次の方法で共有


Deploy test environments on Azure

Important

This content is archived and is not being updated. For the latest documentation, see Microsoft Dynamics 365 product documentation. For the latest release plans, see Dynamics 365 and Microsoft Power Platform release plans.

Prerequisites

Before you complete the procedures in this article, make sure that the following prerequisites are in place.

Category Prerequisite
Required tasks Plan AX 2012 R3 deployments on Azure

1. Log on to Lifecycle Services

Microsoft Dynamics Lifecycle Services provides a cloud-based collaborative workspace that customers and partners can use to manage Microsoft Dynamics AX projects. You’ll use this website to deploy AX 2012 R3 on Azure. Lifecycle Services is available to customers and partners as part of their support plans. You can access it with your CustomerSource or PartnerSource credentials. Log on to Lifecycle Services

2. Create a project

After you log in to Lifecycle Services, open an existing project, or create a new project. Projects are the key organizer of your experience in Lifecycle Services. The methodology associated with a project determines which phases and tasks are included in the project by default.

3. Connect the project to your Azure subscription

Connect the Lifecycle Services project to your Azure subscription. This will enable Lifecycle Services to deploy an AX 2012 R3 environment to the subscription. To connect the project to your Azure subscription, complete the following procedure. Keep in mind that a project can be connected to only one Azure subscription. If you have multiple Azure subscriptions, be sure to identify which subscription you want to use before you complete this procedure.

  1. Click Cloud-hosted environments. The Cloud-hosted environments page is displayed.

  2. The Microsoft Azure setup panel is displayed on the side of the screen. If it is not displayed, click Microsoft Azure settings.

  3. Enter your Azure subscription ID. If you need to find your subscription ID, complete the following steps:

    1. Open another instance of your browser.
    2. Log on to the Azure management portal.
    3. In the navigation pane on the left, click Settings. (You may have to scroll to the bottom of the navigation pane to see the Settings link.) The Settings page is displayed.
    4. Copy your subscription ID, and then paste it into the Azure subscription ID field in Lifecycle Services (which is currently displayed in another browser instance).
  4. Click Next.

  5. Click Download to download a management certificate. This management certificate enables Lifecycle Services to communicate with Azure on your behalf. By default, the management certificate is saved to the Downloads folder on your computer and is named LifecycleServicesDeployment.cer.

  6. Upload the management certificate to Azure. To do so, complete the following steps:

    1. Open another instance of your browser. (Or, go to the browser instance that you may have opened in step 3.)
    2. Log on to the Azure management portal.
    3. In the navigation pane on the left, click Settings. The Settings page is displayed.
    4. Click Management certificates.
    5. Click Upload at the bottom of the page.
    6. In the Upload a management certificate window, browse to the management certificate that you downloaded in step 5. Then click the check mark.
  7. Go back to the browser that displays the Microsoft Azure setup panel in Lifecycle Services. Click Next.

  8. Select the region that is closest to you. The AX 2012 R3 environment will be deployed to a datacenter in this region.

  9. Click Connect. The project is now connected to the Azure subscription that you specified. If you discover that you connected the project to the wrong Azure subscription (that is, assuming you have multiple Azure subscriptions), you’ll need to delete the project, create a new project, and then repeat this procedure to connect the new project to the appropriate Azure subscription.

4. Connect your corporate network to the Azure virtual network

The following sections provide information about how to configure the Azure virtual network and domain so that your corporate users can access AX 2012 R3. It is recommended that if you require login to these systems using corporate credentials that you set up the connectivity before you deploy the environment. This will require using Azure networking capabilities to extend you corporate network to one or more Azure virtual networks. It will additionally require you to deploy an Active Directory into the Azure virtual network, which will be set up for trust to your corporate Active Directory. This Active Directory will be used to manage VM-related resources in the Azure virtual network. This Active Directory will not be used for single sign-on, and should not be set up to sync the corporate directory. Single sign-on capabilities will be provided through the domain trust.

Create a site-to-site VPN connection

To enable corporate users to access resources on the virtual machines in the Azure virtual network, you’ll need to create a site-to-site VPN connection between the Azure virtual network and your on-premises, corporate network. For information about how to do this, see the Azure documentation.

Create an Active Directory account in Azure

An Active Directory is required in the Azure virtual network. An Active Directory can be deployed to the Azure virtual network. Please follow Guidelines for Deploying Windows Server Active Directory on Azure Virtual Machines. Please note that Active Directory Federation Services is not presently supported with AX 2012 R3. If you are providing the Active Directory, you will need to create the following service accounts within it that can be used by LCS deployment services when you deploy the environment.

Account Description
<DomainName>AXServiceUser AX 2012 R3 service account
<DomainName>AOSServiceUser AOS service account
<DomainName>BCProxyUser Business Connector proxy account
<DomainName>SPServiceUser SharePoint service account
<DomainName>SqlServiceUser SQL Server service account
<DomainName>DynamicsInstallUser AX 2012 R3 installation account
Note: This account must have permission to join computers to the domain. To give this account permission, complete the following steps:
  1. Click Start, click Run, type dsa.msc, and then click OK.
  2. In the task pane, expand the domain node.
  3. Locate and right-click the organizational unit that you want to modify, and then click Delegate Control.
  4. In the Delegation of Control Wizard, click Next.
  5. Click Add to add a specific user or a specific group to the list, and then click Next.
  6. In the Tasks to Delegate page, click Create a custom task to delegate, and then click Next.
  7. Click Only the following objects in the folder, and then from the list, click to select the Computer objects check box. Then, select the check boxes below the list, Create selected objects in this folder and Delete selected objects in this folder.
  8. Click Next.
  9. In the Permissions list, click to select the following check boxes:
    • Reset Password
    • Read and write Account Restrictions
    • Validated write to DNS host name
    • Validated write to service principal name
  10. Click Next, and then click Finish.
  11. Close the Active Directory Users and Computers MMC snap-in.

You will need to provide the passwords for these accounts when you deploy the environment.

Create a domain trust

To enable corporate users to access resources on the virtual machines in your Azure domain, you must create an Active Directory trust between the domains. For information about how to create a trust, see Create a Forest Trust. This process is the same process you would use to create a trust between two on-premises domains.

Give the Administrators group the right to log on as a batch job

Log in to the Active Directory domain controller and complete the following steps to give the built-in Administrators group the right to log on as a batch job.

  1. Click Start, click All Programs, and then click Administrative Tools.
  2. In the Administrative Tools menu, select Group Policy Management.
  3. In the Group Policy Management console tree, click Forest: <ServerName>, and then click Domains.
  4. Click the name of your server, expand Domain Controllers, right-click Default Domain Controllers Policy, and then click Edit.
  5. In the Group Policy Management Editor, click Default Domain Controllers Policy <ServerName> Policy, expand Computer Configuration, and then click Policies.
  6. In the Policies tree, expand Windows Setting, and then click Security Settings.
  7. In the Security Settings tree, expand Local Policies, and then click User Rights Assignment.
  8. In the results pane, scroll to and then click Log on as a batch job.
  9. In the Log on as a batch job Properties dialog box, click Add User or Group.
  10. In the Add User or Group dialog box, click Browse.
  11. In the Select Users, Computers, or Groups dialog box, type Administrators.
  12. Click Check Names to verify that the built-in Administrators account appears, and then click OK three times.

Change the default organizational unit

If you want virtual machines to be added to Active Directory in a custom organizational unit—versus the default organizational unit—you can change the default organizational unit in your Active Directory prior to starting deployment. For more information, click here.

5. Deploy a test environment on Azure

Complete the following procedure to deploy a test environment on Azure.

  1. On the Cloud-hosted environments page, click the Add (+) icon.

  2. In the Select environment topology panel, select Dev/test.

  3. Click Test.

  4. In the Environment name field, enter a name for the environment that will be deployed.

  5. Click Advanced settings.

  6. To customize domain settings, click Customize domain settings. Then use the following table to enter information.

    If you want to: Do this:
    Create a new domain in Azure for the environment
    1. Click New domain.
    2. Enter a name for the domain. By default, the domain is named contoso.com.
    Add the environment to an existing domain in Azure
    1. Click Existing domain.
    2. Enter the name of the domain. For example, contoso.com.
  7. To customize the service accounts that will be created in the domain, click Customize service accounts. Service accounts and/or service account passwords may be specified through the Advanced Settings option for a deployment. If neither is provided, default accounts are used and random passwords are selected. Use these features when you want to maintain account naming and password rules for your corporation. Account and password rules:

    • A valid service name must be less than 20 characters with no special characters.
    • A valid password must be more than 8 characters and contain uppercase letters, lowercase letters, numbers, and at least one of the following characters: ['@', '!', '=', '*']. You can’t use common passwords, such as: pass@word1
  8. To select the version of AX 2012 R3 that you want use, click Supported version. By default, the AX 2012 R3 CU8 version of this environment will be deployed. If you don’t want to use the CU8 version, select Dynamics ERP 2012 R3 RTM from the list.

  9. To customize virtual machine names, click Customize virtual machine names. In order to support common IT naming guidelines, the ability to name virtual machines is provided through the Advanced settings option on most deployment topologies. In addition to defining the name, a starting index can be selected for each virtual machine type. The index is incremented for each instance of the virtual machine type that is deployed. Virtual machine names must be 13 characters or less. The index is separated from the machine name by a hyphen (-), followed by the index that supports a maximum of 2 digits. Example: ACustomVMName-99 When virtual machine instances are added to an environment after the initial deployment, the deployment service will start incrementing the virtual machine name where it left off. For example, if you deployed four AOS virtual machines with a starting index of 2, then the last AOS instance name will be AOS-6. If you add two more AOS instances, they will be AOS-7 and AOS-8. If one of the virtual machine types in your deployment is customized, then all of the virtual machine names must be customized. This is done to ensure that a long deployment does not occur because a virtual machine name was accidentally missed.

  10. If you have selected to deploy a Remote Desktop Services virtual machine, click Customize remote desktop services to specify how your users will access AX 2012 R3 via the web. Select one of the following options:

    • Remote Desktop: This option enables users to login to a full remote desktop.
    • RemoteApp Programs: This option enables users to login in to AX 2012 R3 directly, without having the experience of a full desktop window. RemoteApp is enabled by default.

    After the environment has been deployed, the following links are available to you on the Cloud-hosted environments page:

    • RDS Web Access certificate: This is a self-signed certificate that is provided to allow secured access to the RDS Web Access site. Click the link and open this certificate and install it into the Local Machine > Trusted Root Certification Authorities node before attempting to access the RDS Web Access site. It is recommended that before this environment be placed into a production capacity that you install your own certificate to the RDS cluster.
    • RDS Web Access: This allows users to gain access to the AX 2012 R3 environment over the web. If you chose the Remote Desktop option, users will be offered the ability to login to a full remote desktop. If you chose RemoteApp Programs, users will be able to log in directly to AX 2012 R3.
    • RDS Farm Access: This allows users to gain access to the AX 2012 R3 environment over a VPN connected network. This feature is only available if you have:
      1. Joined this AX deployment to a VPN connected corporate domain.
      2. Configured the RDS Gateway to accept connections from the VPN connected network.

    Note

    For both RDS Web Access and RDS Farm Access, when joining a deployment to an existing Active Directory domain you must add the RDS Farm to your AD/DNS with the IP address of the Internal Load Balancer. See the following steps:

    1. Get the name of your RDS Farm: This can be obtained from the RDS Farm Access link in LCS. In this case, it should be RdsFarm0c0fa75.

      Get the name of your RDS Farm

    2. Get the IP of the Internal Load Balancer from the Cloud Service dashboard in Azure Portal. Inspect the RDS machine that has an internal IP next to port 3389. In the below example, the Internal Load Balancer IP is 10.1.3.4.

      Get the IP of the Internal Load Balancer from the Cloud Service dashboard in Azure Portal

    3. Add the RDS Farm as a Computer in your AD, using the information obtained above.

      Add the RDS Farm as a Computer in your AD

    Failure to do these steps results in the following error when going through RD Web Access: Remote Desktop can't find the computer "RdsFarm0c0fa75.contoso.com". This might mean that " RdsFarm0c0fa75.contoso.com" does not belong to the specified network. Verify the computer name and domain that you are trying to connect to.

  11. To customize virtual network settings, click Customize virtual network. Then use the following table to enter information.

    If you want to: Do this:
    Create a new virtual network in Azure for the environment
    1. Click New virtual network.
    2. Enter a name for the virtual network.
    Add the environment to an existing virtual network in Azure
    1. Click Existing virtual network.
    2. Select the name of the existing virtual network that you want to use.
    3. The Address space field will automatically display the appropriate value. Select the provided value.
    4. The Application subnet name field will display available options. If you are deploying to an AD that was previously deployed through Lifecycle Services, select the APPNET value.
    5. The Active Directory subnet must be entered and match the Active Directory subnet IP/Range found in the Azure management portal for the AD you desire to target.
      1. Log on to the Azure management portal.
      2. In the navigation pane on the left, click Networks.
      3. Click the name of the virtual network that you’re going to use.
      4. Click Configure.
      Details about the virtual network are listed on the page.
  12. Click Done. The Deploy environment panel is redisplayed.

  13. The number and size of each virtual machine that will be deployed is listed. Change the number and size of the virtual machines, as needed.

  14. Click Software License Terms to review the licensing terms and conditions. Then select the check box to indicate that you agree to the terms.

  15. Click Next.

  16. Click Deploy to confirm that you’re ready to deploy the environment. The deployment may take a few hours to complete. When the deployment is done, the Deployment Status column on the Cloud-hosted environments page will display Deployed. (You may need to refresh your browser to see this.) If the deployment fails, you may see an error message right away. If the error occurs later in the deployment process, error details will be displayed in the details pane on the right-side of the page.

6. Prepare AX 2012 R3 for use

Now that the environment has been deployed on Azure, you must set up and configure AX 2012 R3 for use. See the following sections for more information.

Log on to the AOS virtual machine

Log on to the AOS-<GUID> virtual machine using the <DomainName>DynamicsInstallUser account. For instructions, see the “How do I log on to a virtual machine?” section of the Manage AX 2012 R3 deployments on Azure article.

Compile AX 2012 R3

Compile AX 2012 R3 by using AxBuild.exe. For instructions, see AxBuild.exe for Parallel Compile on AOS of X++ to p-code.

Initialize AX 2012 R3

Open the AX 2012 R3 client and complete the initialization checklists. For instructions, see Initialization checklists.

Install sample data

If you want sample data installed in your environment, complete the following steps.

  1. Log on to the SQL-<GUID> virtual machine. Log on to the virtual machine using the DynamicsInstallUser account. For instructions, see the “How do I log on to a virtual machine?” section of the Manage AX 2012 R3 deployments on Azure article.
  2. Go to the following location on the virtual machine: F:TestTransferTool
  3. Install the Test Data Transfer Tool. For instructions, see Install the Test Data Transfer Tool (beta).
  4. Open a command prompt and navigate to the following location: C:\Program Files (x86)\Microsoft Dynamics AX 2012 Test Data Transfer Tool (Beta)
  5. Run the following command: dp.exe import F:DemoData MicrosoftDynamicsAx

Note

The sample data includes trial license keys for AX 2012 R3. If you choose not to install the sample data, you can download trial license keys—for development or testing purposes—from CustomerSource or MSDN.

Give users access

To enable your users to access AX 2012 R3, complete the following tasks:

Note

If you don’t want to create a VPN connection and a domain trust, you can still give users access to AX 2012 R3. To do so, you’ll need to log on to the virtual machine that serves as the domain controller, and create domain accounts for each user. Then, you’ll need to complete the two tasks mentioned above.

Set up and configure AX 2012 R3

The procedures for setting up and configuring AX 2012 R3 on Azure are the same procedures used for setting up and configuring on-premises deployments. See the following resources for more information.

Task Resources
See the instructions on TechNet
Note
Be sure to deploy the default reports and grant users access to them.
Note
To process the cubes that are included with AX 2012 R3, we recommend that you increase the ExternalCommandTimeout value to 7200.
Note
Enterprise Portal is configured to run on port 81, so be sure to exclude that port in your firewall settings.
View printable guides and white papers
Use the Microsoft Dynamics AX web search tool

7. Learn more about the service accounts for this environment

The following sections provide information about the service accounts that were created when you deployed the environment.

Domain accounts

The following table lists the default names of the domain accounts that were created when you deployed the environment.

Domain account Description
AOSServiceUser The account used to run the following services on AOS- virtual machines: Microsoft Dynamics AX Object Server.
SQLServiceUser The account used to run the following services on SQL- virtual machines: SQL Server Analysis Services (MSSQLSERVER)
DynamicsInstallUser The account used to install AX 2012 R3.
SPServiceUser The account used to run the following services on EP- virtual machines: AppFabric, SharePoint Search Host Controller, SharePoint Server Search 15, SharePoint Timer Service, and SharePoint User Code Host
BCProxyUser The account used as the Business Connector proxy.
AXServiceUser The account used to run the following services on AOS- virtual machines: Microsoft Dynamics AX Data Import/Export Framework Services and Microsoft Dynamics ERP RapidStart Connector. The account is also used to run the following services on CLI- virtual machines: Microsoft Dynamics AX for Retail Commerce Data Exchange Async Client.

Note

The passwords are displayed on the Cloud-hosted environments page in Lifecycle Services.

Local administrator accounts

Each virtual machine that you deployed has a local administrator account. This account is: builtinaxlocaladmin. The passwords for the local administrator accounts are displayed on the Cloud-hosted environments page in Lifecycle Services.