Set up an Active Directory lab (part 1)

Walkthrough of creating an Azure-hosted Active Directory lab using Azure CLI. The guide includes scripted creation of resources and configuration of VMs.

Set up an Active Directory lab (part 1)

These steps are for creating a sandpit Active Directory environment in Azure. The intent was to have a re-usable process, scripted but not fully automated, faster than using the portal. Whether its to test AD features or have an AD platform for testing other types of workloads, the steps to create the lab had to be flexible to adapt to changing requirements.

What features are included in this guide?

  • Creating resources with Azure CLI
  • Creating VMs with and without public IP addresses
  • Creating VMs with unmanaged disks
  • Bootstrapping VMs to create AD domains and install and configure IIS
  • Bootstrapping VMs with static IP addresses and joining the domain
  • Creating NSGs with Network Watcher enabled

What are we building?

The requirements for the build:

  • Two AD forests for a two-way trust
  • Azure AD Connect servers synchronising AD to two trial M365 tenancies
  • App servers hosting IIS web sites configured for Windows authentication for testing kerberos authentication
  • Windows 10 client VMs for testing user authentication and application access
                                  ._________.
                                  | BASTION |
                                  |_________|
 .________.  .________.                                .________.
 | A-DC01 |  | A-DC02 | <---TWO WAY EXTERNAL TRUST---> | B-DC01 |
 |________|  |________|                                |________|
._________.  ._________.                               ._________.
| A-APP01 |  | A-APP02 |                               | B-APP01 |
|  (Web)  |  | (AAD C) |                               |_________|
|_________|  |_________|
     .____________.                                   .____________.
     | A-CLIENT01 |                                   | B-CLIENT01 |
     |____________|                                   |____________|
Hostname Subnet IP Address Role
VM-A-DC01 domainA-ad (10.1.10/24) 10.1.10.10 Domain Controller 1 - Forest root
VM-A-DC02 domainA-ad (10.1.10/24) 10.1.10.11 Domain Controller 2 - Domain 2
VM-A-APP01 domainA-app (10.1.20/24) 10.1.20.20 Web Server
VM-A-APP02 domainA-app (10.1.20/24) 10.1.20.21 Azure AD Connect
VM-A-CLIENT01 domainA-client (10.1.30/24) 10.1.30.30 Windows 10 Client
VM-B-DC01 domainB-ad (10.1.110/24) 10.1.110.10 Domain Controller
VM-B-APP01 domainB-app (10.1.120/24) 10.1.120.20 Web Server & AAD Connect
VM-B-CLIENT01 domainB-client (10.1.130/24) 10.1.130.30 Windows 10 Client
VM-BAS01 public (10.1.200/24) DHCP Bastion Host / Jump Box

Build environment

These steps use Azure CLI which can be run from an Azure Cloud Shell session.

Pre-requisites

You'll need an Azure subscription with sufficient quota for the number of VMs / vCPUs being created. A free trial subscription doesn't allow quota increases and won't have enough to host all VMs.

View your quota from Azure CLI:

az vm list-usage --location $region | ConvertFrom-Json | where currentValue -gt 0

VM sizing quick reference

In case you want to change VM sizes, I kept a quick reference of Azure VM costs for typical non-production instances. This helped to avoid the pain of (circum)navigating Azure VM pricing page.

These are the hourly cost for Windows VMs in East US region in $AUD - so change as required.

# Instance	vCPU	RAM	Temp Storage	PAYG Price $AUD
# B1MS		1	2 GiB	4 GiB		$0.0338/hour	
# B2S		2	4 GiB	8 GiB		$0.0682/hour
# B2MS		2	8 GiB	16 GiB		$0.1253/hour
# A2 v2		2	4 GiB	20 GiB		$0.1868/hour
# D2s v3	2	8 GiB	16 GiB		$0.2582/hour
# A2m v2	2	16 GiB	20 GiB		$0.2472/hour

Declare re-usable variables

These were variables to run as a baseline in any new session. If you need to leave and come back later, or your shell expires, re-run these so they're ready for use later.

