Master Active Directory & Client Machine Domain Setup with AWS Windows Server
Manasvi Mathur
Cloud Engineer || AWS Certified Cloud Practitioner || Cloud Computing || 5x AWS Certified || Java || C++
Introduction :
Setting up Active Directory Domain Services (AD DS) on a Windows Server within AWS provides a secure, centralized authentication system for managing users, devices, and policies. Whether you're a system administrator, cloud engineer, or IT enthusiast, this guide will walk you through the entire process—from deploying a domain controller to joining a client machine to the domain.
By the end of this guide, you'll have a fully functional Active Directory environment running on AWS, ready for user authentication, group policies, and centralized management.
AUTHORS : Manasvi Mathur ? Aniruddh Saxena
Step 1 : Launch a Windows Server Instance in AWS
1?? Login to AWS Management Console
2?? Launch Windows Server Instance
( Instance 1 - Active Directory Domain Controller )
° Select t2.medium (Recommended for AD DS).
° Click Next.
3?? Create Key Pair & Launch Instance
4?? Network Settings
Firewall(Security Groups) → Select Create security group
5?? Add Storage
6?? Summary
7?? Similarly Create Another Instance : Instance 2 (Window Server -Client Machine)
8?? Configure Security Groups (Inbound & Outbound Rules)
Security Groups are needed to allow Instance 2 to communicate with Instance 1 - Active Directory Domain Controller .
8.1 Inbound Rules for Both Instances (Instance 1 & 2)
8.2 Outbound Rules for Both Instances (Instance 1 & 2)
Repeat these steps for Instance 1 → Security group ( launch-wizard-6)
Step 2 : Install Active Directory Domain Services on Instance 1 ( Active Directory Domain Controller) :
1?? Login to Instance 1 using RDP :
Get the Administrator Password:
Connect to the Windows Server using RDP:
2. Click Connect → Press Enter :
Repeat same steps for Instance 2 Window Server -Client Machine)
2?? Install Active Directory Domain Services (AD DS) Instance 1 :
2.1 Open Server Manager :
2.2 Add Active Directory Domain Services (AD DS) Role :
2.3 Select Installation Type :
2.4 Select Server :
2.5 Select Server Roles:
2.6 Select Features:
2.7 AD DS Overview:
2.8 Confirm Installation:
3?? Promote Server to Domain Controller
After Installation, a Notification appears in Server Manager.
3.1 Click on Notification
(Top Right Corner : Flag Icon ??) → Click "Promote this server to a domain controller ".
3.2 Deployment Configuration:
3.3 Domain Controller Options:
3.4 DNS Options:
3.5 Additional Options:
3.6 Review Paths:
3.7 Review & Install:
3.8 Prerequisites Check
4?? Verify AD DS Installation on Instance 1
Instance 1 ( Windows Server - Active Directory Domain Controller)
4.1 Check Domain Controller Status
5?? Verify DNS Settings
领英推荐
Shortcut : Win+X → Terminal (Admin)
ipconfig /all
Step 3 : Configure DNS on Instance 1
Instance 1 (Windows Server - Active Directory Domain Controller)
If DNS is not set correctly, follow these steps:
1?? Set Correct DNS on Domain Controller
Shortcut: Win + R → Type ncpa.cpl → Enter (opens Network Connections).
2?? Restart DNS Service
net stop dns
net start dns
ipconfig /flushdns
3?? Verify DNS Settings
Shortcut: Win + X → Click Command Prompt (Admin).
ipconfig
ipconfig /all
Step 4: Configure the Client Machine (Instance 2)
Instance 2 (Window Server -Client Machine)
Now, we will prepare the client machine (Instance 2) so it can join the domain.
1?? Set DNS on Client Machine
Shortcut: Win + R → Type ncpa.cpl → Enter (opens Network Connections).
2?? Verify DNS Resolution
Shortcut: Win + X → Click Command Prompt (Admin).
nslookup infotrade.com
3?? Test connectivity to the domain controller:
ping 172.31.7.165
4??Update Security Groups (Inbound & Outbound Rules)
Shortcut: Win + X → Click Windows Firewall → Advanced Settings → Inbound Rules.
° All ICMP - IPv4 (For Ping) → Source: 172.31.0.0/16. Port: N/A
° RDP → Source: Your IP. Port: 3389
° DNS (UDP) → Source: 172.31.0.0/16. Port: 53
° LDAP (TCP) → Source: 172.31.0.0/16. Port: 389
° Kerberos (TCP) → Source: 172.31.0.0/16. Port: 88
Shortcut: Win + X → Click Windows Firewall → Advanced Settings → Outbound Rules.
Step 5 : Join Client Machine (Instance 2) to the Domain
1?? Change Domain Settings
2?? Enter Domain Admin Credentials
° For Example : infotrade\Administrator
° Use passwords with minimum length of 6 characters.
° Use passwords with a minimum of three of the following mix of character types: uppercase, lowercase, numbers, non-alphanumeric symbols (for example , ! @ # $ % ^ & * < > -).
°?For Example : @User1234, @Admin21
3??Reboot the Machine
Step 6 : Post-Domain Join Actions
1?? Reboot the Client Machine, Instance 2 - (Window Server -Client Machine)
Once the domain join process is complete, You need to reboot the client machine to ensure that all domain-related changes are applied:
This ensures that the computer applies all the domain settings such as group policies, domain trust, and login configurations.
2?? Log in to the Domain Account ( Instance 1 )
After the client machine reboots, you can now log in using domain credentials:
° Local Account (default account on the machine
° Domain Account (the account that you just joined to the domain).
° In the Username field, enter your domain username in this format :
infotrade\username
° If logging in as the domain administrator, Use:
infotrade\Administrator
° Replace infotrade with your actual domain name.
° Replace username with your actual domain user account name.
° Password: Enter the password for your domain account.
Once logged in, your domain-specific configurations such as access to shared resources, domain group memberships, and domain-specific policies will be applied to your machine.
3?? Verify Domain Authentication (Optional)
To ensure the machine is correctly authenticated in the domain, follow these steps:
Method 1 : Check Domain Membership via System Properties
Method 2 : Verify Domain User Using Command Prompt
whoami
° The output should be similar to: This confirms that you are logged in with a domain account
??Final Confirmation : Test Network & Shared Resources
To check domain authentication and connectivity:
1?? Test Ping to Domain Controller (Instance 1) Open Command Prompt (Win + X → Command Prompt). Run: ping 172.31.7.165 If you receive Reply from 172.31.7.165, the domain connection is successful.
ping 172.31.7.165
2??Access Active Directory (If Permissions Allow)
Conclusion :
By following this guide, you’ve successfully deployed an Active Directory domain controller in AWS, configured security settings, and joined a Windows client machine to the domain. This foundational setup allows you to implement centralized authentication, access control, and network management within a cloud-based infrastructure.
For more cloud computing and AWS content, feel free to connect with us on :
Manasvi Mathur | LinkedIn
Aniruddh Saxena | LinkedIn?
Thank You For Reading!
?? Check Out Our Other Hands-On Tutorials Here :
?? Creating Linux Server And Configuring Web Servers on Virtual Machine – Custom Webpage Deployment & Configuration ??Read Here
?? Setting Up Active Directory on Windows Server and Joining a Client Machine to the Domain (With AWS Windows Server Setup) ??Read Here
?? Launching and Accessing an EC2 Instance — A Hands-On Tutorial ??Read Here
? THE END ?
Assistant Professor at JECRC University
1 个月Keep it up ??