Skip to content

Commit 724949e

Browse files
authored
Merge pull request #188887 from b-ahibbard/anf-adconnections-16feb
modify article
2 parents 5eb43bf + 6f95cd4 commit 724949e

File tree

5 files changed

+71
-4
lines changed

5 files changed

+71
-4
lines changed

articles/azure-netapp-files/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,8 @@
151151
items:
152152
- name: Create and manage Active Directory connections
153153
href: create-active-directory-connections.md
154+
- name: Modify Active Directory connections
155+
href: modify-active-directory-connections.md
154156
- name: Enable ADDS LDAP authentication for NFS volumes
155157
href: configure-ldap-over-tls.md
156158
- name: Manage capacity pools

articles/azure-netapp-files/configure-ldap-extended-groups.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: how-to
15-
ms.date: 03/03/2022
15+
ms.date: 03/15/2022
1616
ms.author: anfdocs
1717
---
1818
# Enable Active Directory Domain Services (ADDS) LDAP authentication for NFS volumes
@@ -120,3 +120,4 @@ The following information is passed to the server in the query:
120120
* [Create and manage Active Directory connections](create-active-directory-connections.md)
121121
* [Configure NFSv4.1 domain](azure-netapp-files-configure-nfsv41-domain.md#configure-nfsv41-domain)
122122
* [Troubleshoot volume errors for Azure NetApp Files](troubleshoot-volumes.md)
123+
* [Modify Active Directory connections for Azure NetApp Files](modify-active-directory-connections.md)

articles/azure-netapp-files/configure-ldap-over-tls.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: how-to
15-
ms.date: 01/04/2022
15+
ms.date: 03/15/2022
1616
ms.author: anfdocs
1717
---
1818
# Configure ADDS LDAP over TLS for Azure NetApp Files
@@ -75,4 +75,5 @@ Disabling LDAP over TLS stops encrypting LDAP queries to Active Directory (LDAP
7575
* [Create an NFS volume for Azure NetApp Files](azure-netapp-files-create-volumes.md)
7676
* [Create an SMB volume for Azure NetApp Files](azure-netapp-files-create-volumes-smb.md)
7777
* [Create a dual-protocol volume for Azure NetApp Files](create-volumes-dual-protocol.md)
78+
* [Modify Active Directory connections for Azure NetApp Files](modify-active-directory-connections.md)
7879

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,12 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: how-to
15-
ms.date: 03/11/2022
15+
ms.date: 03/15/2022
1616
ms.author: anfdocs
1717
---
1818
# Create and manage Active Directory connections for Azure NetApp Files
1919

20-
Several features of Azure NetApp Files require that you have an Active Directory connection. For example, you need to have an Active Directory connection before you can create an [SMB volume](azure-netapp-files-create-volumes-smb.md), a [NFSv4.1 Kerberos volume](configure-kerberos-encryption.md), or a [dual-protocol volume](create-volumes-dual-protocol.md). This article shows you how to create and manage Active Directory connections for Azure NetApp Files.
20+
Several features of Azure NetApp Files require that you have an Active Directory connection. For example, you need to have an Active Directory connection before you can create an [SMB volume](azure-netapp-files-create-volumes-smb.md), a [NFSv4.1 Kerberos volume](configure-kerberos-encryption.md), or a [dual-protocol volume](create-volumes-dual-protocol.md). This article shows you how to create and manage Active Directory connections for Azure NetApp Files.
2121

