Skip to content

Commit 1af3d32

Browse files
committed
fix link names
1 parent e6a4cfb commit 1af3d32

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

articles/azure-netapp-files/configure-ldap-over-tls.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,29 @@
11
---
2-
title: Configure AD DS LDAP over TLS for Azure NetApp Files | Microsoft Docs
2+
title: Configure AD DS LDAP over TLS for Azure NetApp Files
33
description: Describes how to configure AD DS LDAP over TLS for Azure NetApp Files, including root CA certificate management.
44
services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 04/17/2024
8+
ms.date: 07/01/2025
99
ms.author: anfdocs
1010
---
1111
# Configure AD DS LDAP over TLS for Azure NetApp Files
1212

13-
You can use LDAP over TLS to secure communication between an Azure NetApp Files volume and the Active Directory LDAP server. You can enable LDAP over TLS for NFS, SMB, and dual-protocol volumes of Azure NetApp Files.
13+
You can use Lightweight Directory Access Protocol (LDAP) over TLS to secure communication between an Azure NetApp Files volume and the Active Directory LDAP server. You can enable LDAP over TLS for NFS, SMB, and dual-protocol volumes of Azure NetApp Files.
1414

1515
## Considerations
1616

17-
* DNS PTR records must exist for each AD DS domain controller assigned to the **AD Site Name** specified in the Azure NetApp Files Active Directory connection.
17+
* DNS pointer (PTR) records must exist for each AD DS domain controller assigned to the **AD Site Name** specified in the Azure NetApp Files Active Directory connection.
1818
* PTR records must exist for all domain controllers in the site for AD DS LDAP over TLS to function properly.
1919

2020
## Generate and export root CA certificate
2121

22-
If you do not have a root CA certificate, you need to generate one and export it for use with LDAP over TLS authentication.
22+
If you don't have a root CA certificate, you need to generate one and export it for use with LDAP over TLS authentication.
2323

24-
1. Follow [Screenshot of the the Certification Authority.](/windows-server/networking/core-network-guide/cncg/server-certs/install-the-certification-authority) to install and configure AD DS Certificate Authority.
24+
1. [Install the Certification Authority (CA) on Windows Server.](/windows-server/networking/core-network-guide/cncg/server-certs/install-the-certification-authority)
2525

26-
2. Follow [Screenshot of the view certificates with the MMC snap-in.](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in) to use the MMC snap-in and the Certificate Manager tool.
26+
2. [View certificates with the Microsoft Management Console (MMC) snap-in.](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in)
2727
Use the Certificate Manager snap-in to locate the root or issuing certificate for the local device. You should run the Certificate Management snap-in commands from one of the following settings:
2828
* A Windows-based client that has joined the domain and has the root certificate installed
2929
* Another machine in the domain containing the root certificate
@@ -38,30 +38,31 @@ If you do not have a root CA certificate, you need to generate one and export it
3838

3939
## Enable LDAP over TLS and upload root CA certificate
4040

41-
1. Go to the NetApp account used for the volume, and select **Active Directory connections**. Then, select **Join** to create a new AD connection or **Edit** to edit an existing AD connection.
41+
1. Go to the NetApp account used for the volume, then select **Active Directory connections**.
4242

43-
2. In the **Join Active Directory** or **Edit Active Directory** window that appears, select the **LDAP over TLS** checkbox to enable LDAP over TLS for the volume. Then select **Server root CA Certificate** and upload the [generated root CA certificate](#generate-and-export-root-ca-certificate) to use for LDAP over TLS.
43+
1. Select **Join** to create a new AD connection or **Edit** to edit an existing AD connection.
44+
45+
1. In the **Join Active Directory** or **Edit Active Directory** window that appears, select the **LDAP over TLS** checkbox to enable LDAP over TLS for the volume. Then select **Server root CA Certificate** and upload the [generated root CA certificate](#generate-and-export-root-ca-certificate) to use for LDAP over TLS.
4446

4547
![Screenshot that shows the LDAP over TLS option](./media/configure-ldap-over-tls/ldap-over-tls-option.png)
4648

4749
Ensure that the certificate authority name can be resolved by DNS. This name is the "Issued By" or "Issuer" field on the certificate:
4850

4951
![Screenshot that shows certificate information](./media/configure-ldap-over-tls/certificate-information.png)
5052

51-
If you uploaded an invalid certificate, and you have existing AD configurations, SMB volumes, or Kerberos volumes, an error similar to the following occurs:
52-
53-
`Unable to validate the LDAP client configuration from LDAP server, please check connectivity or LDAP settings under AD connection.`
53+
If you uploaded an invalid certificate, and you have existing AD configurations, SMB volumes, or Kerberos volumes, an error similar to the following occurs: `Unable to validate the LDAP client configuration from LDAP server, please check connectivity or LDAP settings under AD connection.`
5454

55-
To resolve the error condition, upload a valid root CA certificate to your NetApp account as required by the Windows Active Directory LDAP server for LDAP authentication.
55+
To resolve the error condition, upload a valid root CA certificate to your NetApp account as required by the Windows Active Directory LDAP server for LDAP authentication.
5656

5757
## Disable LDAP over TLS
5858

59-
Disabling LDAP over TLS stops encrypting LDAP queries to Active Directory (LDAP server). There are no other precautions or impact on existing ANF volumes.
59+
Disabling LDAP over TLS stops encryption LDAP queries to Active Directory (LDAP server). There are no other precautions or impact on existing Azure NetApp Files volumes.
6060

61-
1. Go to the NetApp account that is used for the volume and select **Active Directory connections**. Then select **Edit** to edit the existing AD connection.
61+
1. Go to the NetApp account used for the volume then select **Active Directory connections**.
6262

63-
2. In the **Edit Active Directory** window that appears, deselect the **LDAP over TLS** checkbox and select **Save** to disable LDAP over TLS for the volume.
63+
1. Select **Edit** to edit the existing AD connection.
6464

65+
2. In the **Edit Active Directory** window that appears, deselect the **LDAP over TLS** checkbox then select **Save** to disable LDAP over TLS for the volume.
6566

6667
## Next steps
6768

0 commit comments

Comments
 (0)