$rgName = "jr-trustlab-rg"
$vnetName = "jr-trustlab-vnet-01"
$vnetRange = "10.1.0.0/16"
$subnet1Name = "domainA-ad"
$subnet1Range = "10.1.10.0/24"
$subnet2Name = "domainA-app"
$subnet2Range = "10.1.20.0/24"
$subnet3Name = "domainA-client"
$subnet3Range = "10.1.30.0/24"
$subnet4Name = "domainB-ad"
$subnet4Range = "10.1.110.0/24"
$subnet5Name = "domainB-app"
$subnet5Range = "10.1.120.0/24"
$subnet6Name = "domainB-client"
$subnet6Range = "10.1.130.0/24"
$subnet99Name = "public"
$subnet99Range = "10.1.200.0/24"
$storageName = "jrtrustlabstore"
$region = "EastUS"
$vmPass = '' # Password used in local admin & AD recovery
$userPass = '' # Password used for test user accounts

$vm0Name = "vm-bas01"
$vm1Name = "vm-a-dc01"
$vm1IPAddress = "10.1.10.10"
$vm2Name = "vm-a-dc02"
$vm2IPAddress = "10.1.10.11"
$vm3Name = "vm-a-app01"
$vm3IPAddress = "10.1.20.20"
$vm4Name = "vm-a-app02"
$vm4IPAddress = "10.1.20.21"
$vm5Name = "vm-a-client01"
$vm5IPAddress = "10.1.30.30"
$vmB1Name = "vm-b-dc01"
$vmB1IPAddress = "10.1.110.10"
$vmB2Name = "vm-b-app01"
$vmB2IPAddress = "10.1.120.20"
$vmB3Name = "vm-b-client01"
$vmB3IPAddress = "10.1.130.30"

Create resource group

A single RG will host all resources [az group create].

az group create -l $region -n $rgName

Create virtual network

A single VNet will host all resources, segmented using Network Security Groups [az vnet network].

az network vnet create -g $rgName -n $vnetName --address-prefix $vnetRange --subnet-name $subnet1Name --subnet-prefixes $subnet1Range
az network vnet subnet create -g $rgName --vnet-name $vnetName -n $subnet2Name --address-prefixes $subnet2Range
az network vnet subnet create -g $rgName --vnet-name $vnetName -n $subnet3Name --address-prefixes $subnet3Range
az network vnet subnet create -g $rgName --vnet-name $vnetName -n $subnet4Name --address-prefixes $subnet4Range
az network vnet subnet create -g $rgName --vnet-name $vnetName -n $subnet5Name --address-prefixes $subnet5Range
az network vnet subnet create -g $rgName --vnet-name $vnetName -n $subnet6Name --address-prefixes $subnet6Range
az network vnet subnet create -g $rgName --vnet-name $vnetName -n $subnet99Name --address-prefixes $subnet99Range

# Optional - create Log Analaytics Workspace for Network Watcher traffic analysis
$logWsName = "jr-trustlab-logs"
az monitor log-analytics workspace create -g $rgName -n $logWsName --quota 1
az provider register --namespace Microsoft.Insights

Create storage account

The storage account will host the VM disks [az storage account].

$storageSku = "Standard_LRS"
$storageKind = "StorageV2"
az storage account create -n $storageName -g $rgName --sku $storageSku --kind $storageKind

Create VM#0 - Bastion Host

This VM is the jump box that is used to RDP to the other "internal" VMs [az vm].

  • VM-BAS01
  • Unmanaged OS disk
  • Windows Server 2019 OS
  • Public IP and DNS name of 'jr-bas.eastus.cloudapp.azure.com'
  • NSG with flow logs but without Network Watcher

Create NSG

$nsg0Name = "jr-trustlab-nsg-bastion"
$nsg0TrustedIP = "" # Replace with own source IP(s) where you'll allow RDP

az network nsg create -n $nsg0Name -g $rgName
az network vnet subnet update -g $rgName -n $subnet99Name --vnet-name $vnetName --network-security-group $nsg0Name
az network nsg rule create --nsg-name $nsg0Name -g $rgName -n "AllowRDP" --priority 100 --access "allow" --source-address-prefixes $nsg0TrustedIP --destination-address-prefixes $subnet99Range --destination-port-ranges "3389" --protocol "TCP" --description "Allow RDP from trusted IPs"

