title | description | services | author | manager | ms.assetid | ms.service | ms.subservice | ms.workload | ms.topic | ms.date | ms.author |
---|---|---|---|---|---|---|---|---|---|---|---|
Azure Active Directory Domain Services troubleshooting | Microsoft Docs' |
Learn how to troubleshoot common errors when you create or manage Azure Active Directory Domain Services |
active-directory-ds |
iainfoulds |
daveba |
4bc8c604-f57c-4f28-9dac-8b9164a0cf0b |
active-directory |
domain-services |
identity |
conceptual |
09/13/2019 |
iainfou |
As a central part of identity and authentication for applications, Azure Active Directory Domain Services (Azure AD DS) sometimes has problems. If you run into issues, there are some common error messages and associated troubleshooting steps to help you get things running again. At any time, you can also open an Azure support request for additional troubleshooting assistance.
This article provides troubleshooting steps for common issues in Azure AD DS.
If you have problems enabling Azure AD DS, review the following common errors and steps to resolve them:
Sample error Message | Resolution |
---|---|
The name contoso.com is already in use on this network. Specify a name that is not in use. | Domain name conflict in the virtual network |
Domain Services could not be enabled in this Azure AD tenant. The service does not have adequate permissions to the application called 'Azure AD Domain Services Sync'. Delete the application called 'Azure AD Domain Services Sync' and then try to enable Domain Services for your Azure AD tenant. | Domain Services doesn't have adequate permissions to the Azure AD Domain Services Sync application |
Domain Services could not be enabled in this Azure AD tenant. The Domain Services application in your Azure AD tenant does not have the required permissions to enable Domain Services. Delete the application with the application identifier d87dcbc6-a371-462e-88e3-28ad15ec4e64 and then try to enable Domain Services for your Azure AD tenant. | The Domain Services application isn't configured properly in your Azure AD tenant |
Domain Services could not be enabled in this Azure AD tenant. The Microsoft Azure AD application is disabled in your Azure AD tenant. Enable the application with the application identifier 00000002-0000-0000-c000-000000000000 and then try to enable Domain Services for your Azure AD tenant. | The Microsoft Graph application is disabled in your Azure AD tenant |
Error message
The name contoso.com is already in use on this network. Specify a name that is not in use.
Resolution
Check that you don't have an existing AD DS environment with the same domain name on the virtual network. For example, you may have an AD DS domain named contoso.com that runs on Azure VMs. When you try to enable an Azure AD DS managed domain with the same domain name of contoso.com on the virtual network, the requested operation fails.
This failure is due to name conflicts for the domain name on the virtual network. A DNS lookup checks if an existing AD DS environment responds on the requested domain name. To resolve this failure, use a different name to set up your Azure AD DS managed domain, or de-provision the existing AD DS domain and then try again to enable Azure AD DS.
Error message
Domain Services could not be enabled in this Azure AD tenant. The service does not have adequate permissions to the application called 'Azure AD Domain Services Sync'. Delete the application called 'Azure AD Domain Services Sync' and then try to enable Domain Services for your Azure AD tenant.
Resolution
Check if there's an application named Azure AD Domain Services Sync in your Azure AD directory. If this application exists, delete it and then try again to enable Azure AD DS. To check for an existing application and delete it if needed, complete the following steps:
- In the Azure portal, select Azure Active Directory from the left-hand navigation menu.
- Select Enterprise applications. Choose All applications from the Application Type drop-down menu, then select Apply.
- In the search box, enter Azure AD Domain Services Sync. If the application exists, select it and choose Delete.
- Once you've deleted the application, try to enable Azure AD DS again.
Error message
Domain Services could not be enabled in this Azure AD tenant. The Domain Services application in your Azure AD tenant does not have the required permissions to enable Domain Services. Delete the application with the application identifier d87dcbc6-a371-462e-88e3-28ad15ec4e64 and then try to enable Domain Services for your Azure AD tenant.
Resolution
Check if you have an existing application named AzureActiveDirectoryDomainControllerServices with an application identifier of d87dcbc6-a371-462e-88e3-28ad15ec4e64 in your Azure AD directory. If this application exists, delete it and then try again to enable Azure AD DS.
Use the following PowerShell script to search for an existing application instance and delete it if needed.
$InformationPreference = "Continue"
$WarningPreference = "Continue"
$aadDsSp = Get-AzureADServicePrincipal -Filter "AppId eq 'd87dcbc6-a371-462e-88e3-28ad15ec4e64'" -ErrorAction Ignore
if ($aadDsSp -ne $null)
{
Write-Information "Found Azure AD Domain Services application. Deleting it ..."
Remove-AzureADServicePrincipal -ObjectId $aadDsSp.ObjectId
Write-Information "Deleted the Azure AD Domain Services application."
}
$identifierUri = "https://sync.aaddc.activedirectory.windowsazure.com"
$appFilter = "IdentifierUris eq '" + $identifierUri + "'"
$app = Get-AzureADApplication -Filter $appFilter
if ($app -ne $null)
{
Write-Information "Found Azure AD Domain Services Sync application. Deleting it ..."
