Lab - Implementing integration between AD DS and Microsoft Entra ID
Lab - Implementing integration between AD DS and Microsoft Entra ID
Scenario
Lab: Implementing integration between AD DS
Objectives and Microsoft Entra ID
Estimated time:
60 minutes Scenario
Lab setup To address concerns regarding management and monitoring overhead resulting from using Microsoft Entra ID to
authenticate and authorize access to Azure resources, you decide to test integration between on-premises Active
Exercise 1:
Preparing Directory Domain Services (AD DS) and Microsoft Entra ID to verify that this will address business concerns about
Microsoft Entra managing multiple user accounts by using a mix of on-premises and cloud resources.
ID for AD DS
integration
Additionally, you want to make sure that your approach addresses the Information Security team’s concerns and
Exercise 2: preserves existing controls applied to Active Directory users, such as sign-in hours and password policies. Finally,
Preparing on- you want to identify Microsoft Entra ID integration features that allow you to further enhance on-premises Active
premises AD DS
Directory security and minimize its management overhead, including Microsoft Entra ID Password Protection for
for Microsoft
Entra ID Windows Server Active Directory and Self-Service Password Reset (SSPR) with password writeback.
integration
Your goal is to implement pass-through authentication between on-premises AD DS and Microsoft Entra ID.
Exercise 3:
Downloading, Note: An interactive lab simulation is available that allows you to click through this lab at your own pace. You
installing, and
may find slight differences between the interactive simulation and the hosted lab, but the core concepts and
configuring
Microsoft Entra ideas being demonstrated are the same.
Connect
Exercise 4:
Verifying
Objectives
integration
between AD DS After completing this lab, you’ll be able to:
and Microsoft
Entra ID Prepare Microsoft Entra ID for integration with on-premises AD DS, including adding and verifying a
custom domain.
Exercise 5:
Prepare on-premises AD DS for integration with Microsoft Entra ID, including running IdFix DirSync Error
Implementing
Microsoft Entra Remediation Tool.
ID integration Install and configure Microsoft Entra Connect.
features in AD
DS Verify integration between AD DS and Microsoft Entra ID by testing the synchronization process.
Implementing Microsoft Entra ID integration features in Active Directory, including Microsoft Entra ID
Exercise 6: Password Protection for Windows Server Active Directory and SSPR with password writeback.
Cleaning up
Lab setup
Virtual machines: AZ-800T00A-SEA-DC1, AZ-800T00A-SEA-SVR1, and AZ-800T00A-ADM1 must be running.
Other VMs can be running, but they aren’t required for this lab.
❕ Note: AZ-800T00A-SEA-DC1, AZ-800T00A-SEA-SVR1, and AZ-800T00A-SEA-ADM1 virtual machines are hosting the
installation of SEA-DC1, SEA-SVR1, and SEA-ADM1
1. Select SEA-ADM1.
Username: Administrator
Password: Pa55w.rd
Domain: CONTOSO
For this lab, you’ll use the available VM environment and an Microsoft Entra tenant. Before you begin the lab,
ensure that you have an Microsoft Entra tenant and a user account with the Global Administrator role in that
tenant.
Scenario
You need to ensure that your Microsoft Entra ID environment is ready for integration with your on-premises AD
DS. Therefore, you’ll create and verify a custom Microsoft Entra ID domain name and an account with the Global
Administrator role.
5. Review the DNS record types that you would use to verify the domain, and then close the pane without
verifying the domain name.
❕ Note: While, in general, you would use DNS records to verify a domain, this lab doesn’t require the use of a verified
domain.
1. On SEA-ADM1, in the Microsoft Edge window displaying the Microsoft Entra ID page, browse to the All
Users page and create a user account with the following properties:
Username: admin
❕ Note: Ensure the domain name drop-down menu for the User name lists the default domain name ending with
onmicrosoft.com .
Name: admin
Role: Global administrator
Password: use autogenerated password
❕ Note: Use the Show Password option to display the autogenerated password and record it as you’ll use it later in
this lab.
Task 3: Change the password for the user with the Global Administrator role
1. Sign out from the Azure portal and sign in with the user account you created in the previous task.
❕ Note: Record the complex password you used as you’ll use it later in this lab.
Scenario
You need to ensure that your existing Active Directory environment is ready for Microsoft Entra ID integration.
Therefore, you’ll run the IdFix tool, and then ensure that the UPNs of the Active Directory users match the
Microsoft Entra tenant’s custom domain name.
1. Install IdFix.
2. Run IdFix.
Scenario
Exercise scenario: You’re now ready to implement the integration by downloading Microsoft Entra Connect,
installing it on SEA-ADM1, and configuring its settings to match the integration objective.