# Think twice about flow logging on a public IP - could be noisy ... and you pay for data generated
# Or at least consider Flow Logs without Traffic Analytics.
$flow0LogName = "jr-trustlab-flow-public"
az network watcher flow-log create -n $flow0LogName -g $rgName --enabled true --nsg $nsg0Name --storage-account $storageName --location $region --format JSON --log-version 2 --retention 7 #--traffic-analytics --workspace $logWsName

Create VM

$vm0Image = "Win2019Datacenter"
$vm0User = "lcladmin"
$vm0Pass = $vmPass
$vm0Size = "Standard_DS2_v2"
$vm0PublicName = "jr-trustlab-bas" # jr-bas.eastus.cloudapp.azure.com
$vm0PIPName = "jr-trustlab-pip01"
$vm0DiskGuid = [guid]::NewGuid().ToString().Replace("-","").Substring(0,10)

az vm create -n $vm0Name -g $rgName --image $vm0Image --admin-username $vm0User --admin-password $vm0Pass --computer-name $vm0Name --size $vm0Size --vnet-name $vnetName --subnet $subnet99Name --storage-account $storageName --use-unmanaged-disk --public-ip-address-dns-name $vm0PublicName --public-ip-address $vm0PIPName --os-disk-name "$($vm0Name)-OSdisk-$($vm0DiskGuid)" --nsg '""'

# Install-WindowsFeature rsat-adds -IncludeAllSubFeature
az vm extension set -n BGInfo --publisher Microsoft.Compute --version 2.1 --vm-name $vm0Name -g $rgName

Create VM#1 - DomainA DC01

  • VM-A-DC01
  • Unmanaged OS & data disk
  • Windows Server 2019
  • Static IP address and more importantly DNS server IP
  • Create new AD forest 'corp.local'

Create NSG

# Create NSG - A-DC
$nsg1Name = "jr-trustlab-nsg-a-ad"
az network nsg create -n $nsg1Name -g $rgName

# Add rules to NSG to allow AD traffic
az network vnet subnet update -g $rgName -n $subnet1Name --vnet-name $vnetName --network-security-group $nsg1Name
az network nsg rule create --nsg-name $nsg1Name -g $rgName -n "Allow_RDP" --priority 100 --access "allow" --source-address-prefixes $subnet99Range --destination-address-prefixes $subnet1Range --destination-port-ranges "3389" --protocol "TCP" --description "Allow RDP from Bastion"
az network nsg rule create --nsg-name $nsg1Name -g $rgName -n "Allow_AD_TCP" --priority 110 --access "allow" --source-address-prefixes $subnet1Range $subnet2Range $subnet3Range --destination-address-prefixes $subnet1Range --destination-port-ranges 135 389 636 53 88 445 49152-65535 --protocol "TCP" --description "Allow AD traffic TCP"
az network nsg rule create --nsg-name $nsg1Name -g $rgName -n "Allow_AD_UDP" --priority 111 --access "allow" --source-address-prefixes $subnet1Range $subnet2Range $subnet3Range --destination-address-prefixes $subnet1Range --destination-port-ranges 53 88 389 --protocol "UDP" --description "Allow AD traffic UDP"
az network nsg rule create --nsg-name $nsg1Name -g $rgName -n "Allow_B_AD_TCP" --priority 120 --access "allow" --source-address-prefixes $vmB1IPAddress --destination-address-prefixes $vm3IPAddress --destination-port-ranges 135 389 636 53 88 445 49152-65535 --protocol "TCP" --description "Allow AD traffic TCP"
az network nsg rule create --nsg-name $nsg1Name -g $rgName -n "Allow_B_AD_UDP" --priority 121 --access "allow" --source-address-prefixes $vmB1IPAddress --destination-address-prefixes $vm3IPAddress --destination-port-ranges 53 88 389 --protocol "UDP" --description "Allow AD traffic UDP"
az network nsg rule create --nsg-name $nsg1Name -g $rgName -n "Deny_Inbound" --priority 4000 --access "deny" --source-address-prefixes "*" --destination-address-prefixes $subnet1Range --destination-port-ranges "*" --protocol "*" --description "Deny inbound traffic"

# Enable Network Watcher with Traffic Analytics
$flowLogName = "jr-trustlab-flow-ad"
az network watcher flow-log create -n $flowLogName -g $rgName --enabled true --nsg $nsg1Name --storage-account $storageName --location $region --format JSON --log-version 2 --retention 7 --traffic-analytics --workspace $logWsName

Create VM

$vm1Image = "Win2019Datacenter"
$vm1User = "lcladmin"
$vm1Pass = $vmPass
$vm1Size = "Standard_B2ms"
$vm1DiskGuid = [guid]::NewGuid().ToString().Replace("-","").Substring(0,10)

# Create VM
az vm create -n $vm1Name -g $rgName --image $vm1Image --admin-username $vm1User --admin-password $vm1Pass --computer-name $vm1Name --size $vm1Size --vnet-name $vnetName --subnet $subnet1Name --private-ip-address $vm1IPAddress --storage-account $storageName --use-unmanaged-disk --os-disk-name "$($vm1Name)-OSdisk-$($vm1DiskGuid)" --nsg '""' --public-ip-address '""'

# Attach data disk
$disk1Guid = [guid]::NewGuid().ToString().Replace("-","").Substring(0,10)
$disk1Name = "$($vm1Name)-DataDisk-$($disk1Guid)"
$disk1Size = "64"
$disk1Cache = "None"
az vm unmanaged-disk attach -g $rgName --vm-name $vm1Name --new --name $disk1Name --size-gb $disk1Size --caching $disk1Cache

Install ADDS

  • Set static IP address and DNS server
  • Install Active Directory Domain Services
  • Install forest 'corp.local'
$dcA1Domain="corp.local"
$dcA1DomainNetbios="corp"

$scriptADC01_1 = @"
Set-TimeZone -id 'E. Australia Standard Time'
`$disks = Get-Disk | Where partitionstyle -eq 'raw'
If (`$disks) {
  `$disks | Initialize-Disk -PartitionStyle MBR -PassThru | New-Partition -UseMaximumSize -DriveLetter ""G"" | Format-Volume -FileSystem NTFS -NewFileSystemLabel ""Data"" -Confirm:`$false -Force
}
`$domain = ""$dcA1Domain""
`$domainnetbios = ""$dcA1DomainNetbios""
`$IP = ""$vm1IPAddress""
`$MaskBits = 24
`$Gateway = ""$($vm1IPAddress -split "\d{1,3}$" -join "1")""
`$DNS = ""$vm1IPAddress""
`$IPType = ""IPv4""
`$adapter = Get-NetAdapter | ? {`$_.Status -eq ""up""}
`$interface = `$adapter | Get-NetIPInterface -AddressFamily `$IPType
If (`$interface.Dhcp -eq ""Enabled"") {
  Get-NetAdapterBinding -ComponentID ms_tcpip6 | Disable-NetAdapterBinding
  If ((`$adapter | Get-NetIPConfiguration).IPv4Address.IPAddress) {
    `$adapter | Remove-NetIPAddress -AddressFamily `$IPType -Confirm:`$false
  }
  If ((`$adapter | Get-NetIPConfiguration).Ipv4DefaultGateway) {
    `$adapter | Remove-NetRoute -AddressFamily `$IPType -Confirm:`$false
  }
  `$adapter | New-NetIPAddress -AddressFamily `$IPType -IPAddress `$IP -PrefixLength `$MaskBits -DefaultGateway `$Gateway
  `$adapter | Set-DnsClientServerAddress -ServerAddresses `$DNS
}

Install-WindowsFeature AD-Domain-Services, rsat-adds -IncludeAllSubFeature
Install-ADDSForest -DomainName `$domain -SafeModeAdministratorPassword (convertto-securestring '$vm1Pass' -asplaintext -force)  -DomainMode Win2012R2 -DomainNetbiosName `$domainnetbios -ForestMode Win2012R2 -DatabasePath """G:\NTDS""" -SysvolPath """G:\SYSVOL""" -LogPath """G:\Logs""" -Force"

"@

az vm run-command invoke --command-id RunPowerShellScript --name $vm1Name -g $rgName --scripts $scriptADC01_1
  • Add UPN suffix 'contoso.com' to forest
$dcA2UPNSuffix = "contoso.com"