2222
## Before you begin
2323

@@ -357,6 +357,7 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
357357
358358
## Next steps
359359
360+
* [Modify Active Directory connections](modify-active-directory-connections.md)
360361
* [Create an SMB volume](azure-netapp-files-create-volumes-smb.md)
361362
* [Create a dual-protocol volume](create-volumes-dual-protocol.md)
362363
* [Configure NFSv4.1 Kerberos encryption](configure-kerberos-encryption.md)
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Modify an Active Directory Connection for Azure NetApp Files | Microsoft Docs
3+
description: This article shows you how to modify Active Directory connections for Azure NetApp Files.
4+
services: azure-netapp-files
5+
documentationcenter: ''
6+
author: b-hchen
7+
manager: ''
8+
editor: ''
9+
10+
ms.assetid:
11+
ms.service: azure-netapp-files
12+
ms.workload: storage
13+
ms.tgt_pltfrm: na
14+
ms.topic: how-to
15+
ms.date: 03/15/2022
16+
ms.author: anfdocs
17+
---
18+
19+
# Modify Active Directory connections for Azure NetApp Files
20+
21+
Once you have [created an Active Directory connection](create-active-directory-connections.md) in Azure NetApp Files, you can modify it. When modifying an Active Directory, not all configurations can be modified.
22+
23+
## Modify Active Directory connections
24+
25+
1. Select **Active Directory connections**. Then, select **Edit** to edit an existing AD connection.
26+
27+
1. In the **Edit Active Directory** window that appears, modify Active Directory connection configurations as needed. See [Options for Active Directory connections](#options-for-active-directory-connections) for an explanation of what fields can be modified.
28+
29+
## Options for Active Directory connections
30+
31+
|Field Name |What it is |Can it be modified? |Considerations & Impacts |Effect |
32+
|:-:|:--|:-:|:--|:--|
33+
| Primary DNS | Primary DNS server IP addresses for the Active Directory domain. | Yes | None* | New DNS IP will be used for DNS resolution. |
34+
| Secondary DNS | Secondary DNS server IP addresses for the Active Directory domain. | Yes | None* | New DNS IP will be used for DNS resolution in case primary DNS fails. |
35+
| AD DNS Domain Name | The domain name of your Active Directory Domain Services that you want to join. | No | None | N/A |
36+
| AD Site Name | The site to which the domain controller discovery is limited. | Yes | This should match the site name in Active Directory Sites and Services. See footnote.* | Domain discovery will be limited to the new site name. If not specified, "Default-First-Site-Name" will be used. |
37+
| SMB Server (Computer Account) Prefix | Naming prefix for the machine account in Active Directory that Azure NetApp Files will use for the creation of new accounts. See footnote.* | Yes | Existing volumes need to be mounted again as the mount is changed for SMB shares and NFS Kerberos volumes.* | Renaming the SMB server prefix after you create the Active Directory connection is disruptive. You'll need to remount existing SMB shares and NFS Kerberos volumes after renaming the SMB server prefix as the mount path will change. |
38+
| Organizational Unit Path | The LDAP path for the organizational unit (OU) where SMB server machine accounts will be created. `OU=second level`, `OU=first level`| No | If you are using Azure NetApp Files with Azure Active Directory Domain Services (AADDS), the organizational path is `OU=AADDC Computers` when you configure Active Directory for your NetApp Account. | Machine accounts will be placed under the OU specified. If not specified, the default of `OU=Computers` is used by default. |
39+
| AES Encryption | To take advantage of the strongest security with Kerberos-based communication, you can enable AES-256 and AES-128 encryption on the SMB server. | Yes | If you enable AES encryption, the user credentials used to join Active Directory must have the highest corresponding account option enabled, matching the capabilities enabled for your Active Directory. For example, if your Active Directory has only AES-128 enabled, you must enable the AES-128 account option for the user credentials. If your Active Directory has the AES-256 capability, you must enable the AES-256 account option (which also supports AES-128). If your Active Directory does not have any Kerberos encryption capability, Azure NetApp Files uses DES by default.* | Enable AES encryption for Active Directory Authentication |
40+
| LDAP Signing | This functionality enables secure LDAP lookups between the Azure NetApp Files service and the user-specified Active Directory Domain Services domain controller. | Yes | LDAP signing to Require Signing in group policy* | This provides ways to increase the security for communication between LDAP clients and Active Directory domain controllers. |
41+
