Archives for Cloud Computing - Page 17
AWS Managed AD versus Self Managed AD DS on AWS
Use Case One – Replicate all on premises AD Objects to AWS. Redirect all external apps, SaaS apps to authenticate against a Single entry point (the AWS Managed AD) Use…
Azure Artifacts and Visual Studio Subscription Levels
Azure Artifacts includes nuget’s repository – something that almost every project on earth uses. Hence, it came as a shocker to me that Visual Studio Professional does not give you…
Powershell to Create AD Trust
Launch Powershell cmd prompt from the programs menu. Inside the cmd prompt , type Get-ADTrust if it fails - do this first : import-module activedirectory Once you have the module,…
Cannot Create a New Azure Resource Group?
Cannot create a new Resource Group? If you don’t have permission to create a resource group, but have the permissions to create new VMs, try the following: From create…
AWS Generated Public DNS Hostnames
To get around the issue of the auto generated, looooong AWS hostnames: On your VPC, you want so set EnableDnsSupport and enableDNSHostnames to false. Once you do that, you will…
Azure Governance
Azure's Governance Toolkit is very different from AWS's - although they try to accomplish a lot of the same things. At a high level, this is Azure's breakdown of services/techniques…
Routes for AWS VPN
Create a separate subnet for hosting the VPN route in a table specifies a destination CIDR and a target (for example, traffic destined for the external corporate network is targeted…
Domain Trust vs Synchronization of user objects
What is TRUST? Trust is mainly if you have two different forests/domains - and want to treat them as one forest/domain - but 'different' is the keyword. You need AWS…
AWS Key pairs vs Access keys
Access keys and key pairs are two entirely different things. Key Pairs are required to provide access to machines (EC2 instances) from client desktops (using SSH). 1. So, Key Pairs…
IP Address Space Overlap
With corporate mergers, branch office consolidations, and partner collaborations being common, often an organization must create a VPN to another network that uses the same private address subnet. Because both…