$scriptADC01_2 = @"
try{
  Import-Module ActiveDirectory -ErrorAction Stop
}catch{
  throw ""Module ActiveDirectory not installed""
}

if ((Get-ADForest).UPNsuffixes -notcontains ""$dcA2UPNSuffix""){
  Get-ADForest | Set-ADForest -UPNSuffixes @{add=""$dcA2UPNSuffix""}
}
"@
az vm run-command invoke --command-id RunPowerShellScript --name $vm1Name -g $rgName --scripts $scriptADC01_2

Create VM#2 - DomainA DC02

  • VM-A-DC02
  • Unmanaged OS & data disks
  • Windows Server 2019
  • Static IP address and DNS server
  • Create new AD domain 'contoso.internal' as part of existing forest

Re-use NSG

Nothing to do. This VM lives in the same subnet as VM-A-DC01 and the NSG has already been created & configured.

Create VM

$vm2Image = "Win2019Datacenter"
$vm2User = "lcladmin"
$vm2Pass = $vmPass
$vm2Size = "Standard_B2ms"
$vm2DiskGuid = [guid]::NewGuid().ToString().Replace("-","").Substring(0,10)

az vm create -n $vm2Name -g $rgName --image $vm2Image --admin-username $vm2User --admin-password $vm2Pass --computer-name $vm2Name --size $vm2Size --vnet-name $vnetName --subnet $subnet1Name --private-ip-address $vm2IPAddress --storage-account $storageName --use-unmanaged-disk --os-disk-name "$($vm2Name)-OSdisk-$($vm2DiskGuid)" --nsg '""' --public-ip-address '""'

# Attach data disk
$disk2Guid = [guid]::NewGuid().ToString().Replace("-","").Substring(0,10)
$disk2Name = "$($vm2Name)-DataDisk-$($vm2DiskGuid)"
$disk2Size = "64"
$disk2Cache = "None"
az vm unmanaged-disk attach -g $rgName --vm-name $vm2Name --new --name $disk2Name --size-gb $disk2Size --caching $disk2Cache

Install ADDS

  • Set static IP address
  • Install Active Directory Domain Services
  • Install domain 'contoso.internal'
  • Add public domain 'contoso.com' as UPN suffix
$dcA1Domain="corp.local"
$dcA1DomainNetbios="corp"
$dcA1DomainDN="DC=corp,DC=local"
$dcA2Domain="contoso.internal"
$dcA2DomainNetbios="contoso"
$dcA2UPNSuffix="contoso.com"
$dcA2DomainDN="DC=contoso,DC=internal"
$dcBDomain="wingtip.root"

$scriptADC02_1 = @"
Set-TimeZone -id 'E. Australia Standard Time'
`$disks = Get-Disk | Where partitionstyle -eq 'raw'
If (`$disks) {
  `$disks | Initialize-Disk -PartitionStyle MBR -PassThru | New-Partition -UseMaximumSize -DriveLetter ""G"" | Format-Volume -FileSystem NTFS -NewFileSystemLabel ""Data"" -Confirm:`$false -Force
}
`$domain = ""$dcA2Domain""
`$domainnetbios = ""$dcA2DomainNetbios""
`$IP = ""$vm2IPAddress""
`$MaskBits = 24
`$Gateway = ""$($vm2IPAddress -split "\d{1,3}$" -join "1")""
`$DNS = ""$vm1IPAddress""
`$IPType = ""IPv4""
`$adapter = Get-NetAdapter | ? {`$_.Status -eq ""up""}
`$interface = `$adapter | Get-NetIPInterface -AddressFamily `$IPType
If (`$interface.Dhcp -eq ""Enabled"") {
  Get-NetAdapterBinding -ComponentID ms_tcpip6 | Disable-NetAdapterBinding
  If ((`$adapter | Get-NetIPConfiguration).IPv4Address.IPAddress) {
    `$adapter | Remove-NetIPAddress -AddressFamily `$IPType -Confirm:`$false
  }
  If ((`$adapter | Get-NetIPConfiguration).Ipv4DefaultGateway) {
    `$adapter | Remove-NetRoute -AddressFamily `$IPType -Confirm:`$false
  }
  `$adapter | New-NetIPAddress -AddressFamily `$IPType -IPAddress `$IP -PrefixLength `$MaskBits -DefaultGateway `$Gateway
  `$adapter | Set-DnsClientServerAddress -ServerAddresses `$DNS
}

