Manage Azure Local clusters using Windows Admin Center in Azure (preview)
Important
Windows Admin Center in the Azure portal is currently in preview. See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
Important
Version 1.36 and 1.35 of the Azure Connected Machine Agent (Arc agent) breaks connection to Windows Admin Center. This has been fixed in later versions of the Arc agent (1.37+) This can be downloaded here.
Using Windows Admin Center in the Azure portal you can manage the Azure Local operating system of your cluster. You can securely manage your cluster from anywhere–without needing a VPN, public IP address, or other inbound connectivity to your machine.
With Windows Admin Center extension in Azure, you get the management, configuration, troubleshooting, and maintenance functionality for managing your Azure Local cluster in the Azure portal. Azure Local cluster and workload management no longer require you to establish line-of-sight or Remote Desktop Protocol (RDP)–it can all be done natively from the Azure portal. Windows Admin Center provides tools that you'd normally find in Failover cluster manager, Device Manager, Task Manager, Hyper-V Manager, and most other Microsoft Management Console (MMC) tools.
This article provides an overview of using Windows Admin Center in the Azure portal, requirements, and how to install Windows Admin Center and use it to manage your cluster. It also answers frequently asked questions, and provides a list of known issues and tips for troubleshooting in case something doesn't work.
Overview of Windows Admin Center in Azure
Windows Admin Center in the Azure portal provides essential tools for managing your Azure Local cluster. You can manage clusters without the need to open any inbound port on your firewall.
Using Windows Admin Center in the Azure portal, you can manage:
- Servers
- Volumes
- Drives
- SDN infrastructure
- Diagnostics
- Security
- Certificates
- Devices
- Events
- Files and file sharing
- Firewall
- Installed apps
- Local users and groups
- Performance Monitor
- PowerShell
- Processes
- Registry
- Remote Desktop
- Roles and Features
- Scheduled tasks
- Services
- Storage
- Virtual machines
- Virtual switches
We don't support other extensions for Windows Admin Center in the Azure portal at this time.
Warning
If you manually installed Windows Admin Center on your cluster to manage multiple systems, enabling Windows Admin Center in Azure will replace your existing instance of Windows Admin Center and removes the capability to manage other machines. You will lose access to your previously deployed instance of Windows Admin Center.
Requirements
This section provides the requirements for using Windows Admin Center in the Azure portal to manage a hybrid machine:
- Azure account with an active subscription
- Azure permissions
- Azure region availability
- Azure Local requirements
- Networking requirements
Azure account with an active subscription
You'll need an Azure account with an active subscription to deploy Windows Admin Center. If you don't have one already, you can create an account for free.
During the deployment of Windows Admin Center, you'll register the Microsoft.HybridConnectivity resource provider for your subscription.
Important
You must have permission to register a resource provider, which requires the */register/action
operation. This is included if you are assigned the contributor or owner role on your subscription.
Note
Resource provider registration is a one time task per subscription.
To check the status of the resource provider, and register if needed:
- Sign in to the Azure portal.
- Select Subscriptions.
- Select the name of your subscription.
- Select Resource providers.
- Search for Microsoft.HybridConnectivity.
- Verify that the status of Microsoft.HybridConnectivity is Registered.
- If the status is NotRegistered, select Microsoft.HybridConnectivity, and then select Register.
Azure permissions
Connecting to Windows Admin center requires you to have Reader and Windows Admin Center Administrator Login permissions at the Arc-enable Azure Local resource.
Learn more about assigning Azure roles using the Azure portal.
Azure region availability
Windows Admin Center is supported in all public regions Azure Local is supported.
Note
Windows Admin Center isn't supported in Azure China 21Vianet, Azure Government, or other non-public clouds
Azure Local requirements
To use Windows Admin Center in the Azure portal, the Windows Admin Center agent must be installed on every node of your cluster via an Azure VM extension. Each node of the cluster should meet the following requirements:
- Azure Local, version 21H2 or later
- 3 GB of memory or more
- The Azure Local cluster must be connected to Azure using Azure Arc
- Azure Arc agent version 1.13.21320.014 or later
Networking requirements
Every node of the Azure Local cluster must meet the following networking requirements:
Outbound internet access or an outbound port rule allowing HTTPS traffic to the following endpoints:
*.service.waconazure.com
or theWindowsAdminCenter
service tagpas.windows.net
*.servicebus.windows.net
Note
No inbound ports are required in order to use Windows Admin Center.
The management machine where the Azure Portal is running must meet the following networking requirements:
- Outbound internet access over port
443
Make sure you review the supported devices and recommended browsers before accessing the Azure portal from the management machine or system.
Install Windows Admin Center in the Azure portal
Before you can use Windows Admin Center in the Azure portal, you must deploy the Windows Admin Center VM extension using the following steps:
- Open the Azure portal and navigate to your Azure Local cluster.
- Under the Settings group, select Windows Admin Center.
- Specify the port on which you wish to install Windows Admin Center, and then select Install.
