Chat now with support
Chat with Support

Active Roles 8.1.5 - Quick Start Guide

Introduction Active Roles Setup package Active Roles uninstallation System Requirements Deploying the Administration Service Deploying user interfaces Installing additional components Upgrade of an earlier version Performing a pilot deployment Deployment considerations Silent installation of Active Roles components Configuring Active Roles to Manage Hybrid Active Directory Objects Deploying Active Roles for AWS Managed Microsoft AD Active Roles on Windows Azure VM

Active Roles on Windows Azure VM

Active Roles on Windows Azure VM

This section outlines the recommended steps for deploying Active Roles in the Windows Azure Infrastructure Services environment. After you complete these steps, you have the following services deployed in Windows Azure using Windows Azure virtual machines:

  • SQL Server 2012 or later to host the Active Roles database
  • Active Roles Administration Service
  • Active Roles Web Interface

Step 1. Prerequisites

This guide assumes that you already have the following prerequisites:

Step 2. Deploy Microsoft SQL Server 2012

Perform the following tasks to deploy SQL Server:

  1. Create a virtual machine based on an SQL Server image published in Windows Azure.

    When creating the virtual machine, on the Virtual machine configuration page, select the Create a new cloud service option and choose the Virtual Network used by your replica domain controller in Windows Azure.

For more information on how to deploy an SQL Server in Microsoft Azure, see Create SQL Server on a Windows virtual machine in the Azure portal in the Microsoft Azure documentation.

  1. Join the SQL Server virtual machine to your Active Directory domain.
  2. Using SQL Server Management Studio, grant the sysadmin fixed server role to the domain user account that will be used as the service account for the Active Roles Administration Service.
  3. Configure Windows Firewall to allow connections to TCP Port 1433 from computers in your Virtual Network.

    Because SQL Server will be accessed from within the Virtual Network, you do not need to create public endpoints in Windows Azure.

Step 3. Deploy Active Roles Administration Service

Step 3. Deploy Active Roles Administration Service

Perform the following tasks to deploy the Active Roles Administration Service:

  1. Create a virtual machine based on a Windows Server 2016 image published in Windows Azure.

    When creating the virtual machine, on the Virtual machine configuration page, select the Cloud Service that you created for the SQL Server virtual machine in Deploying Microsoft SQL Server. This will automatically select the correct Virtual Network as this Cloud Service is already used to host the SQL Server virtual machine. For further information, see Create Virtual Machine and Deploy to Virtual Network in Add a Virtual Machine to a Virtual Network.

  1. Join the newly created virtual machine to your Active Directory domain.
  2. Connect to the virtual machine using Remote Desktop, and run the Active Roles Setup wizard to install the Active Roles Administration Service (see Steps to deploy the Administration Service earlier in this document).

    When prompted for the service account, specify the appropriate user account defined in your Active Directory domain. Ensure that this user account is a member of the Administrators local group on the virtual machine where you are installing the Administration Service. For example, this could be a domain user account that belongs to the Domain Admins group of your Active Directory domain.

    When prompted for SQL Server, specify the name of the SQL Server you deployed in Deploying Microsoft SQL Server.

  1. Run the following Windows PowerShell command on the virtual machine where you have installed the Active Roles Administration Service, to configure Windows Firewall:

    $allowedClientSubnets = @('10.0.0.0/8', '172.16.0.0/12', '192.168.0.0/16');
    New-NetFirewallRule -DisplayName "Active Roles" -Direction Inbound `
    -Action Allow -Service 'aradminsvc' -RemoteAddress $allowedClientSubnets `
    -Enabled True
     

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating