Common errors and troubleshooting steps for Azure Active Directory Domain Services
As a central part of identity and authentication for applications, Azure Active Directory Domain Services (Azure AD DS) sometimes has problems. If you run into issues, there are some common error messages and associated troubleshooting steps to help you get things running again. At any time, you can also open an Azure support request for additional troubleshooting assistance.
This article provides troubleshooting steps for common issues in Azure AD DS.
You cannot enable Azure AD Domain Services for your Azure AD directory
If you have problems enabling Azure AD DS, review the following common errors and steps to resolve them:
Sample error Message | Resolution |
---|---|
The name aaddscontoso.com is already in use on this network. Specify a name that is not in use. | Domain name conflict in the virtual network |
Domain Services could not be enabled in this Azure AD tenant. The service does not have adequate permissions to the application called 'Azure AD Domain Services Sync'. Delete the application called 'Azure AD Domain Services Sync' and then try to enable Domain Services for your Azure AD tenant. | Domain Services doesn't have adequate permissions to the Azure AD Domain Services Sync application |
Domain Services could not be enabled in this Azure AD tenant. The Domain Services application in your Azure AD tenant does not have the required permissions to enable Domain Services. Delete the application with the application identifier d87dcbc6-a371-462e-88e3-28ad15ec4e64 and then try to enable Domain Services for your Azure AD tenant. | The Domain Services application isn't configured properly in your Azure AD tenant |
Domain Services could not be enabled in this Azure AD tenant. The Microsoft Azure AD application is disabled in your Azure AD tenant. Enable the application with the application identifier 00000002-0000-0000-c000-000000000000 and then try to enable Domain Services for your Azure AD tenant. | The Microsoft Graph application is disabled in your Azure AD tenant |
Domain Name conflict
Error message
The name aaddscontoso.com is already in use on this network. Specify a name that is not in use.
Resolution
Check that you don't have an existing AD DS environment with the same domain name on the same, or a peered, virtual network. For example, you may have an AD DS domain named aaddscontoso.com that runs on Azure VMs. When you try to enable an Azure AD DS managed domain with the same domain name of aaddscontoso.com on the virtual network, the requested operation fails.
This failure is due to name conflicts for the domain name on the virtual network. A DNS lookup checks if an existing AD DS environment responds on the requested domain name. To resolve this failure, use a different name to set up your managed domain, or de-provision the existing AD DS domain and then try again to enable Azure AD DS.
Inadequate permissions
Error message
Domain Services could not be enabled in this Azure AD tenant. The service does not have adequate permissions to the application called 'Azure AD Domain Services Sync'. Delete the application called 'Azure AD Domain Services Sync' and then try to enable Domain Services for your Azure AD tenant.
Resolution
Check if there's an application named Azure AD Domain Services Sync in your Azure AD directory. If this application exists, delete it, then try again to enable Azure AD DS. To check for an existing application and delete it if needed, complete the following steps:
- In the Azure portal, select Azure Active Directory from the left-hand navigation menu.
- Select Enterprise applications. Choose All applications from the Application Type drop-down menu, then select Apply.
- In the search box, enter Azure AD Domain Services Sync. If the application exists, select it and choose Delete.
- Once you've deleted the application, try to enable Azure AD DS again.
Invalid configuration
Error message
Domain Services could not be enabled in this Azure AD tenant. The Domain Services application in your Azure AD tenant does not have the required permissions to enable Domain Services. Delete the application with the application identifier d87dcbc6-a371-462e-88e3-28ad15ec4e64 and then try to enable Domain Services for your Azure AD tenant.
Resolution
Check if you have an existing application named AzureActiveDirectoryDomainControllerServices with an application identifier of d87dcbc6-a371-462e-88e3-28ad15ec4e64 in your Azure AD directory. If this application exists, delete it and then try again to enable Azure AD DS.
Use the following PowerShell script to search for an existing application instance and delete it if needed:
$InformationPreference = "Continue"
$WarningPreference = "Continue"
$aadDsSp = Get-AzureADServicePrincipal -Filter "AppId eq 'd87dcbc6-a371-462e-88e3-28ad15ec4e64'" -ErrorAction Ignore
if ($aadDsSp -ne $null)
{
Write-Information "Found Azure AD Domain Services application. Deleting it ..."
Remove-AzureADServicePrincipal -ObjectId $aadDsSp.ObjectId
Write-Information "Deleted the Azure AD Domain Services application."
}
$identifierUri = "https://sync.aaddc.activedirectory.windowsazure.com"
$appFilter = "IdentifierUris eq '" + $identifierUri + "'"
$app = Get-AzureADApplication -Filter $appFilter
if ($app -ne $null)
{
Write-Information "Found Azure AD Domain Services Sync application. Deleting it ..."
Remove-AzureADApplication -ObjectId $app.ObjectId
Write-Information "Deleted the Azure AD Domain Services Sync application."
