Deploy a test environment on Azure (AX 2012)
Before you complete the procedures in this article, make sure that the following prerequisites are in place.
|Required tasks||Plan your Microsoft Dynamics AX 2012 R3 deployment on Azure|
1. Log on to Lifecycle Services
Microsoft Dynamics Lifecycle Services provides a cloud-based collaborative workspace that customers and partners can use to manage Microsoft Dynamics AX projects. You’ll use this website to deploy AX 2012 R3 on Azure. Lifecycle Services is available to customers and partners as part of their support plans. You can access it with your CustomerSource or PartnerSource credentials. Log on to Lifecycle Services
2. Create a project
After you log in to Lifecycle Services, open an existing project, or create a new project. Projects are the key organizer of your experience in Lifecycle Services. The methodology associated with a project determines which phases and tasks are included in the project by default.
3. Connect the project to your Azure subscription
Connect the Lifecycle Services project to your Azure subscription. This will enable Lifecycle Services to deploy an AX 2012 R3 environment to the subscription. To connect the project to your Azure subscription, complete the following procedure. Keep in mind that a project can be connected to only one Azure subscription. If you have multiple Azure subscriptions, be sure to identify which subscription you want to use before you complete this procedure.
- Click Cloud-hosted environments. The Cloud-hosted environments page is displayed.
- The Microsoft Azure setup panel is displayed on the side of the screen. If it is not displayed, click Microsoft Azure settings.
Enter your Azure subscription ID. If you need to find your subscription ID, complete the following steps:
- Open another instance of your browser.
- Log on to the Azure management portal.
- In the navigation pane on the left, click Settings. (You may have to scroll to the bottom of the navigation pane to see the Settings link.) The Settings page is displayed.
- Copy your subscription ID, and then paste it into the Azure subscription ID field in Lifecycle Services (which is currently displayed in another browser instance).
- Click Download to download a management certificate. This management certificate enables Lifecycle Services to communicate with Azure on your behalf. By default, the management certificate is saved to the Downloads folder on your computer and is named LifecycleServicesDeployment.cer.
Upload the management certificate to Azure. To do so, complete the following steps:
- Open another instance of your browser. (Or, go to the browser instance that you may have opened in step 3.)
- Log on to the Azure management portal.
- In the navigation pane on the left, click Settings. The Settings page is displayed.
- Click Management certificates.
- Click Upload at the bottom of the page.
- In the Upload a management certificate window, browse to the management certificate that you downloaded in step 5. Then click the check mark.
Go back to the browser that displays the Microsoft Azure setup panel in Lifecycle Services. Click Next.
- Select the region that is closest to you. The AX 2012 R3 environment will be deployed to a datacenter in this region.
- Click Connect. The project is now connected to the Azure subscription that you specified. If you discover that you connected the project to the wrong Azure subscription (that is, assuming you have multiple Azure subscriptions), you’ll need to delete the project, create a new project, and then repeat this procedure to connect the new project to the appropriate Azure subscription.
4. Connect your corporate network to the Azure virtual network
The following sections provide information about how to configure the Azure virtual network and domain so that your corporate users can access AX 2012 R3. It is recommended that if you require login to these systems using corporate credentials that you set up the connectivity before you deploy the environment. This will require using Azure networking capabilities to extend you corporate network to one or more Azure virtual networks. It will additionally require you to deploy an Active Directory into the Azure virtual network, which will be set up for trust to your corporate Active Directory. This Active Directory will be used to manage VM-related resources in the Azure virtual network. This Active Directory will not be used for single sign-on, and should not be set up to sync the corporate directory. Single sign-on capabilities will be provided through the domain trust.