| Allow local NFS users with LDAP | If enabled, this option will manage access for local users and LDAP users. | Yes | This option will allow access to local users. It is not recommended and, if enabled, should only be used for a limited time and later disabled. | If enabled, this option will allow access to local users and LDAP users. If access is needed for only LDAP users, this option must be disabled. |
42+
| LDAP over TLS | If enabled, LDAP over TLS will be configured to support secure LDAP communication to active directory. | Yes | None | If LDAP over TLS is enabled and if the server root CA certificate is already present in the database, then LDAP traffic is secured using the CA certificate. If a new certificate is passed in, that certificate will be installed. |
43+
| Server root CA Certificate | When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64-encoded Active Directory Certificate Service's self-signed root CA certificate. | Yes | None* | LDAP traffic secured with new certificate only if LDAP over TLS is enabled |
44+
| Backup policy users | You can include additional accounts that require elevated privileges to the computer account created for use with Azure NetApp Files. See [Create and manage Active Directory connections](create-active-directory-connections.md#create-an-active-directory-connection) for more information. | Yes | None* | The specified accounts will be allowed to change the NTFS permissions at the file or folder level. |
45+
| Administrators | Specify users or groups that will be given administrator privileges on the volume | Yes | None | User account will receive administrator privileges |
46+
| Username | Username of the Active Directory domain administrator | Yes | None* | Credential change to contact DC |
47+
| Password | Password of the Active Directory domain administrator | Yes | None* | Credential change to contact DC |
48+
| Kerberos Realm: AD Server Name | The name of the Active Directory machine. This option is only used when creating a Kerberos volume. | Yes | None* | |
49+
| Kerberos Realm: KDC IP | Specifies the IP address of the Kerberos Distribution Center (KDC) server. KDC in Azure NetApp Files is an Active Directory server | Yes | None | A new KDC IP address will be used | None* |
50+
| Region | The region where the Active Directory credentials are associated | No | None | N/A |
51+
| User DN | User domain name, which overrides the base DN for user lookups Nested userDN can be specified in `OU=subdirectory, OU=directory, DC=domain, DC=com` format.​ | Yes | None* | User search scope gets limited to User DN instead of base DN. |
52+
| Group DN | Group domain name. groupDN overrides the base DN for group lookups. Nested groupDN can be specified in `OU=subdirectory, OU=directory, DC=domain, DC=com` format.​ | Yes | None* | Group search scope gets limited to Group DN instead of base DN. |
53+
| Group Membership Filter | The custom LDAP search filter to be used when looking up group membership from LDAP server.​ `groupMembershipFilter` can be specified with the `(gidNumber=*)` format. | Yes | None* | Group membership filter will be used while querying group membership of a user from LDAP server. |
54+
| Security Privilege Users | You can grant security privilege (`SeSecurityPrivilege`) to users that require elevated privilege to access the Azure NetApp Files volumes. The specified user accounts will be allowed to perform certain actions on Azure NetApp Files SMB shares that require security privilege not assigned by default to domain users. See [Create and manage Active Directory connections](create-active-directory-connections.md#create-an-active-directory-connection) for more information. | Yes | Using this feature is optional and supported only for SQL Server. The domain account used for installing SQL Server must already exist before you add it to the Security privilege users field. When you add the SQL Server installer's account to Security privilege users, the Azure NetApp Files service might validate the account by contacting the domain controller. The command might fail if it cannot contact the domain controller. For more information about `SeSecurityPrivilege` and SQL Server, see [SQL Server installation fails if the Setup account doesn't have certain user rights](/troubleshoot/sql/install/installation-fails-if-remove-user-right.md).* | Allows non-administrator accounts to use SQL severs on top of ANF volumes. |
55+
56+
**\*There is no impact on a modified entry only if the modifications are entered correctly. If you enter data incorrectly, users and applications will lose access.**
57+
58+
## Next Steps
59+
60+
* [Configure ADDS LDAP with extended groups for NFS](configure-ldap-extended-groups.md)
61+
* [Configure ADDS LDAP over TLS](configure-ldap-over-tls.md)
62+
* [Create and manage Active Directory connections](create-active-directory-connections.md)

0 commit comments

Comments
 (0)