Install-WindowsFeature AD-Domain-Services, rsat-adds -IncludeAllSubFeature

`$password = ConvertTo-SecureString '$vm2Pass' -AsPlainText -Force
`$adminCred = New-Object System.Management.Automation.PSCredential -ArgumentList (""$dcA1Domain\$vm1User"", `$password)

Install-ADDSDomain -Credential `$adminCred -SafeModeAdministratorPassword (convertto-securestring '$vm2Pass' -asplaintext -force) -NewDomainName `$domain -NewDomainNetbiosName `$omainnetbios -ParentDomainName ""$dcA1Domain"" -InstallDNS -DomainMode Win2012R2 -DomainType TreeDomain -ReplicationSourceDC ""$vm1Name.$dcA1Domain"" -DatabasePath ""G:\NTDS"" -SYSVOLPath ""G:\SYSVOL"" -LogPath ""G:\Logs"" -Force 

"@

az vm run-command invoke --command-id RunPowerShellScript --name $vm2Name -g $rgName --scripts $scriptADC02_1

az vm restart -g $rgName -n $vm2Name

Create test user accounts

  • Configure AD & create OUs
$scriptADC02_2 = @"
try{
  Import-Module ActiveDirectory -ErrorAction Stop
}catch{
  throw ""Module ActiveDirectory not installed""
}

`$password = ConvertTo-SecureString '$vm2Pass' -AsPlainText -Force
`$adminCred = New-Object System.Management.Automation.PSCredential -ArgumentList (""$dcA1Domain\$vm1User"", `$password)

Enable-ADOptionalFeature -Identity ""CN=Recycle Bin Feature,CN=Optional Features,CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,$dcA1DomainDN"" -Scope ForestOrConfigurationSet -Target ""$dcA2Domain"" -Confirm:`$false -Credential `$adminCred

if ((Get-ADForest).UPNsuffixes -notcontains ""$dcA2UPNSuffix""){
  `$password = ConvertTo-SecureString '$vm1Pass' -AsPlainText -Force
  `$adminCred = New-Object System.Management.Automation.PSCredential -ArgumentList (""$dcA1Domain\$vm1User"", `$password)
  Get-ADForest | Set-ADForest -UPNSuffixes @{add=""$dcA2UPNSuffix""} -Credential `$adminCred
}

function New-ADOU {
  # http://www.alexandreviot.net/2015/04/27/active-directory-create-ou-using-powershell
  param([parameter(Mandatory=`$true)] [array]`$ouList)
  ForEach(`$OU in `$ouList){
    try{
      New-ADOrganizationalUnit -Name ""`$(`$OU.Name)"" -Path ""`$(`$OU.Path)""
    }catch{
       Write-Host `$error[0].Exception.Message
    }
  }
}
`$ouCSV = ""Name;Path
S_SERVERS;$dcA2DomainDN
S_USERS;$dcA2DomainDN
ServiceAccounts;ou=S_USERS,$dcA2DomainDN
Staff;ou=S_USERS,$dcA2DomainDN
S_WORKSTATIONS;$dcA2DomainDN
S_GROUPS;$dcA2DomainDN""
`$ouList = `$ouCSV | ConvertFrom-CSV -Delimiter "";""

New-ADOU `$ouList
New-ADGroup -Name ""Grp_AllStaff"" -SamAccountName Grp_AllStaff -GroupCategory Security -GroupScope Global -DisplayName ""Grp_All Staff"" -Path ""OU=S_GROUPS,$dcA2DomainDN""

"@

az vm run-command invoke --command-id RunPowerShellScript --name $vm2Name -g $rgName --scripts $scriptADC02_2
  • Create test users
$scriptADC02_3 = @"
try{
  Import-Module ActiveDirectory -ErrorAction Stop
}catch{
  throw ""Module ActiveDirectory not installed""
}

function Create-TestUsers {
  param(
    [parameter(Mandatory=`$true)] [array]`$UserList,
    [parameter(Mandatory=`$true)] [string]`$UserPass,
    [parameter(Mandatory=`$true)] [string]`$DomainSuffix,
    [parameter(Mandatory=`$true)] [string]`$OUPath
  )