Connect to Windows Admin Center in the Azure portal
After you've installed Windows Admin Center on your cluster, perform the following steps to connect to it and use it to manage Azure Local:
- Open the Azure portal and navigate to your Azure Local cluster, and then under the Settings group, select Windows Admin Center.
- Select Connect.
Note
Starting April 2023, Windows Admin Center now allows you to use Microsoft Entra ID-based authentication for your 22H2 or higher clusters running the AdminCenter extension greater than 0.0.0.313. You will no longer be prompted for the credentials of a local administrator account. However, there may still be some experiences within Windows Admin Center that might require local administrator credentials. For example, when CredSSP is required. Clusters running 21H2 or below will continue to require local administrator credentials.
Windows Admin Center opens in the portal, giving you access to the same tools you might be familiar with from using Windows Admin Center in an on-premises deployment.
Configuring role assignments
Access to Windows Admin Center is controlled by the Windows Admin Center Administrator Login Azure role. You must have this role configured on the Azure Local resource, and each of the Azure Arc-enabled servers associated with this cluster.
Note
The Windows Admin Center Administrator Login role uses dataActions and thus cannot be assigned at management group scope. Currently these roles can only be assigned at the subscription, resource group or resource scope.
To configure role assignments for your cluster using the Microsoft Entra admin center experience:
Select the Resource Group containing the cluster and the associated Azure Arc resources.
Select Access control (IAM).
Select Add > Add role assignment to open the Add role assignment page.
Assign the following role. For detailed steps, see Assign Azure roles using the Azure portal.
Setting Value Role Windows Admin Center Administrator Login Assign access to User, group, service principal, or managed identity
For more information on how to use Azure RBAC to manage access to your Azure subscription resources, see the following articles:
- Assign Azure roles using Azure CLI
- Assign Azure roles using the Azure CLI examples. Azure CLI can also be used in the Azure Cloud Shell experience.
- Assign Azure roles using the Azure portal
- Assign Azure roles using Azure PowerShell.
How it works
By using Windows Admin Center in Azure, you can connect to your cluster without requiring any inbound port to be enabled on the firewall. Windows Admin Center, via the Arc agent, is able to securely establish a reverse proxy session connection with the Azure Arc service in an outbound manner.
For each Azure Local cluster that you want to manage with Windows Admin Center in the Azure portal, you must deploy an agent to all the nodes in the cluster.
The agent communicates to an external service that manages certificates so that you can easily connect to your cluster.
Clicking Install performs the following actions:
- Registers the Microsoft.HybridConnectivity resource provider on your subscription. The resource provider hosts the proxy used for communication to your Arc-enabled cluster.
- Deploys an Azure endpoint resource on top of each of your Arc-enabled resources in your cluster that enables a reverse proxy connection on the specified port. This is simply a logical resource in Azure, and doesn't deploy anything on your server itself.
- Installs the Windows Admin Center agent on your hybrid machine with a valid TLS certificate.
Note
Uninstalling Windows Admin Center does not delete the logical Azure endpoint resource. This is kept for other experiences that might leverage this resource, such as SSH.
Clicking Connect performs the following actions:
- The Azure portal asks the Microsoft.HybridConnectivity resource provider for access to the Arc-enabled server.
- The resource provider communicates with a Layer 4 SNI proxy to establish a short-lived session-specific access to one of your Arc-enabled nodes of the cluster on the Windows Admin Center port.
- A unique short-lived URL is generated and connection to Windows Admin Center is established from the Azure portal.
Connection to Windows Admin Center is end-to-end encrypted with SSL termination happening on your cluster.
Automate Windows Admin Center deployment using PowerShell
You can automate Windows Admin Center deployment in Azure portal using this example PowerShell script.
$clusterName = "<name_of_cluster>"
$resourceGroup = "<resource_group>"
$subscription = "<subscription_id>"
$port = "6516"
#Deploy Windows Admin Center
$setting = @{ "port" = $port }
New-AzStackHciExtension -ArcSettingName "default" -Name "AdminCenter" -ResourceGroupName $resourceGroup -ClusterName $clusterName -ExtensionParameterPublisher "Microsoft.AdminCenter" -ExtensionParameterSetting $setting -ExtensionParameterType "AdminCenter" -SubscriptionId $subscription -ExtensionParameterTypeHandlerVersion "0.0"
#Allow connectivity
$patch = @{ "properties" = @{ "connectivityProperties" = @{"enabled" = $true}}}
$patchPayload = ConvertTo-Json $patch
Invoke-AzRestMethod -Method PATCH -Uri "https://management.azure.com/subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.AzureStackHCI/clusters/$clusterName/ArcSettings/default?api-version=2023-02-01" -Payload $patchPayload
Troubleshooting
Here are some tips to try in case something isn't working. For general Windows Admin Center troubleshooting (not specifically in Azure), see Troubleshooting Windows Admin Center.
Failed to connect with "404 endpoint not found"
- Version 1.36 and 1.35 of the Azure Connected Machine Agent (Arc agent) breaks connection to Windows Admin Center. This has been fixed in later versions of the Arc agent (1.37+) This can be downloaded here.
