Skip to content

Commit 026e0e2

Browse files
Merge pull request #295122 from b-ahibbard/ldap-2-21
ldap search scope update
2 parents 9ffe757 + 9147d64 commit 026e0e2

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/azure-netapp-files/configure-ldap-extended-groups.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 03/17/2023
8+
ms.date: 02/21/2025
99
ms.author: anfdocs
1010
---
1111
# Enable Active Directory Domain Services (AD DS) LDAP authentication for NFS volumes
@@ -43,13 +43,13 @@ The following information is passed to the server in the query:
4343

4444
* The following table describes the Time to Live (TTL) settings for the LDAP cache. You need to wait until the cache is refreshed before trying to access a file or directory through a client. Otherwise, an access or permission denied message appears on the client.
4545

46-
| Cache | Default Timeout |
46+
| Cache | Default time out |
4747
|-|-|
4848
| Group membership list | 24-hour TTL |
4949
| Unix groups | 24-hour TTL, 1-minute negative TTL |
5050
| Unix users | 24-hour TTL, 1-minute negative TTL |
5151

52-
Caches have a specific timeout period called *Time to Live*. After the timeout period, entries age out so that stale entries don't linger. The *negative TTL* value is where a lookup that has failed resides to help avoid performance issues due to LDAP queries for objects that might not exist.
52+
Caches have a specific time-out period called *Time to Live*. After the time-out period, entries age out so that stale entries don't linger. The *negative TTL* value is where a lookup that has failed resides to help avoid performance issues due to LDAP queries for objects that might not exist.
5353

5454
* The **Allow local NFS users with LDAP** option in Active Directory connections intends to provide occasional and temporary access to local users. When this option is enabled, user authentication and lookup from the LDAP server stop working, and the number of group memberships that Azure NetApp Files will support will be limited to 16. As such, you should keep this option *disabled* on Active Directory connections, except for the occasion when a local user needs to access LDAP-enabled volumes. In that case, you should disable this option as soon as local user access is no longer required for the volume. See [Allow local NFS users with LDAP to access a dual-protocol volume](create-volumes-dual-protocol.md#allow-local-nfs-users-with-ldap-to-access-a-dual-protocol-volume) about managing local user access.
5555

@@ -108,8 +108,8 @@ The following information is passed to the server in the query:
108108

109109
To resolve the users and group from an LDAP server for large topologies, set the values of the **User DN**, **Group DN**, and **Group Membership Filter** options on the Active Directory Connections page as follows:
110110

111-
* Specify nested **User DN** and **Group DN** in the format of `OU=subdirectory,OU=directory,DC=domain,DC=com`.
112-
* Specify **Group Membership Filter** in the format of `(gidNumber=*)`.
111+
* Specify nested **User DN** and **Group DN** in the format of `OU=subdirectory,OU=directory,DC=domain,DC=com`. Multiple organizational units can be specified using a semicolon, for example: `OU=subdirectory1,OU=directory1,DC=domain,DC=com;OU=subdirectory2,OU=directory2,DC=domain,DC=com`
112+
* Specify **Group Membership Filter** in the format of `(gidNumber=*)`. For example, setting `(gidNumber=9*)` searches for `gidNumbers` starting with 9. You can also use two filters together: `(|(cn=*22)(cn=*33))` searches for CN values ending in 22 or 33.
113113
* If a user is a member of more than 256 groups, only 256 groups will be listed.
114114
* Refer to [errors for LDAP volumes](troubleshoot-volumes.md#errors-for-ldap-volumes) if you run into errors.
115115

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: b-hchen
66
ms.service: azure-netapp-files
77
ms.custom: devx-track-azurepowershell
88
ms.topic: how-to
9-
ms.date: 10/21/2024
9+
ms.date: 02/21/2025
1010
ms.author: anfdocs
1111
---
1212
# Create and manage Active Directory connections for Azure NetApp Files
@@ -71,11 +71,11 @@ Several features of Azure NetApp Files require that you have an Active Directory
7171
7272
* LDAP queries take effect only in the domain specified in the Active Directory connections (the **AD DNS Domain Name** field). This behavior applies to NFS, SMB, and dual-protocol volumes.
7373
74-
* <a name="ldap-query-timeouts"></a> LDAP query timeouts
74+
* <a name="ldap-query-timeouts"></a> LDAP query time outs
7575
76-
By default, LDAP queries time out if they cannot be completed in a timely fashion. If an LDAP query fails due to a timeout, the user and/or group lookup will fail and access to the Azure NetApp Files volume may be denied, depending on the permission settings of the volume.
76+
By default, LDAP queries time out if they cannot be completed in a timely fashion. If an LDAP query fails due to a time out, the user and/or group lookup will fail and access to the Azure NetApp Files volume may be denied, depending on the permission settings of the volume.
7777
78-
Query timeouts can occur in large LDAP environments with many user and group objects, over slow WAN connections, and if an LDAP server is over-utilized with requests. Azure NetApp Files timeout setting for LDAP queries is set to 10 seconds. Consider leveraging the user and group DN features on the Active Directory Connection for the LDAP server to filter searches if you are experiencing LDAP query timeout issues.
78+
Query time outs can occur in large LDAP environments with many user and group objects, over slow WAN connections, and if an LDAP server is over-utilized with requests. Azure NetApp Files time-out setting for LDAP queries is set to 10 seconds. Consider leveraging the user and group DN features on the Active Directory Connection for the LDAP server to filter searches if you're experiencing LDAP query time-out issues.
7979
8080
## NetApp accounts and Active Directory type
8181
@@ -132,7 +132,7 @@ For more information about the relationship between NetApp accounts and subscrip
132132
* **Organizational unit path**
133133
This is the LDAP path for the organizational unit (OU) where SMB server computer accounts will be created. That is, `OU=second level, OU=first level`. For example, if you want to use an OU called `ANF` created at the root of the domain, the value would be `OU=ANF`.
134134
135-
If no value is provided, Azure NetApp Files will use the `CN=Computers` container.
135+
If no value is provided, Azure NetApp Files uses the `CN=Computers` container.
136136
137137
If you're using Azure NetApp Files with Microsoft Entra Domain Services, the organizational unit path is `OU=AADDC Computers`
138138
@@ -178,7 +178,7 @@ For more information about the relationship between NetApp accounts and subscrip
178178
179179
The [**LDAP search scope**](/windows/win32/ad/search-scope) option optimizes Azure NetApp Files storage LDAP queries for use with large AD DS topologies and LDAP with extended groups or Unix security style with an Azure NetApp Files dual-protocol volume.
180180
181-
The **User DN** and **Group DN** options allow you to set the search base in AD DS LDAP. These options limit the search areas for LDAP queries, reducing the search time and helping to reduce LDAP query timeouts.
181+
The **User DN** and **Group DN** options allow you to set the search base in AD DS LDAP. These options limit the search areas for LDAP queries, reducing the search time and helping to reduce LDAP query time outs.
182182
183183
The **Group Membership Filter** option allows you to create a custom search filter for users who are members of specific AD DS groups.
184184

0 commit comments

Comments
 (0)