You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/domain-joined/apache-domain-joined-create-configure-enterprise-security-cluster.md
+19-20Lines changed: 19 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,33 +4,33 @@ description: Learn how to create and configure Enterprise Security Package clust
4
4
services: hdinsight
5
5
ms.service: azure-hdinsight
6
6
ms.topic: how-to
7
-
ms.date: 09/06/2024
7
+
ms.date: 12/10/2024
8
8
ms.custom: devx-track-azurepowershell
9
9
---
10
10
11
11
# Create and configure Enterprise Security Package clusters in Azure HDInsight
12
12
13
-
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Active Directory-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
13
+
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Microsoft Entra ID-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
14
14
15
-
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Active Directory and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
15
+
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Microsoft Entra ID and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
16
16
17
17
The server you create will act as a replacement for your *actual* on-premises environment. You'll use it for the setup and configuration steps. Later you'll repeat the steps in your own environment.
18
18
19
19
This guide will also help you create a hybrid identity environment by using password hash sync with Microsoft Entra ID. The guide complements [Use ESP in HDInsight](apache-domain-joined-architecture.md).
20
20
21
21
Before you use this process in your own environment:
22
22
23
-
* Set up Active Directory and DNS.
23
+
* Set up Microsoft Entra ID and DNS.
24
24
* Enable Microsoft Entra ID.
25
25
* Sync on-premises user accounts to Microsoft Entra ID.
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Active Directory forest.
31
+
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Microsoft Entra ID forest.
32
32
33
-
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Active Directory forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
33
+
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Microsoft Entra ID forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
34
34
35
35
1. Select **Deploy to Azure**.
36
36
1. Sign in to your Azure subscription.
@@ -65,15 +65,15 @@ In this section, you'll create the users that will have access to the HDInsight
65
65
1. Enter the password that you chose for the admin account.
66
66
1. Select **OK**.
67
67
68
-
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Active Directory Users and Computers**.
68
+
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Microsoft Entra ID Users and Computers**.
69
69
70
-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Active Directory Management." border="true":::
70
+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Microsoft Entra ID Management." border="true":::
71
71
72
72
1. Create two new users: **HDIAdmin** and **HDIUser**. These two users will sign in to HDInsight clusters.
73
73
74
-
1. From the **Active Directory Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
74
+
1. From the **Microsoft Entra ID Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
75
75
76
-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Active Directory user." border="true":::
76
+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Microsoft Entra ID user." border="true":::
77
77
78
78
1. On the **New Object - User** page, enter `HDIUser` for **First name** and **User logon name**. The other fields will autopopulate. Then select **Next**.
79
79
@@ -87,13 +87,13 @@ In this section, you'll create the users that will have access to the HDInsight
87
87
88
88
1. Create a security group.
89
89
90
-
1. From **Active Directory Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
90
+
1. From **Microsoft Entra ID Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
91
91
92
92
1. Enter `HDIUserGroup` in the **Group name** text box.
93
93
94
94
1. Select **OK**.
95
95
96
-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Active Directory group." border="true":::
96
+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Microsoft Entra ID group." border="true":::
97
97
98
98
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0028.png" alt-text="Create a new object." border="true":::
99
99
@@ -105,7 +105,7 @@ In this section, you'll create the users that will have access to the HDInsight
105
105
106
106
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/active-directory-add-users-to-group.png" alt-text="Add the member HDIUser to the group HDIUserGroup." border="true":::
107
107
108
-
You've now created your Active Directory environment. You've added two users and a user group that can access the HDInsight cluster.
108
+
You've now created your Microsoft Entra ID environment. You've added two users and a user group that can access the HDInsight cluster.
109
109
110
110
The users will be synchronized with Microsoft Entra ID.
111
111
@@ -141,9 +141,9 @@ The users will be synchronized with Microsoft Entra ID.
141
141
142
142
## Configure your Microsoft Entra tenant
143
143
144
-
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Active Directory instance to the cloud.
144
+
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Microsoft Entra ID instance to the cloud.
145
145
146
-
Create an Active Directory tenant administrator.
146
+
Create a Microsoft Entra ID tenant administrator.
147
147
148
148
1. Sign in to the Azure portal and select your Microsoft Entra tenant, **HDIFabrikam**.
149
149
@@ -189,11 +189,10 @@ Create an Active Directory tenant administrator.
189
189
190
190
1. Select **Use express settings**.
191
191
192
-
1. On the **Connect to Microsoft Entra ID** page, enter the username and password of the administrator for Microsoft Entra ID. Use the username `[email protected]` that you created when you configured your Active Directory tenant. Then select **Next**.
193
-
192
+
1. On the **Connect to Microsoft Entra ID** page, enter the username and password of the Domain Name Administrator[/entra/identity/role-based-access-control/permissions-reference#domain-name-administrator] for Microsoft Entra ID. Use the username `[email protected]` that you created when you configured your tenant. Then select **Next**.
194
193
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0058.png" alt-text="Connect to Microsoft Entra ID." border="true":::
195
194
196
-
1. On the **Connect to Active Directory Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
195
+
1. On the **Connect to Microsoft Entra ID Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
197
196
198
197
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0060.png" alt-text="Connect to A D D S page." border="true":::
199
198
@@ -423,11 +422,11 @@ This step requires the following prerequisites:
423
422
424
423
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0137.jpg" alt-text="Assign the cluster admin role to hdiusergroup." border="true":::
425
424
426
-
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Active Directory instance.
425
+
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Microsoft Entra ID instance.
427
426
428
427
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0139.jpg" alt-text="Sign in to the cluster by using the SSH client." border="true":::
429
428
430
-
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Active Directory instance.
429
+
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Microsoft Entra ID instance.
0 commit comments