Remove-AzureADApplication -ObjectId $app.ObjectId
Write-Information "Deleted the Azure AD Domain Services Sync application."
}
$spFilter = "ServicePrincipalNames eq '" + $identifierUri + "'"
$sp = Get-AzureADServicePrincipal -Filter $spFilter
if ($sp -ne $null)
{
Write-Information "Found Azure AD Domain Services Sync service principal. Deleting it ..."
Remove-AzureADServicePrincipal -ObjectId $sp.ObjectId
Write-Information "Deleted the Azure AD Domain Services Sync service principal."
}
Error message
Domain Services could not be enabled in this Azure AD tenant. The Microsoft Azure AD application is disabled in your Azure AD tenant. Enable the application with the application identifier 00000002-0000-0000-c000-000000000000 and then try to enable Domain Services for your Azure AD tenant.
Resolution
Check if you've disabled an application with the identifier 00000002-0000-0000-c000-000000000000. This application is the Microsoft Azure AD application and provides Graph API access to your Azure AD tenant. To synchronize your Azure AD tenant, this application must be enabled.
To check the status of this application and enable it if needed, complete the following steps:
- In the Azure portal, select Azure Active Directory from the left-hand navigation menu.
- Select Enterprise applications. Choose All applications from the Application Type drop-down menu, then select Apply.
- In the search box, enter 00000002-0000-0000-c000-00000000000. Select the application, then choose Properties.
- If Enabled for users to sign-in is set to No, set the value to Yes, then select Save.
- Once you've enabled the application, try to enable Azure AD DS again.
If one or more users in your Azure AD tenant can't sign in to the Azure AD DS managed domain, complete the following troubleshooting steps:
-
Credentials format - Try using the UPN format to specify credentials, such as
[email protected]
. The UPN format is the recommended way to specify credentials in Azure AD DS. Make sure this UPN is configured correctly in Azure AD.The SAMAccountName for your account, such as CONTOSO\driley may be autogenerated if there are multiple users with the same UPN prefix in your tenant or if your UPN prefix is overly long. Therefore, the SAMAccountName format for your account may be different from what you expect or use in your on-premises domain.
-
Password synchronization - Make sure that you've enabled password synchronization for cloud-only users or for hybrid environments using Azure AD Connect.
-
Hybrid synchronized accounts: If the affected user accounts are synchronized from an on-premises directory, verify the following areas:
-
You've deployed or updated to the latest recommended release of Azure AD Connect.
-
You've configured Azure AD Connect to perform a full synchronization.
-
Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in Azure AD DS. Make sure you wait long enough before trying to authenticate against the managed domain.
-
If the issue persists after verifying the previous steps, try restarting the Microsoft Azure AD Sync Service. From your management VM, open a command prompt and run the following commands:
net stop 'Microsoft Azure AD Sync' net start 'Microsoft Azure AD Sync'
-
-
Cloud-only accounts: If the affected user account is a cloud-only user account, make sure that the user has changed their password after you enabled Azure AD DS. This password reset causes the required credential hashes for Azure AD Domain Services to be generated.
-
-
Verify the user account is active: By default, five invalid password attempts within 2 minutes on the managed domain cause a user account to be locked out for 30 minutes. The user can't sign in while the account is locked out. After 30 minutes, the user account is automatically unlocked.
- Invalid password attempts on the Azure AD DS managed domain don't lock out the user account in Azure AD. The user account is locked out only within the managed domain. Check the user account status in the Active Directory Administrative Console (ADAC) using the management VM, not in Azure AD.
- You can also configure fine grained password policies to change the default lockout threshold and duration.
-
External accounts - Check that the affected user account isn't an external account in the Azure AD tenant. Examples of external accounts include Microsoft accounts like
[email protected]
or user accounts from an external Azure AD directory. Azure AD DS doesn't store credentials for external user accounts so they can't sign in to the managed domain.
If there are active alerts on the Azure AD DS managed domain, it may prevent the authentication process from working correctly.
To see if there are any active alerts, check the health status of an Azure AD DS managed domain. If any alerts are shown, troubleshoot and resolve them.
Azure AD protects against accidental deletion of user objects. When you delete a user account from an Azure AD tenant, the corresponding user object is moved to the recycle bin. When this delete operation is synchronized to your Azure AD DS managed domain, the corresponding user account is marked as disabled. This feature helps you recover, or undelete, the user account.
The user account remains in the disabled state in the Azure AD DS managed domain, even if you re-create a user account with the same UPN in the Azure AD directory. To remove the user account from the Azure AD DS managed domain, you need to forcibly delete it from the Azure AD tenant.
To fully remove a user account from an Azure AD DS managed domain, delete the user permanently from your Azure AD tenant using the Remove-MsolUser PowerShell cmdlet with the -RemoveFromRecycleBin
parameter.
If you still have issues, open an Azure support request for additional troubleshooting assistance.