Failed to connect error
Restart the HIMDS service.
RDP into each node of your cluster.
Open PowerShell as an administrator and run:
Restart-Service -Name himds
Make sure that the Windows Admin Center service is running on your cluster.
- RDP into each node of your cluster.
- Open Task Manager (Ctrl+Shift+Esc) and navigate to Services.
- Make sure ServerManagementGateway / Windows Admin Center is running.
- If it isn't, start the service.
Check that the port is enabled for reverse proxy session.
RDP into each node of your cluster.
Open PowerShell as an administrator and run:
azcmagent config list
This should return a list of ports under the incomingconnections.ports (preview) configuration that are enabled to be connected from Azure. Confirm that the port on which you installed Windows Admin Center is on this list. For example, if Windows Admin Center is installed on port 443, the result would be:
Local configuration setting incomingconnections.ports (preview): 443
In the event it isn't on this list, run
azcmagent config set incomingconnections.ports <port>
If you're using another experience (like SSH) using this solution, you can specify multiple ports separated by a comma.
Ensure you have outbound connectivity to the necessary ports.
- Each node of your cluster should have outbound connectivity to the following endpoint
*.wac.azure.com
,*.waconazure.com
or the WindowsAdminCenter ServiceTagpas.windows.net
*.servicebus.windows.net
- Each node of your cluster should have outbound connectivity to the following endpoint
One of the Windows Admin Center tools isn’t loading or gives an error
Navigate to any other tool in Windows Admin Center and navigate back to the one that isn’t loading.
If no other tool is loading, there might be a problem with your network connectivity. Try closing the blade and then connecting again. If this doesn’t work, open a support ticket.
The Windows Admin Center extension failed to install
Double-check to make sure that the cluster meets the requirements.
Make sure that outbound traffic to Windows Admin Center is allowed on each node of your cluster.
Test connectivity by running the following command using PowerShell inside of your virtual machine:
Invoke-RestMethod -Method GET -Uri https://<your_region>.service.waconazure.com
Microsoft Certificate and DNS service for Windows Admin Center in the Azure Portal
If you've allowed all outbound traffic and are getting an error from the command above, check that there are no firewall rules blocking the connection.
If nothing seems wrong and Windows Admin Center still won't install, open a support request with the following information:
Logs in the Azure portal. This can be found under Settings > Extensions > AdminCenter > View Detailed Status.
Logs on each node of the cluster. Run the following PowerShell command and share the resulting .zip file.
azcmagent logs
Network trace, if appropriate. Network traces can contain customer data and sensitive security details, such as passwords, so we recommend reviewing the trace and removing any sensitive details before sharing it.
Known issues
- Chrome incognito mode isn't supported.
- Azure portal desktop app isn't supported.
- Detailed error messages for failed connections aren't available yet.
- Updates isn’t supported. Users cannot apply updates to Azure Local cluster with CAU (Cluster-Aware Updating).
Frequently asked questions
Find answers to the frequently asked questions about using Windows Admin Center in Azure.
How much does it cost to use Windows Admin Center?
There's no cost associated to use the Windows Admin Center in the Azure portal.
Can I use Windows Admin Center to manage the virtual machines running on my cluster?
You can install the Hyper-V role using the Roles and Features extension. Once installed, refresh your browser, and Windows Admin Center will show the Virtual Machine and Switch extensions.
What clusters can I manage using this extension?
You can use the capability to manage Arc-enabled Azure Local clusters, version 21H2 or later. You can also use Windows Admin Center to manage your Arc-enabled servers
How does Windows Admin Center handle security?
Traffic from the Azure portal to Windows Admin Center is end-to-end encrypted. Your Arc-enabled cluster is managed using PowerShell and WMI over WinRM.
Do I need an inbound port to use Windows Admin Center?
No inbound connection is required to use Windows Admin Center.
Why must I create an outbound port rule?
An outbound port rule is required for the service that we have built to communicate with your server. Our service issues you a certificate free-of-cost for your instance of Windows Admin Center. This service ensures that you can always connect to your instance of Windows Admin Center from the Azure portal by keeping your WAC certificate up to date.
Furthermore, accessing Windows Admin Center from Azure requires no inbound port and only outbound connectivity via a reverse proxy solution. These outbound rules are required in order to establish the connection.
How do I find the port used for Windows Admin Center installation?
To verify the value of SmePort registry setting:
- RDP into your server.
- Open the Registry Editor.
- Navigate to the key
\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManagementGateway
. - Read the value of
SmePort
to find the port used.
I already have Windows Admin Center installed on one or all nodes of my cluster. Can I access it from the portal?
Yes. You can follow the same steps outlined in this document.
Warning
Enabling this capability will replace your existing instance of Windows Admin Center and removes the capability to manage other machines. Your previously deployed instance of Windows Admin Center will no longer be usable.
Next steps
- Learn about Windows Admin Center
- Learn about managing servers with Windows Admin Center
- Learn about Azure Local
- Learn about connecting Azure Local to Azure