and then select Continue.
  19. Switch back to the PowerShell Remoting session, enter the following command, and then press Enter to exit the PowerShell Remoting session to SEA-DC1:
    Code
    Exit-PSsession
    

Task 6: Enable password protection in Azure

  1. On SEA-ADM1, switch to the Microsoft Edge window displaying the Azure portal, go back to the Microsoft Entra ID page.
  2. On the Microsoft Entra ID page, select Security.
  3. On the Security page, select Authentication methods.
  4. On the Authentication methods page, select Password protection.
  5. On the Password protection page, change the Enforce custom list to Yes.
  6. In the Custom banned password list text box, enter the following words (one per line):
    • Contoso
    • London

    Note: The list of banned passwords should be words that are relevant to your organization.

  7. Verify that the Enable password protection on Windows Server Active Directory is set to Yes.
  8. Verify that the Mode is set to Audit, and then select Save.

Exercise 6: Cleaning up

Task 1: Uninstall Azure AD Connect

  1. On SEA-ADM1, on the Start menu, select Control Panel.
  2. In the Control Panel window, under Programs, select Uninstall a program.
  3. In the Uninstall or change a program window, select Azure AD Connect, and then select Uninstall.
  4. In the Programs and features dialog box, select Yes.
  5. In the Uninstall Azure AD Connect window, select Remove.
  6. After Azure AD Connect is uninstalled, in the Uninstall Azure AD Connect window, select Exit.

Task 2: Disable directory synchronization in Azure

  1. On SEA-ADM1, switch to the Windows PowerShell console window.
  2. In the Windows PowerShell console, enter the following command and press Enter to install the Microsoft Online module for Microsoft Entra ID:
    Code
    Install-Module -Name MSOnline
    
  3. When prompted to install the NuGet provider, enter Y, and then press Enter.
  4. When prompted to install the modules from an untrusted repository, enter A, and then press Enter.
  5. In the Windows PowerShell console, enter the following command, and then press Enter to store Azure AD credentials in a variable:
    Code
    $msolCred = Get-Credential
    
  6. In the Windows PowerShell credential request dialog box, enter the credentials of the Azure AD Global Administrator user account you created in exercise 1, and then select OK.
  7. In the Windows PowerShell console, enter the following command, and then press Enter to authenticate to the Microsoft Entra tenant:
    Code
    Connect-MsolService -Credential $msolCred
    
  8. Enter the following command and press Enter to disable directory synchronization:
    Code
    Set-MsolDirSyncEnabled -EnableDirSync $false
    
  9. When prompted to confirm, enter Y, and then press Enter.

Leave A Comment

Certifs IT Library

Explore our comprehensive web library to Find a wealth of invaluable resources, including extensive documentation and hands-on labs.

Inscription ouverte pour la formation Vmware VCP-DCV 2024
Mai 2024