Get Started with Cross-Account AWS License Manager using Shared AWS Managed Microsoft AD
AWS License Manager supports cross-account functionality using a shared AWS Managed Microsoft AD, enabling organizations to centrally manage user subscriptions from a directory owner account while deploying instances across multiple accounts.
Terminology
-
Directory owner account - license admin account where the managed AD exists and that is also responsible for managing subscriptions.
-
Directory consumer account - AWS accounts where you wat to launch user subscriptions instances using shared AD.
Prerequisites
Before you begin, ensure you have:
-
An AWS Managed Microsoft AD in the directory owner account - set up in directory owner account/license admin account from which you want to control subscriptions.
-
Network connectivity between your directory owner account and all of your directory consumer accounts.
-
Required IAM permissions - see User-based subscription IAM roles.
-
Subscriptions to the required License Manager products in AWS Marketplace in the directory owner account:
Limitations
-
User subscriptions management is restricted to the directory owner account.
-
Cross-region sharing is not supported.
-
Consolidated billing through directory owner account - all subscription costs are billed to the directory owner account, though subscriptions can exist in multiple accounts.
-
Network connectivity is required between accounts.
Network Architecture

How to set up cross-account License Manager functionality
To set up cross-account License Manager functionality:
-
Set up the directory owner account/license admin account.
-
Configure directory consumer accounts.
-
Establish network connectivity.
-
Deploy instances and manage user associations.
Step 1: Set up the Directory Owner/license admin account
Create and share AWS Managed Microsoft AD
-
Create an AWS Managed Microsoft AD in your VPC if it doesn't exist.
-
Share the directory with directory consumer accounts, as described in Sharing your directory.
-
Ensure that the directory is properly configured with the required users and groups.
Subscribe to products
-
Navigate to AWS Marketplace.
-
Locate and subscribe to your needed products, Visual Studio or Office and RDS SAL.
-
Share the Visual Studio or Office subscription with the directory consumer accounts using License Manager Create Grants. Alternatively, you can subscribe to AWS Marketplace products in these accounts as this does not impact billing. See Granted licenses.
-
Verify that the subscription status is active.
Register with License Manager
-
Open the License Manager console.
-
Navigate to User-based subscriptions settings.
-
Select Register Identity Provider.
-
Choose your AWS Managed Microsoft AD.
-
Complete the registration process.
Step 2: Configure directory consumer accounts - accounts with shared AD
Accept shared directory
-
Open the AWS Directory Service console.
-
Navigate to Shared directories.
-
Locate and accept the shared directory invitation.
-
Note the new directory ID assigned in your account.
Accept MP subscription
In License Manager Grants accept the grant for AWS Marketplace products. Alternatively subscribe to AWS Marketplace products. Learn more in CreateGrant API).
Register with License Manager
-
Open the License Manager console.
-
Navigate to User-based subscriptions and choose product.
-
Register using the shared directory ID and product.
-
Verify the registration status.
Step 3: Establish networking connectivity between VPCs
To domain-join your Amazon Amazon EC2 instances to your directory, you need to establish networking connectivity between the VPCs. There are several options for establishing networking connectivity between two VPCs. This section shows you how to use Amazon VPC peering.
Set up VPC peering
-
Create one VPC peering connection between the directory owner VPC-0 and directory consumer VPC-1, then create another connection between the directory owner VPC-0 and directory consumer VPC-2.
-
Enable traffic routing between the peered VPCs by adding a route to your VPC route table that points to the VPC peering connection to route traffic to the other VPC in the peering connection.
-
Configure each of the directory consumer VPC route tables by adding the peering connection with the directory owner VPC-0. If you want, you can also create and attach an Internet Gateway to your directory consumer VPCs. This enables the instances in the directory consumer VPCs to communicate with the Amazon EC2 Systems Manager agent that performs the domain join.
Configure security groups
Configure your directory consumer VPCs' security group to enable outbound traffic by adding the AWS Managed Microsoft AD protocols and ports to the outbound rules table. Also, configure your directory domain controllers VPCs' security group to enable inbound traffic by adding the AWS Managed Microsoft AD protocols and ports to the inbound rules table, to allow traffic from directory consumer accounts.
Security group requirements
Consumer Account VPCs:
-
Enable outbound traffic to directory owner VPC
-
Allow communication on required AD ports
Directory Owner VPC:
-
Configure inbound traffic from consumer VPCs
-
Add necessary AWS Managed Microsoft AD protocols and ports including:
TCP 53 (DNS)
UDP 53 (DNS)
TCP 88 (Kerberos)
UDP 88 (Kerberos)
TCP 135 (RPC)
TCP 389 (LDAP)
UDP 389 (LDAP)
TCP 445 (SMB)
TCP 464 (Kerberos Password)
UDP 464 (Kerberos Password)
TCP 636 (LDAPS)
TCP 3268-3269 (Global Catalog)
TCP 1024-65535 (Dynamic RPC)
Step 4: Deploy instances and manage user associations
Subscribe users (directory owner account only)
-
Open the License Manager console.
-
Navigate to User-based subscriptions.
-
Select Subscribe Users
-
Enter AWS Managed Microsoft AD user identifiers
-
Choose the product and confirm subscription.
Launch instances
Perform this step in any account.
-
Navigate to Amazon EC2 console.
-
Choose Launch Instance.
-
Select appropriate License Manager AMI.
-
Configure networking settings.
-
Review and launch.
Associate users with instances
Perform this step in any account where the instance exists.
-
Open License Manager console.
-
Navigate to User Associations.
-
Select target instance.
-
Choose Associate Users.
-
Enter AWS Managed Microsoft AD usernames.
-
Confirm association.
Troubleshooting
Common issues and solutions:
Domain join failures
-
Verify network connectivity between accounts.
-
Check security group configurations.
-
Confirm DNS resolution is working.
-
Validate route table entries.
User subscription issues
-
Confirm user exists in AWS Managed Microsoft AD.
-
Verify subscription status in directory owner account.
-
Check network connectivity.
-
Review error logs.
Network connectivity issues
-
Test VPC peering connection status.
-
Verify route table configurations.
-
Check security group rules.
-
Confirm DNS resolution.
DNS resolution problems
-
Verify DHCP option sets.
-
Check DNS server configurations.
-
Test name resolution from consumer instances.