1. On SEA-ADM1, in the Microsoft Edge window displaying the Azure portal, from the Microsoft Entra ID
page, browse to the Microsoft Entra Connect page.
2. From the Microsoft Entra Connect page, select Download.
3. Download Microsoft Entra Connect installation binaries and start the installation.
4. On the Microsoft Entra Connect page, select the I agree to the license terms and privacy notice
checkbox, and then select Continue.
5. On the Express Settings page, select Use express settings.
6. On the Connect to Microsoft Entra ID page, enter the username and password of the Microsoft Entra ID
Global Administrator user account you created in exercise 1.
Username: CONTOSO\\Administrator
Password: Pa55w.rd
8. On the Microsoft Entra ID sign-in configuration page, verify that the new domain you added is in the list
of Active Directory UPN Suffixes.
❕ Note: The domain name provided does not have to be a verified domain. While you typically would verify a domain
prior to installing Microsoft Entra Connect, this lab doesn’t require that verification step.
9. Select the Continue without matching all UPN suffixes to verified domains checkbox.
10. After you reach the Ready to configure page, review the list of actions, and then start the installation.
Scenario
Now that you have installed and configured Microsoft Entra Connect, you must verify its synchronization
mechanism. You plan to make changes to an on-premises user account, which will trigger synchronization. Then,
you’ll verify that the change is replicated to the corresponding Microsoft Entra ID user object.
1. On SEA-ADM1, switch to the Microsoft Edge window displaying the Azure portal.
2. Refresh the Microsoft Entra Connect page and review the information under Provision from Active
Directory.
3. From the Microsoft Entra ID page, browse to the Users page.
❕ Note: After the directory synchronization starts, it can take 15 minutes for Active Directory objects to appear in the
Microsoft Entra ID portal.
1. On SEA-ADM1, on the Start menu, expand Microsoft Entra Connect, and then select Synchronization
Service.
2. In the Synchronization Service Manager window, under the Operations tab, review the tasks that were
performed to sync the Active Directory objects.
❕ Note: One connector is for AD DS and the other is for the Microsoft Entra tenant.
2. In the Windows PowerShell console, run the following command to trigger synchronization:
Code Copy
Start-ADSyncSyncCycle
❕ Note: After the synchronization cycle starts, it can take 15 minutes for Active Directory objects to appear in the
Microsoft Entra ID portal.
1. On SEA-ADM1, switch to the Microsoft Edge window displaying the Azure portal and go back to the
Microsoft Entra ID page.
2. From the Microsoft Entra ID page, browse to the Users page.
3. On the All Users page, search for the user Sumesh.
4. Open the properties page of the user Sumesh Rajan, and then verify that the Job title attribute has been
synced from Active Directory.
5. In Microsoft Edge, go back to the All Users page.
6. On the All Users page, search for the user Jordan.
7. Open the properties page of the user Jordan Mitchell, and then review the attributes of the user account
that have been synced from Active Directory.
Scenario
You want to identify Microsoft Entra ID integration features that will allow you to further enhance your on-
premises Active Directory security and minimize its management overhead. You also want to implement
Microsoft Entra ID Password Protection for Windows Server Active Directory and self-service password reset with
password writeback.
1. On SEA-ADM1, in the Microsoft Edge window displaying the Azure portal, browse to the Microsoft Entra
ID Licenses page and activate the Microsoft Entra ID P2 free trial.
2. Assign an Microsoft Entra ID P2 license to the Microsoft Entra ID Global Administrator user account you
created in exercise 1.
3. In the Azure portal, browse to the Microsoft Entra ID Password reset page.
4. On the Password reset page, note that you can select the scope of users to which to apply the
configuration.
❕ Note: Don’t enable the password reset feature because it will break the configuration steps that are required later in
this lab.
❕ Note: Password writeback is required for self-service password reset of Active Directory users. This allows passwords
changed by users in Microsoft Entra ID to sync to the Active Directory.
6. On the Ready to configure page, review the list of actions to be performed, and then select Configure.
7. After the configuration completes, close the Microsoft Entra Connect window.
1. On SEA-ADM1, on the Start menu, expand Microsoft Entra Connect, and then select Microsoft Entra
Connect.
2. In the Microsoft Entra Connect window, select Configure.
3. On the Additional tasks page, select Change user sign-in.
4. On the Connect to Microsoft Entra ID page, enter the username and password of the Microsoft Entra ID
Global Administrator user account you created in exercise 1.