  # https://365lab.net/2014/01/08/create-test-users-in-a-domain-with-powershell/
  `$departments = @(""IT"",""Finance"",""Logistics"",""Sourcing"",""Human Resources"")
  ForEach(`$user in `$userList){
    `$firstname = (Get-Culture).TextInfo.ToTitleCase(`$user.Firstname)
    `$lastname = (Get-Culture).TextInfo.ToTitleCase(`$user.Lastname)
    `$i = get-random -Minimum 0 -Maximum `$departments.count
    `$department = `$departments[`$i]
    `$username = `$firstname.Substring(0,2).tolower() + `$lastname.Substring(0,4).tolower()
    `$exit = 0
    `$count = 1
    do {
      try {
        `$userexists = Get-AdUser -Identity `$username
        `$username = `$firstname.Substring(0,2).tolower() + `$lastname.Substring(0,4).tolower() + `$count++
      } catch {
        `$exit = 1
      }
    } while (`$exit -eq 0)
    `$displayname = `$firstname + "" "" + `$lastname
    `$upn = `$username + ""@"" + `$DomainSuffix
    `$email = `$firstname + ""."" + `$lastname + ""@"" + `$DomainSuffix
    Write-Host ""Creating user `$username in `$OUPath""
    New-ADUser -Name `$displayName -DisplayName `$displayName -SamAccountName `$username -UserPrincipalName `$upn -EmailAddress `$email -GivenName `$firstname -Surname `$lastname -description ""Test User"" -Path `$OUPath -Enabled `$true -ChangePasswordAtLogon `$false -Department `$Department -AccountPassword (ConvertTo-SecureString `$userPass -AsPlainText -force)
  }
}

`$userOU = ""ou=Staff,ou=S_USERS,$dcA2DomainDN""
`$userPass = '$userPass'
`$usersCSV = ""Firstname;Lastname
barry;tycholiz
benjamin;rogers
bill;rapp
bill;williams
brad;mckay
cara;semperger
carol;stclair
chris;dorland
chris;germany
chris;stokley
cooper;richey
craig;dean
dana;davis
danny;mccarty
dan;hyvl
daren;farmer
darrell;schoolcraft
darron;cgiron
david;delainey""
`$userList = `$usersCSV | ConvertFrom-CSV -Delimiter "";""

`$users = Get-ADUser -Filter * -SearchBase `$userOU | select -expand samAccountName
If ((`$users) -eq `$null) {
  Create-TestUsers `$userList `$userPass ""$dcA2UPNSuffix"" `$userOU
}
`$users = Get-ADUser -Filter * -SearchBase `$userOU | select -expand samAccountName
`$group = ""Grp_AllStaff""
Add-ADGroupMember -Identity `$group -Members `$users

"@
az vm run-command invoke --command-id RunPowerShellScript --name $vm2Name -g $rgName --scripts $scriptADC02_3
  • Create service account for Azure AD Connect
  • Create DNS conditional forwarder for Domain B (placeholder)
$scriptADC02_4 = @"

`$displayName = ""svc-azuresync""
`$username = ""svc-azuresync""
`$upn = ""svc-azuresync@$dcA2UPNSuffix""
`$OUPath = ""OU=ServiceAccounts,OU=S_USERS,$dcA2DomainDN""
`$userPass = '$vmPass'

New-ADUser -Name `$displayName -DisplayName `$displayName -SamAccountName `$username -UserPrincipalName `$upn -description ""AAD Connect"" -Path `$OUPath -Enabled `$true -ChangePasswordAtLogon `$false -Department `$Department -AccountPassword (ConvertTo-SecureString `$userPass -AsPlainText -force)
"@

az vm run-command invoke --command-id RunPowerShellScript --name $vm2Name -g $rgName --scripts $scriptADC02_4
$scriptADC02_5 = @"
Add-DnsServerConditionalForwarderZone -Name ""$dcBDomain"" -ReplicationScope ""Forest"" -MasterServers $vmB1IPAddress
"@

az vm run-command invoke --command-id RunPowerShellScript --name $vm2Name -g $rgName --scripts $scriptADC02_5

Wrap up

That's it for part 1. More steps to come.