Create a site-to-site VPN connection
To enable corporate users to access resources on the virtual machines in the Azure virtual network, you’ll need to create a site-to-site VPN connection between the Azure virtual network and your on-premises, corporate network. For information about how to do this, see:
- Virtual network overview
- Virtual network configuration tasks
- Set up a simulated hybrid cloud environment for testing
- Site-to-site VPN in Azure virtual network using Windows Server 2012 Routing and Remote Access Service (RRAS)
- Configure a virtual network gateway in the management portal
Create an Active Directory account in Azure
An Active Directory is required in the Azure virtual network. An Active Directory can be deployed to the Azure virtual network. Please follow Guidelines for Deploying Windows Server Active Directory on Azure Virtual Machines. Please note that Active Directory Federation Services is not presently supported with AX 2012 R3. If you are providing the Active Directory, you will need to create the following service accounts within it that can be used by LCS deployment services when you deploy the environment.
|<DomainName>AXServiceUser||AX 2012 R3 service account|
|<DomainName>AOSServiceUser||AOS service account|
|<DomainName>BCProxyUser||Business Connector proxy account|
|<DomainName>SPServiceUser||SharePoint service account|
|<DomainName>SqlServiceUser||SQL Server service account|
|<DomainName>DynamicsInstallUser||AX 2012 R3 installation account Note: This account must have permission to join computers to the domain. To give this account permission, complete the following steps:
You will need to provide the passwords for these accounts when you deploy the environment.
Create a domain trust
To enable corporate users to access resources on the virtual machines in your Azure domain, you must create an Active Directory trust between the domains. For information about how to create a trust, see Create a Forest Trust. This process is the same process you would use to create a trust between two on-premises domains.
Give the Administrators group the right to log on as a batch job
Log in to the Active Directory domain controller and complete the following steps to give the built-in Administrators group the right to log on as a batch job.
- Click Start, click All Programs, and then click Administrative Tools.
- In the Administrative Tools menu, select Group Policy Management.
- In the Group Policy Management console tree, click Forest: <ServerName>, and then click Domains.
- Click the name of your server, expand Domain Controllers, right-click Default Domain Controllers Policy, and then click Edit.
- In the Group Policy Management Editor, click Default Domain Controllers Policy <ServerName> Policy, expand Computer Configuration, and then click Policies.
- In the Policies tree, expand Windows Setting, and then click Security Settings.
- In the Security Settings tree, expand Local Policies, and then click User Rights Assignment.
- In the results pane, scroll to and then click Log on as a batch job.
- In the Log on as a batch job Properties dialog box, click Add User or Group.
- In the Add User or Group dialog box, click Browse.
- In the Select Users, Computers, or Groups dialog box, type Administrators.
- Click Check Names to verify that the built-in Administrators account appears, and then click OK three times.
Change the default organizational unit
If you want virtual machines to be added to Active Directory in a custom organizational unit—versus the default organizational unit—you can change the default organizational unit in your Active Directory prior to starting deployment. For more information, click here.
5. Deploy a test environment on Azure
Complete the following procedure to deploy a test environment on Azure.
- On the Cloud-hosted environments page, click the Add (+) icon.
- In the Select environment topology panel, select Dev/test.
- Click Test.
- In the Environment name field, enter a name for the environment that will be deployed.
- Click Advanced settings.
To customize domain settings, click Customize domain settings. Then use the following table to enter information.
If you want to: Do this: Create a new domain in Azure for the environment
- Click New domain.
- Enter a name for the domain. By default, the domain is named contoso.com.
Add the environment to an existing domain in Azure
- Click Existing domain.
- Enter the name of the domain. For example, contoso.com.
To customize the service accounts that will be created in the domain, click Customize service accounts. Service accounts and/or service account passwords may be specified through the Advanced Settings option for a deployment. If neither is provided, default accounts are used and random passwords are selected. Use these features when you want to maintain account naming and password rules for your corporation. Account and password rules:
- A valid service name must be less than 20 characters with no special characters.
- A valid password must be more than 8 characters and contain uppercase letters, lowercase letters, numbers, and at least one of the following characters: ['@', '!', '=', '*'] You can’t use common passwords, such as: pass@word1
To select the version of AX 2012 R3 that you want use, click Supported version. By default, the AX 2012 R3 CU8 version of this environment will be deployed. If you don’t want to use the CU8 version, select Dynamics ERP 2012 R3 RTM from the list.
