Skip to main content

Joining Windows 10 to Azure AD Domain

As of October 2016 to join Windows 10 computers to Azure AD Domain service requires these steps:


  • When completed the IP address will be populated
  • Go back to the VNET configuration and add a DNS server with the IP (10.0.0.4 in this case)
  • Create the "AAD DC Administrator" administrators group (again in Directory -> Group). Members of this group are granted administrative privileges on machines that are domain-joined to the Azure AD Domain Services managed domain.
  • Add to the group your users who are supposed to have the administrative access
  • on a Windows 10 computer go to Settings -> Accounts (this is true for Windows 10 version  1607)
  • then select 'Access work or school' and click on Connect
  • On the next screen click on "Join this device to Azure Active Directory"

  • Enter your email address (from Azure AD user) and password

  • Click 'Sign In" 

  • and then 'Join"
  • and you're done!

Now to connect to the VM running Windows 10 a couple of changes required.
  • Disable 'Network Level Authentication' on the Windows 10 computer (clear the checkbox below)
  • In the RDP file add these two lines

                             enablecredsspsupport:i:0

             authentication level:i:2


  • Now log into the Windows 10 VM with Azure credentials using this format
AzureAD\<your email address>


                                  




If you have Office 365 subscription when you can access it without being prompted for credentials (true SSO experience)





Comments

  1. As I website owner I think the subject material here is real wonderful, appreciate windows 10 activator for your efforts.

    ReplyDelete

Post a Comment

Popular posts from this blog

Create 3-Node Windows 2012 Multi-subnet Cluster

Environment There are two Data centers connected via a WAN link. Two Windows 2012 Servers (called SQLDEV1 and SQLDEV2) are located in the Primary Data Center (on the IP subnet 192.168.79.0/24) and the third server is placed in the Secondary Data Center with the 192.168.69.0/24 subnet. We’ll be creating a three-node Windows cluster with no shared storage on the multi subnet network with a file share witness at the Primary Data Center. We’ll be using a file share witness to protect from the cluster failure in a situation when the network between the Data Centers is unavailable and one of the servers in the Primary Data Center is also down (or being rebooted). The final state will look like depicted above: -           Two Virtual IP’s will be assigned (192.168.76.218 and 192.168.69.134) to the cluster -           The servers at the Primary Data Center will have a vote (Vote=1) and the ...

SQL 2012 AlwaysOn: Synchronous vs. Asynchronous commit. Performance impact

Recently I've had a chance to build a 3-server AlwaysOn environment distributed between the primary and secondary data centers. The configuration looks like this: Primary Data Center                         Secondary Data Center                        SQLDEV1                                        SQLDEV3          SQLDEV2 The availability group was crated with synchronous commit replicas on SQLDEV1 and SQLDEV2 and the replica on SQLDEV3 was configured for asynchronous commit. The link between the data centers was not great and when I pinged SQLDEV3 from SQLDEV1 I got these results Approximate round trip times in milli-seconds:     Minimum = 39ms, Maximum = 63ms, Average = 42ms I also created a very simp...