Microsoft Windows Extending Active Directory To Oci
Microsoft Windows Extending Active Directory To Oci
Microsoft Windows Extending Active Directory To Oci
Disclaimer 1
Assumptions 3
Target Audience 3
Introduction 4
Instances 7
Configure DNS 11
Target Audience
This whitepaper is targeted at customers who would like to understand how to extend their on-premises Active
Directory environment to Oracle Cloud Infrastructure.
- A secure (nonpublic) connection exists between your on-premises environment and Oracle Cloud
Infrastructure (this can either be a FastConnnect or IPSec VPN connection, as shown in the
diagram below).
- You have a domain admin account in the on-premises Active Directory environment (or an account
that has permission to both join the domain and install a domain controller).
Best Practice
The domain controllers should not be accessible externally from the internet. Allowed access should only be from
specific IP addresses from the on-premises network. These IP addresses should include the current on-premises
Active Directory controllers and any Administrative desktops that will be used to create/manage the domain
controllers
Each of the subnets will require a route table and at least one security list. The route table for the domain controller
subnets should already exist since your VCN is already connected to your on-premises environment using this route
table. If you don’t already have a route table that can be used for the test server (assuming it requires internet
access), you can create one as outlined below.
Best Practice
Always be as prescriptive in your naming of Oracle Cloud Infrastructure components as you can. This will make
it easier in the future when you have to revisit an environment.
Create new ingress rules on the Production Active Directory security list to allow the required port communication
into the new Active Directory subnets (make sure these rules exist to allow traffic between the two domain controller
subnets). Also make sure that you enable TCP port 3389 (RDP) from the internal on-premises network to all three
subnets.
Instances
Our environment requires three instances. Two will be used for the Active Directory domain controllers and the third
will be used as a test server.
Use the following properties to create the instances (the instance shape we used for this white paper
(VM.Standard1.4) is a recommendation, you can scale it up or down as you deem fit):
DC-1
DC-2
Test-SRV
Information needed:
1. Log in to the first instance that is to be promoted to a domain controller, using the OPC user credentials
(administrator user).
8. In the dialog box that appears, click the Add Features button.
Note: If you selected to install the DNS Server role, you will get a warning dialog box informing you that
no static IP addresses were found on the computer. Because the IP address associated with this
instance will be associated with it for the life of the instance, you can click the Continue button.
Configure DNS
Before you can join the domain and promote the domain controller, you need to reconfigure the DNS server to point
to the on-premises Active Directory DNS server. (Another option is to create a DNS server in the Oracle Cloud
Infrastructure environment that can receive a Zone transfer from the on-premises DNS servers. This will allow you to
use the Oracle Cloud Infrastructure DNS server to join the domain.) Having the DNS server on the soon-to-be
domain controller map to the on-premises DNS server will allow the server to resolve the domain information and
join the domain.
Information needed:
2. Right-click the Network icon in the right corner of the screen and choose Open Network and Sharing
Center.
Note: The options appearing in the Network Connections window discussed here are for instances
launched as Virtual Machine instances. If you launched the Windows servers as Bare Metal instances, the
name of the adapter will be different, however, the steps are the same regardless of instance type.
4. Right-click the Ethernet network adapter (it should be labeled “Intel(R) 82599 Virtual function”) and
choose Properties. (For Bare Metal instances, it should be labeled “Intel(R) Ethernet Server Adapter
X520-2” or similar.)
7. Enter the IP address(s) of the on-premises DNS server(s) and click OK.
9. You can test that the DNS server is working by either navigating to a public website (assuming that your
instance(s) have Internet access) or by running the nslookup command from a command prompt.
Information needed:
2. Domain credentials for an account that has permission to join the domain.
4. In the Computer name, domain, and workgroup settings section, click Change settings.
5. Click Change.
7. Enter the FQDN name of the domain that you are joining and click OK.
8. If the DNS server is configured correctly, you should be prompted with a dialog box to enter the domain
administrator credentials. Enter the credentials and click OK.
9. If the credentials are correct and have the appropriate permissions, you should receive a Welcome to the
… domain message.
11. Another dialog box notifying you that you need to reboot the server will be displayed, click OK.
Information needed:
1. Domain credentials for an account that has domain administrator permission to promote a server as a
domain controller.
1. Log in to the first system as a domain administrator (or account that has equivalent permissions). You will
need to change the username from “.\opc” to “your_domain\your_domain_admin”
3. You should notice a yellow warning notification icon. Click it and you should see a message stating that
configuration is required for Active Directory Services. Click Promote this server to a domain controller.
4. In the Active Directory Domain Services Configuration Wizard, make sure that Add a domain controller
to an existing domain is selected, the correct domain is listed in the Domain field, and the credentials
displayed are correct, and click Next.
6. Enter and confirm a password for Directory Services Restore Mode (DSRM) and click Next.
7. If you chose to install a read-only domain controller, select Delegated administrator account and list the
account(s) that are allowed or denied from replicating passwords to this domain controller and click Next.
8. Click Next until you get to the Prerequisites Check step. You may be presented with some warnings on
this screen, review the warnings and click Install.
Configure the test instance to use the newly created domain controllers as the DNS server:
2. Right-click the Network icon in the right corner of the screen and choose Open Network and Sharing
Center.
Note: The options appearing in the Network Connections window discussed here are for instances
launched as Virtual Machine instances. If you launched the Windows servers as Bare Metal instances, the
name of the adapter will be different, however, the steps are the same regardless of instance type.
4. Right-click the Ethernet network adapter (it should be labeled “Intel(R) 82599 Virtual function”) and
choose Properties. (For Bare Metal instances, it should be labeled “Intel(R) Ethernet Server Adapter
X520-2”, or similar.)
7. Enter the IP address(s) of the newly created domain controllers (these are the RFC1918 IP addresses you
recorded earlier and click OK.
8. Click Close.
3. In the Computer name, domain, and workgroup settings section, click Change settings.
4. Click Change.
6. Enter the FQDN name of the domain that you are joining and click OK.
7. If the DNS server is configured correctly, you should be prompted with a dialog box to enter the domain
administrator credentials. Enter the credentials and click OK.
8. If the credentials are correct and have the appropriate permissions, you should receive a Welcome to the
… domain message.
10. Another dialog box notifying you that you need to reboot the server will be displayed. Click OK.
CONNECT W ITH US
blogs.oracle.com/oracle
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only, and the
contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other
facebook.com/oracle warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or
fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are
formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any
twitter.com/oracle
means, electronic or mechanical, for any purpose, without our prior written permission.
oracle.com Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and
are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are
trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. 0116