}
$spFilter = "ServicePrincipalNames eq '" + $identifierUri + "'"
$sp = Get-AzureADServicePrincipal -Filter $spFilter
if ($sp -ne $null)
{
Write-Information "Found Azure AD Domain Services Sync service principal. Deleting it ..."
Remove-AzureADServicePrincipal -ObjectId $sp.ObjectId
Write-Information "Deleted the Azure AD Domain Services Sync service principal."
}
Microsoft Graph disabled
Error message
Domain Services could not be enabled in this Azure AD tenant. The Microsoft Azure AD application is disabled in your Azure AD tenant. Enable the application with the application identifier 00000002-0000-0000-c000-000000000000 and then try to enable Domain Services for your Azure AD tenant.
Resolution
Check if you've disabled an application with the identifier 00000002-0000-0000-c000-000000000000. This application is the Microsoft Azure AD application and provides Graph API access to your Azure AD tenant. To synchronize your Azure AD tenant, this application must be enabled.
To check the status of this application and enable it if needed, complete the following steps:
- In the Azure portal, select Azure Active Directory from the left-hand navigation menu.
- Select Enterprise applications. Choose All applications from the Application Type drop-down menu, then select Apply.
- In the search box, enter 00000002-0000-0000-c000-00000000000. Select the application, then choose Properties.
- If Enabled for users to sign-in is set to No, set the value to Yes, then select Save.
- Once you've enabled the application, try to enable Azure AD DS again.
Users are unable to sign in to the Azure AD Domain Services managed domain
If one or more users in your Azure AD tenant can't sign in to the managed domain, complete the following troubleshooting steps:
Credentials format - Try using the UPN format to specify credentials, such as
dee@aaddscontoso.onmicrosoft.com
. The UPN format is the recommended way to specify credentials in Azure AD DS. Make sure this UPN is configured correctly in Azure AD.The SAMAccountName for your account, such as AADDSCONTOSO\driley may be autogenerated if there are multiple users with the same UPN prefix in your tenant or if your UPN prefix is overly long. Therefore, the SAMAccountName format for your account may be different from what you expect or use in your on-premises domain.
Password synchronization - Make sure that you've enabled password synchronization for cloud-only users or for hybrid environments using Azure AD Connect.
Hybrid synchronized accounts: If the affected user accounts are synchronized from an on-premises directory, verify the following areas:
You've deployed, or updated to, the latest recommended release of Azure AD Connect.
You've configured Azure AD Connect to perform a full synchronization.
Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in the managed domain. Make sure you wait long enough before trying to authenticate against the managed domain.
If the issue persists after verifying the previous steps, try restarting the Microsoft Azure AD Sync Service. From your Azure AD Connect server, open a command prompt, then run the following commands:
net stop 'Microsoft Azure AD Sync' net start 'Microsoft Azure AD Sync'
Cloud-only accounts: If the affected user account is a cloud-only user account, make sure that the user has changed their password after you enabled Azure AD DS. This password reset causes the required credential hashes for the managed domain to be generated.
Verify the user account is active: By default, five invalid password attempts within 2 minutes on the managed domain cause a user account to be locked out for 30 minutes. The user can't sign in while the account is locked out. After 30 minutes, the user account is automatically unlocked.
- Invalid password attempts on the managed domain don't lock out the user account in Azure AD. The user account is locked out only within the managed domain. Check the user account status in the Active Directory Administrative Console (ADAC) using the management VM, not in Azure AD.
- You can also configure fine grained password policies to change the default lockout threshold and duration.
External accounts - Check that the affected user account isn't an external account in the Azure AD tenant. Examples of external accounts include Microsoft accounts like
dee@live.com
or user accounts from an external Azure AD directory. Azure AD DS doesn't store credentials for external user accounts so they can't sign in to the managed domain.
There are one or more alerts on your managed domain
If there are active alerts on the managed domain, it may prevent the authentication process from working correctly.
To see if there are any active alerts, check the health status of a managed domain. If any alerts are shown, troubleshoot and resolve them.
Users removed from your Azure AD tenant are not removed from your managed domain
Azure AD protects against accidental deletion of user objects. When you delete a user account from an Azure AD tenant, the corresponding user object is moved to the recycle bin. When this delete operation is synchronized to your managed domain, the corresponding user account is marked as disabled. This feature helps you recover, or undelete, the user account.
The user account remains in the disabled state in the managed domain, even if you re-create a user account with the same UPN in the Azure AD directory. To remove the user account from the managed domain, you need to forcibly delete it from the Azure AD tenant.
To fully remove a user account from a managed domain, delete the user permanently from your Azure AD tenant using the Remove-MsolUser PowerShell cmdlet with the -RemoveFromRecycleBin
parameter.
Next steps
If you continue to have issues, open an Azure support request for additional troubleshooting assistance.
Feedback
Submit and view feedback for