How to add AD FS Server to authenticate against AD - azure

I'm trying set up a Primary AD FS 3.0 Server in Windows Azure for Office 365 Single Sign-On. I have no idea how to add a VM I provisioned to the local domain.
I've been following the directions here http://office365support.ca/setting-up-the-primary-ad-fs-3-0-server-in-windows-azure-for-office365-single-sign-on/ and can't proceed because I can't figure this out. Can someone please help me?

Not sure if you want to Promote a Windows 2012R2 Server to Domain Controller or Install a new Active Directory forest on an Azure virtual network but these two articles should cover everything.

Related

How to authenticate client app with azure AD oauth2 hosted on Azure Linux Virtual Machine?

I truly hope I can get some help on this.
I have one Linux Virtual Machine in Azure portal where it exposes few REST APIs. And i have list of client application registered in my Azure Active Directory. I want to authenticate the rest API using Active directory. Have any of you have ever implemented this ? i tried from this post and seems to be not working : https://learn.microsoft.com/en-us/azure/active-directory-domain-services/active-directory-ds-admin-guide-join-windows-vm-portal
Any help would be highly appreciated.
Thanks
Richard

TFS Dual-Tier on Azure with Azure Active Directory

So, I'm trying to setup TFS 2017 on Azure with separate App tier VM and DB tier VM. I'm trying to connect them but apparently you can only do multi-tier when in an AD. Am I able to use solely Azure Active Directory for this? If so, how do I set it up? I've not see any instructions on how to properly do this.
Thanks!
Your issue is similar to this case on ServerFault. Usually, you need follow the steps below:
create virtual network
put your vms into that virtual network so they will be in the same network and domain works
join the domain
install TFS AT server and DT server.
Note: If you get error An Active Directory Domain Controller (AD DC) for the domain “x.x.com” could not be contacted when join a Windows 2012 R2 server to a domain in Windows Azure, check the solution here: http://www.itexperience.net/2014/06/06/an-active-directory-domain-controller-ad-dc-for-the-domain-x-x-com-could-not-be-contacted-windows-azure/
Useful guide can be downloaded from: http://vsarplanningguide.codeplex.com/downloads/get/842516

Neo4j: Ubuntu hosted endpoint protection on Microsoft Azure

I am trying to host the neo4j server on an Azure Ubuntu VM and opened up the endpoint to enable access from my machine so that I can access the webadmin portal and also debug Asp.net portal code from my machine.
I am however unable to understand how to password protect the access to neo4j endpoint on that VM so that its not open for everyone on the net. looking for at least a simple protection like:
http://<user>:<pass>#myneo4j.cloudapp.net:7474/db/data
Is there any guide on how to setup the neo4j on the Azure cloud that I can refer to.
I found authentication-extension but unable to understand if this is all i need when setting up connection via Neo4jClient
Regards
Kiran
If you use ubuntu you can set up nginx as reverse proxy: http://joewhite86.wordpress.com/2013/05/29/secure-neo4j-webadmin-using-http-auth-and-ssl/
Once I downloaded the right version of 'authentication-extension' and put it in the plugin folder, it was exactly what i wanted,
added few users and pointed the URI to database as below :
http(s)://<user>:<pass>#myneo4j.cloudapp.net:7474/db/data.
and that's all I needed to protect my back end like old fashion SQL server ways.

Windows azure connect virtual machinie from different account

I would like to connect two VM from two different account in Windows Azure.
Is it possible?
Because I've searched in the web and the e.g are only about the same account.
Thank you all for the help
This is not possible. Azure Connect is per subscription scope. See if the new endpoint to site VPN works for you https://azure.microsoft.com/documentation/articles/vpn-gateway-point-to-site-create/, I haven't tried it.

Azure Cloud Domain Controller servicing mobile desktops with Azure Connect?

Given the recent updates to Windows Azure I am wondering if it is possible to create a domain controller and file server on Azure, then connect 10 to 20 remote workers using Azure Connect to this "virtual office".
My primary interest is whether or not a domain controller can exist in the cloud and service desktops with Active Directory as they roam. This would eliminate the need for an onprem server for a small business. Active Directory would be used for desktop logins and group policies, and potentially to authenticate a hosted file server, sharepoint instance, etc.
I see a lot of posts about domain controllers servicing offices over a VPN, and replicated azure domain controllers to onprem domain controllers, but nothing about whether a domain controller can run in the cloud and service roaming desktops (presumably with azure connect).
I am excited and ready for someone to tell me it's not possible. LOL
Yes this is possible, there are 2 tutorials that can help you with this:
The first one will help you setup a virtual network: Create a Virtual Network for Cross-Premises Connectivity
The second one will help you to install a new AD Forest in Windows Azure: Install a new Active Directory forest in Windows Azure

Resources