- To customize virtual machine names, click Customize virtual machine names. In order to support common IT naming guidelines, the ability to name virtual machines is provided through the Advanced settings option on most deployment topologies. In addition to defining the name, a starting index can be selected for each virtual machine type. The index is incremented for each instance of the virtual machine type that is deployed. Virtual machine names must be 13 characters or less. The index is separated from the machine name by a hyphen (-), followed by the index that supports a maximum of 2 digits. Example: ACustomVMName-99 When virtual machine instances are added to an environment after the initial deployment, the deployment service will start incrementing the virtual machine name where it left off. For example, if you deployed four AOS virtual machines with a starting index of 2, then the last AOS instance name will be AOS-6. If you add two more AOS instances, they will be AOS-7 and AOS-8. If one of the virtual machine types in your deployment is customized, then all of the virtual machine names must be customized. This is done to ensure that a long deployment does not occur because a virtual machine name was accidentally missed.
If you have selected to deploy a Remote Desktop Services virtual machine, click Customize remote desktop services to specify how your users will access AX 2012 R3 via the web. Select one of the following options:
- Remote Desktop: This option enables users to login to a full remote desktop.
- RemoteApp Programs: This option enables users to login in to AX 2012 R3 directly, without having the experience of a full desktop window. RemoteApp is enabled by default.
After the environment has been deployed, the following links are available to you on the Cloud-hosted environments page:
- RDS Web Access certificate: This is a self-signed certificate that is provided to allow secured access to the RDS Web Access site. Click the link and open this certificate and install it into the Local Machine > Trusted Root Certification Authorities node before attempting to access the RDS Web Access site. It is recommended that before this environment be placed into a production capacity that you install your own certificate to the RDS cluster.
- RDS Web Access: This allows users to gain access to the AX 2012 R3 environment over the web. If you chose the Remote Desktop option, users will be offered the ability to login to a full remote desktop. If you chose RemoteApp Programs, users will be able to log in directly to AX 2012 R3.
- RDS Farm Access: This allows users to gain access to the AX 2012 R3 environment over a VPN connected network. This feature is only available if you have:
- Joined this AX deployment to a VPN connected corporate domain.
- Configured the RDS Gateway to accept connections from the VPN connected network.
Note: For both RDS Web Access and RDS Farm Access, when joining a deployment to an existing Active Directory domain you must add the RDS Farm to your AD/DNS with the IP address of the Internal Load Balancer. See the following steps:
Get the name of your RDS Farm: This can be obtained from the RDS Farm Access link in LCS. In this case, it should be RdsFarm0c0fa75.
Get the IP of the Internal Load Balancer from the Cloud Service dashboard in Azure Portal. Inspect the RDS machine that has an internal IP next to port 3389. In the below example, the Internal Load Balancer IP is 10.1.3.4.
Add the RDS Farm as a Computer in your AD, using the information obtained above.
Failure to do these steps results in the following error when going through RD Web Access: Remote Desktop can't find the computer "RdsFarm0c0fa75.contoso.com". This might mean that " RdsFarm0c0fa75.contoso.com" does not belong to the specified network. Verify the computer name and domain that you are trying to connect to.
To customize virtual network settings, click Customize virtual network. Then use the following table to enter information.
If you want to: Do this: Create a new virtual network in Azure for the environment
- Click New virtual network.
- Enter a name for the virtual network.
Add the environment to an existing virtual network in Azure
- Click Existing virtual network.
- Select the name of the existing virtual network that you want to use.
- The Address space field will automatically display the appropriate value. Select the provided value.
- The Application subnet name field will display available options. If you are deploying to an AD that was previously deployed through Lifecycle Services, select the APPNET value.
- The Active Directory subnet must be entered and match the Active Directory subnet IP/Range found in the Azure management portal for the AD you desire to target.
- Log on to the Azure management portal
- In the navigation pane on the left, click Networks.
- Click the name of the virtual network that you’re going to use.
- Click Configure.
Click Done. The Deploy environment panel is redisplayed.
