How to add users to the Azure Virtual Network - azure

I have several virtual machines in the azure network. Instead of creating users separately for each machine I would like to create the users at the network level. It will be easier for me to maintain users at the network level.
I am guessing it is not possible to add users to the virtual network because so far I haven't found anything while googling for the question and there is nothing in the Azure Management Portal Virtual Network settings that hints that this feature is available. If this is correct then would you like to suggest a workaround?

You cannot add users to a virtual network in Azure. You can only add VMs (IaaS) and Web and Worker Roles (PaaS) to virtual networks.
In the case you mean to authorize users to access Windows VMs, then think about an Active Directory Domain for your VMs and join all your VMs in that domain.
Here is a guide how to do this: Install a new Active Directory forest on an Azure virtual network

Related

How to join my VM to AAD - select virtual network

I'm trying to create Windows Server VM joined to the AAD where my Azure Subscription is.
I'm reading Join a Windows Server virtual machine to a managed domain, but I'm stuck on step #6:
select the virtual network in which your Azure AD DS-managed domain is
deployed. Pick a different subnet than the one that your managed
domain is deployed into
There are no virtual networks in the select box and the only options is to create new. But if I create new, then I can't reach the domain controller from the VM.
When using AAD with no other AD on prem or located in Azure, you need to create an Active Directory Domain Services account in order to join VMs to that domain.
Otherwise, if you are syncing your on premise domain to your AAD domain via AD Sync you just need to ensure that the VMs you want to join to the domain have access to the virtual network where the domain is located. This means you can opt to peer virtual networks in Azure or connect the separate networks using a Site-to-Site VPN connection.
For this particular issue, you would go with the Active Directory Domain Services account and put it into a blank subnet in the same Vnet as the Virtual Machines are located. Once this is one, you will be able to connect the VMs to your managed domain.

Azure VM and AD Setup

Kindly let me know
Setup the Virtual machine - configure DHS, TCP/IP, Firewall setting
Map to Virtual Network and Subnet
create a vm in other region and set up the Activie directly to setup accces the vm based on user group
Access both VM and files in the vms based on AD Settings Configure Apps based on AD Settings
To be honest, the question is too broad and unclear to answer it better. Also, you have not update your specific question. I suppose you want to create a Windows server VM and then join this Azure VM to a managed domain.
If so, you can follow these step1-step3 from this doc: Join a Windows Server virtual machine to a managed domain. It shows how to create Azure VM and how to join the virtual machine to an Azure Active Directory Domain Services (Azure AD DS) managed domain.
Also, you may want to know these information below:
Azure Active Directory (AD) Domain Services
What is Azure Active Directory?

Using same domain controller for multiple virtual networks in azure

In a azure virtual network(say vnet1) I have 2 virtual machines(say VM1 & VM2).I have windows server active directory installed in VM1. In vnet setting in azure I have mentioned VM1 as my DNS server.So I can use user credentials in AD(from VM1) to login to VM2.Now I want another virtual network(vnet2) to use same AD(in vnet1) so that I could login to the virtual machines in vnet2 using user credentials in AD in vnet1.I tried putting in public IP of VM1 as a DNS setting in vnet2 but that did not work.I would like to know if this is possible? or I have to use another windows server active directory which would be part of my vnet2?
I would also like to know if there are any network limitations on AD?
Thanks in advance.
You net to do a Site to Site between the Vnets.
Depending on if you are using ASM (Azure Service Manager) or ARM (Azure Resource Manager) the solution might have a different setup and there are many blog posts on how to do a Vnet to Vnet connection but i always try to use the official documentation since it always has the latest supported information.
Here is the guide you are looking for.
https://azure.microsoft.com/en-us/documentation/articles/virtual-networks-configure-vnet-to-vnet-connection/

Connect Azure Cloud Service in Virtual Network to Azure SQL database

I have an Azure Cloud Service (Worker Role) that needs to connect to my Azure SQL database and also connect to an external database.
In development the external database was on the public Internet and connectivity was not a problem.
However, the solution now needs to be deployed in a production environment and access to the external database is to be restricted by setting up a Virtual Network.
The Cloud Service, when deployed in the Virtual Network, gets an IP from the subnet, but seems to become inaccessible to the outside world, and is not connecting to the Azure SQL database (I also cannot RDP to it).
This seems to be beyond my level of understanding of networking, but I don't see why it should lose access to its neighbours in the Azure environment.
What am I missing? Do I need to get involved with Endpoints? Is the Virtual Network misconfigured?
Thanks in advance.
Your question is quite vague, in terms that it does describe the whole picture in the best possible way. Let me put my answer based on my understanding about your issue.
First of all - Azure virtual Network is Virtual Network. It is designed to enable secure cross-premisses connectivity with Windows Azure Data Center.
When you deploy a proper PaaS Cloud Service (Worker Role / Web Role) in a Virtual Network, the role instances get IP Addresses allocated from the defined DHCP pool (the VNet Definition).
When you deploy any service in an Azure Virtual Network you have to take care of Name Resolution! Meaning that, if you do not provide a proper DNS Server, your cloud instances will not be able to resolve any address. That includes Azure SQL Database servers. More on Name Resolution can be read here.
Next, but not less important - Azure SQL Database servers are not part of, and, as of March'2013, cannot be added to Azure Virtual Network!
The last statement means that in order for your Worker Role to access Azre SQL Database server, you need to provide a proper DNS server in your Azure Virtual Network.
And lastly, when you deploy a PaaS service into a Virtual Network, in order to access it via Remote Desktop need to:
* Properly enable and configure RDP extension. it will anyway create Input Endpoint. But this is the only way to enable RDP on PaaS right now;
* You could probably enable RDP via PowerShell startup script and access RDP via the VPN tunnel for the Virtual Network - say you configured a Site-to-Site or Point-to-site VPN for your Azure VNet.
Check the building cross-premises Virtual Network guide here.

How to Connect Azure Worker/Web role to Azure Iaas VMs without using public IP's?

We want to run MongoDB and some custom services on Azure Iaas VMs and connect to them with our roles but we do not want to have public IP exposure on the VMs.
If possible what is the best way of doing this?
If not possible is this on the roadmap?
We can add the VM's under the same cloud service and they can communicate happily, the roles are in same deployment so they communicate, but issue between the vm's and roles. We appreciate that the Iaas stuff is still in preview.
Thanks
If you have your Windows Azure Web/Worker Role and Windows Azure Virtual Machine in the same DC you can access them directly using internal IP address using Virtual Networking (Vnet) using internal Endpoints. To achieve it first you would need to create a Virtual Network and then add your Virtual Machine to this VNet. VNet will give your internal IP address and your Web/Worker Role can communicate to this internal IP address.
You can not do mix mode deployment directly from Windows Azure Preview Portal (it is not supported in preview yet) however you can use PowerShell VNet cmdlets to get it configured and working. To need further assistance with VNet team you can contact them directly here.

Resources