5. On the User sign-in page, select Pass-through authentication.
6. Verify that the Enable single sign-on checkbox is selected.
7. On the Enable single sign-on page, select Enter credentials.
8. In the Forest credentials dialog box, authenticate using the following credentials:
Username: Administrator
Password: Pa55w.rd
9. On the Enable single sign-on page, verify that there’s a green check mark next to Enter credentials.
10. On the Ready to configure page, review the list of actions to be performed, and then select Configure.
11. After the configuration completes, close the Microsoft Entra Connect window.
1. On SEA-ADM1, from the Microsoft Entra ID page in the Azure portal, browse to the Microsoft Entra
Connect page.
2. On the Microsoft Entra Connect page, review the information under User Sign-In.
3. Under User Sign-In, select Seamless single sign-on.
4. On the Seamless single sign-on page, review the on-premises domain name.
5. From the Seamless single sign-on page, browse to the Passthrough Authentication page.
6. On the Passthrough Authentication page, review the list of servers under Authentication Agent.
❕ Note: To install the Microsoft Entra ID Authentication Agent on multiple servers in your environment, you can
download its binaries from the Pass-through authentication page in the Azure portal.
Task 5: Install and register the Microsoft Entra ID Password Protection proxy service and DC agent
1. On SEA-ADM1, start Microsoft Edge, browse to the Microsoft Downloads website, browse to the
Microsoft Entra ID Password Protection for Windows Server Active Directory page where you can
download installers, and then select Download.
❕ Note: We recommend installing the proxy service on a server that isn’t a domain controller. In addition, the proxy
service should not be installed on the same server as the Microsoft Entra Connect agent. You will install the proxy
service on SEA-SVR1 and the Password Protection DC Agent on SEA-DC1.
3. On SEA-ADM1, in the Windows PowerShell console, run the following command to remove the
Zone.Identifier alternate data stream indicating that files have been downloaded from internet:
Code Copy
4. Run the following commands to create the C:\Temp directory on SEA-SVR1, copy the
AzureADPasswordProtectionProxySetup.exe installer to that directory, and invoke the installation:
Code Copy
5. Run the following commands to create the C:\Temp directory on SEA-DC1, copy the
AzureADPasswordProtectionDCAgentSetup.msi installer to that directory, invoke the installation, and
restart the domain controller after the installation completes:
Code Copy
6. Run the following commands to validate that the installations resulted in the creation of services necessary
to implement Microsoft Entra ID Password Protection:
Code Copy
Code Copy
8. Within the PowerShell Remoting session, run the following command to register the proxy service with
Active Directory (replace the <Azure_AD_Global_Admin> placeholder with the fully-qualified user principal
name of the Microsoft Entra ID Global Administrator user account you created in exercise 1):
Code Copy
9. Follow the prompts to authenticate by using the Microsoft Entra ID Global Administrator user account you
created in exercise 1.
10. Exit the PowerShell Remoting session.
11. In the Windows PowerShell console, enter the following command, and then press Enter to start a
PowerShell Remoting session to SEA-DC1:
Code Copy
12. Within the PowerShell Remoting session, run the following command to register the proxy service with
Active Directory (replace the <Azure_AD_Global_Admin> placeholder with the fully-qualified user principal
name of the Microsoft Entra ID Global Administrator user account you created in exercise 1):
Code Copy
13. Follow the prompts to authenticate by using the Microsoft Entra ID Global Administrator user account you
created in exercise 1.
14. Exit the PowerShell Remoting session.
1. On SEA-ADM1, switch to the Microsoft Edge window displaying the Azure portal, go back to the
Microsoft Entra ID page, and then browse to its Security page.
2. On the Security page, select Authentication methods.
3. On the Authentication methods page, select Password protection.
4. On the Password protection page, enable Enforce custom list.
5. In the Custom banned password list text box, enter the following words (one per line):
Contoso
London
❕ Note: The list of banned passwords should be words that are relevant to your organization.
6. Verify that the Enable password protection on Windows Server Active Directory setting is enabled.
7. Verify that the Mode is set to Audit and save your changes.
Exercise 6: Cleaning up
Scenario
You want to disable synchronization from the on-premises Active Directory to Azure. This will involve removing
Microsoft Entra Connect and disabling synchronization with Azure.
2. In the Windows PowerShell console, run the following command to install the Microsoft Online module
for Microsoft Entra ID:
Code Copy
Code Copy
$msolcred=Get-Credential
4. When prompted, in the Windows PowerShell credential request dialog box, enter the credentials of the
user account you created in exercise 1.
Code Copy
Code Copy
End the lab when you’re finished in preparation for the next module.