Join an Ubuntu virtual machine in Azure to a managed domain
This article shows you how to join an Ubuntu Linux virtual machine to an Azure AD Domain Services managed domain.
Before you begin
To perform the tasks listed in this article, you need:
- A valid Azure subscription.
- An Azure AD directory - either synchronized with an on-premises directory or a cloud-only directory.
- Azure AD Domain Services must be enabled for the Azure AD directory. If you haven't done so, follow all the tasks outlined in the Getting Started guide.
- Ensure that you have configured the IP addresses of the managed domain as the DNS servers for the virtual network. For more information, see how to update DNS settings for the Azure virtual network
- Complete the steps required to synchronize passwords to your Azure AD Domain Services managed domain.
Provision an Ubuntu Linux virtual machine
Provision an Ubuntu Linux virtual machine in Azure, using any of the following methods:
- Deploy the virtual machine into the same virtual network in which you have enabled Azure AD Domain Services.
- Pick a different subnet than the one in which you have enabled Azure AD Domain Services.
Connect remotely to the Ubuntu Linux virtual machine
The Ubuntu virtual machine has been provisioned in Azure. The next task is to connect remotely to the virtual machine using the local administrator account created while provisioning the VM.
Follow the instructions in the article How to log on to a virtual machine running Linux.
Configure the hosts file on the Linux virtual machine
In your SSH terminal, edit the /etc/hosts file and update your machine’s IP address and hostname.
sudo vi /etc/hosts
In the hosts file, enter the following value:
127.0.0.1 contoso-ubuntu.contoso100.com contoso-ubuntu
Here, 'contoso100.com' is the DNS domain name of your managed domain. 'contoso-ubuntu' is the hostname of the Ubuntu virtual machine you are joining to the managed domain.
Install required packages on the Linux virtual machine
Next, install packages required for domain join on the virtual machine. Perform the following steps:
In your SSH terminal, type the following command to download the package lists from the repositories. This command updates the package lists to get information on the newest versions of packages and their dependencies.
sudo apt-get update
Type the following command to install the required packages.
sudo apt-get install krb5-user samba sssd sssd-tools libnss-sss libpam-sss ntp ntpdate realmd adcli
During the Kerberos installation, you see a pink screen. The installation of the 'krb5-user' package prompts for the realm name (in ALL UPPERCASE). The installation writes the [realm] and [domain_realm] sections in /etc/krb5.conf.
If the name of your managed domain is contoso100.com, enter CONTOSO100.COM as the realm. Remember, the realm name must be specified in UPPERCASE.
Configure the NTP (Network Time Protocol) settings on the Linux virtual machine
The date and time of your Ubuntu VM must synchronize with the managed domain. Add your managed domain's NTP hostname in the /etc/ntp.conf file.
sudo vi /etc/ntp.conf
In the ntp.conf file, enter the following value and save the file:
Here, 'contoso100.com' is the DNS domain name of your managed domain.
Now sync the Ubuntu VM's date and time with NTP server and then start the NTP service:
sudo systemctl stop ntp sudo ntpdate contoso100.com sudo systemctl start ntp
Join the Linux virtual machine to the managed domain
Now that the required packages are installed on the Linux virtual machine, the next task is to join the virtual machine to the managed domain.
Discover the AAD Domain Services managed domain. In your SSH terminal, type the following command:
sudo realm discover CONTOSO100.COM
Troubleshooting: If realm discover is unable to find your managed domain:
- Ensure that the domain is reachable from the virtual machine (try ping).
- Check that the virtual machine has indeed been deployed to the same virtual network in which the managed domain is available.
- Check to see if you have updated the DNS server settings for the virtual network to point to the domain controllers of the managed domain.
Initialize Kerberos. In your SSH terminal, type the following command:
- Ensure that you specify a user who belongs to the 'AAD DC Administrators' group.
- Specify the domain name in capital letters, else kinit fails.
Join the machine to the domain. In your SSH terminal, type the following command:
Use the same user account you specified in the preceding step ('kinit').
sudo realm join --verbose CONTOSO100.COM -U 'bob@CONTOSO100.COM' --install=/
You should get a message ("Successfully enrolled machine in realm") when the machine is successfully joined to the managed domain.
Update the SSSD configuration and restart the service
In your SSH terminal, type the following command. Open the sssd.conf file and make the following change
sudo vi /etc/sssd/sssd.conf
Comment out the line use_fully_qualified_names = True and save the file.
# use_fully_qualified_names = True
Restart the SSSD service.
sudo service sssd restart
Configure automatic home directory creation
To enable automatic creation of the home directory after logging in users, type the following commands in your PuTTY terminal:
sudo vi /etc/pam.d/common-session
Add the following line in this file below the line 'session optional pam_sss.so' and save it:
session required pam_mkhomedir.so skel=/etc/skel/ umask=0077
Verify domain join
Verify whether the machine has been successfully joined to the managed domain. Connect to the domain joined Ubuntu VM using a different SSH connection. Use a domain user account and then check to see if the user account is resolved correctly.
In your SSH terminal, type the following command to connect to the domain joined Ubuntu virtual machine using SSH. Use a domain account that belongs to the managed domain (for example, 'bob@CONTOSO100.COM' in this case.)
ssh -l bob@CONTOSO100.COM contoso-ubuntu.contoso100.com
In your SSH terminal, type the following command to see if the home directory was initialized correctly.
In your SSH terminal, type the following command to see if the group memberships are being resolved correctly.
Grant the 'AAD DC Administrators' group sudo privileges
You can grant members of the 'AAD DC Administrators' group administrative privileges on the Ubuntu VM. The sudo file is located at /etc/sudoers. The members of AD groups added in sudoers can perform sudo.
In your SSH terminal, ensure you are logged in with superuser privileges. You can use the local administrator account you specified while creating the VM. Execute the following command:
sudo vi /etc/sudoers
Add the following entry to the /etc/sudoers file and save it:
# Add 'AAD DC Administrators' group members as admins. %AAD\ DC\ Administrators ALL=(ALL) NOPASSWD:ALL
You can now log in as a member of the 'AAD DC Administrators' group and should have administrative privileges on the VM.
Troubleshooting domain join
Refer to the Troubleshooting domain join article.