The number and size of each virtual machine that will be deployed is listed. Change the number and size of the virtual machines, as needed.
- For information about the software installed on each virtual machine in this environment, see Plan your Microsoft Dynamics AX 2012 R3 deployment on Azure.
- For sizing and pricing details about virtual machines, see Virtual machines pricing details.
Click Software License Terms to review the licensing terms and conditions. Then select the check box to indicate that you agree to the terms.
- Click Next.
- Click Deploy to confirm that you’re ready to deploy the environment. The deployment may take a few hours to complete. When the deployment is done, the Deployment Status column on the Cloud-hosted environments page will display Deployed. (You may need to refresh your browser to see this.) If the deployment fails, you may see an error message right away. If the error occurs later in the deployment process, error details will be displayed in the details pane on the right-side of the page.
6. Prepare AX 2012 R3 for use
Now that the environment has been deployed on Azure, you must set up and configure AX 2012 R3 for use. See the following sections for more information.
Log on to the AOS virtual machine
Log on to the AOS-<GUID> virtual machine using the <DomainName>DynamicsInstallUser account. For instructions, see the “How do I log on to a virtual machine?” section of the Manage your Microsoft Dynamics AX 2012 R3 deployment on Azure article.
Compile AX 2012 R3
Compile AX 2012 R3 by using AxBuild.exe. For instructions, see AxBuild.exe for Parallel Compile on AOS of X++ to p-code.
Initialize AX 2012 R3
Open the AX 2012 R3 client and complete the initialization checklists. For instructions, see Initialization checklists.
Install sample data
If you want sample data installed in your environment, complete the following steps.
- Log on to the SQL-<GUID> virtual machine. Log on to the virtual machine using the DynamicsInstallUser account. For instructions, see the “How do I log on to a virtual machine?” section of the Manage your Microsoft Dynamics AX 2012 R3 deployment on Azure article.
- Go to the following location on the virtual machine: F:TestTransferTool
- Install the Test Data Transfer Tool. For instructions, see Install the Test Data Transfer Tool (beta) for Microsoft Dynamics AX.
- Open a command prompt and navigate to the following location: C:\Program Files (x86)\Microsoft Dynamics AX 2012 Test Data Transfer Tool (Beta)
- Run the following command: dp.exe import F:DemoData MicrosoftDynamicsAx
**Note: **The sample data includes trial license keys for AX 2012 R3. If you choose not to install the sample data, you can download trial license keys—for development or testing purposes—from CustomerSource or MSDN.
Give users access
To enable your users to access AX 2012 R3, complete the following tasks:
- Add each user’s domain account to the Remote Desktop Users group on the CLI-<GUID> virtual machine.
- Give users access to AX 2012 R3. For instructions, see Create new users in Microsoft Dynamics AX.
**Note: **If you don’t want to create a VPN connection and a domain trust, you can still give users access to AX 2012 R3. To do so, you’ll need to log on to the virtual machine that serves as the domain controller, and create domain accounts for each user. Then, you’ll need to complete the two tasks mentioned above.
Set up and configure AX 2012 R3
The procedures for setting up and configuring AX 2012 R3 on Azure are the same procedures used for setting up and configuring on-premises deployments. See the following resources for more information.
|See the instructions on TechNet||
|View printable guides and white papers|
|Use the Microsoft Dynamics AX web search tool|
7. Learn more about the service accounts for this environment
The following sections provide information about the service accounts that were created when you deployed the environment.
The following table lists the default names of the domain accounts that were created when you deployed the environment.
|The account used to run the following services on AOS-
|The account used to run the following services on SQL-
|The account used to install AX 2012 R3.|
|The account used to run the following services on EP-
|The account used as the Business Connector proxy.|
|The account used to run the following services on AOS-
Note: The passwords are displayed on the Cloud-hosted environments page in Lifecycle Services.
Local administrator accounts
Each virtual machine that you deployed has a local administrator account. This account is: builtinaxlocaladmin. The passwords for the local administrator accounts are displayed on the Cloud-hosted environments page in Lifecycle Services.