Skip to content

Commit 87bd720

Browse files
Merge pull request #291802 from sreekzz/patch-875909
Updated Domain Name Administrator
2 parents 1321b60 + d4bca19 commit 87bd720

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

articles/hdinsight/domain-joined/apache-domain-joined-create-configure-enterprise-security-cluster.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,33 +4,33 @@ description: Learn how to create and configure Enterprise Security Package clust
44
services: hdinsight
55
ms.service: azure-hdinsight
66
ms.topic: how-to
7-
ms.date: 09/06/2024
7+
ms.date: 12/11/2024
88
ms.custom: devx-track-azurepowershell
99
---
1010

1111
# Create and configure Enterprise Security Package clusters in Azure HDInsight
1212

13-
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Active Directory-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
13+
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Microsoft Entra ID-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
1414

15-
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Active Directory and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
15+
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Microsoft Entra ID and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
1616

1717
The server you create will act as a replacement for your *actual* on-premises environment. You'll use it for the setup and configuration steps. Later you'll repeat the steps in your own environment.
1818

1919
This guide will also help you create a hybrid identity environment by using password hash sync with Microsoft Entra ID. The guide complements [Use ESP in HDInsight](apache-domain-joined-architecture.md).
2020

2121
Before you use this process in your own environment:
2222

23-
* Set up Active Directory and DNS.
23+
* Set up Microsoft Entra ID and DNS.
2424
* Enable Microsoft Entra ID.
2525
* Sync on-premises user accounts to Microsoft Entra ID.
2626

2727
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0002.png" alt-text="Microsoft Entra architecture diagram." border="false":::
2828

2929
## Create an on-premises environment
3030

31-
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Active Directory forest.
31+
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Microsoft Entra ID forest.
3232

33-
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Active Directory forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
33+
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Microsoft Entra ID forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
3434

3535
1. Select **Deploy to Azure**.
3636
1. Sign in to your Azure subscription.
@@ -65,15 +65,15 @@ In this section, you'll create the users that will have access to the HDInsight
6565
1. Enter the password that you chose for the admin account.
6666
1. Select **OK**.
6767

68-
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Active Directory Users and Computers**.
68+
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Microsoft Entra ID Users and Computers**.
6969

70-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Active Directory Management." border="true":::
70+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Microsoft Entra ID Management." border="true":::
7171

7272
1. Create two new users: **HDIAdmin** and **HDIUser**. These two users will sign in to HDInsight clusters.
7373

74-
1. From the **Active Directory Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
74+
1. From the **Microsoft Entra ID Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
7575

76-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Active Directory user." border="true":::
76+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Microsoft Entra ID user." border="true":::
7777

7878
1. On the **New Object - User** page, enter `HDIUser` for **First name** and **User logon name**. The other fields will autopopulate. Then select **Next**.
7979

@@ -87,13 +87,13 @@ In this section, you'll create the users that will have access to the HDInsight
8787

8888
1. Create a security group.
8989

90-
1. From **Active Directory Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
90+
1. From **Microsoft Entra ID Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
9191

9292
1. Enter `HDIUserGroup` in the **Group name** text box.
9393

9494
1. Select **OK**.
9595

96-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Active Directory group." border="true":::
96+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Microsoft Entra ID group." border="true":::
9797

9898
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0028.png" alt-text="Create a new object." border="true":::
9999

@@ -105,7 +105,7 @@ In this section, you'll create the users that will have access to the HDInsight
105105

106106
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/active-directory-add-users-to-group.png" alt-text="Add the member HDIUser to the group HDIUserGroup." border="true":::
107107

108-
You've now created your Active Directory environment. You've added two users and a user group that can access the HDInsight cluster.
108+
You've now created your Microsoft Entra ID environment. You've added two users and a user group that can access the HDInsight cluster.
109109

110110
The users will be synchronized with Microsoft Entra ID.
111111

@@ -141,9 +141,9 @@ The users will be synchronized with Microsoft Entra ID.
141141

142142
## Configure your Microsoft Entra tenant
143143

144-
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Active Directory instance to the cloud.
144+
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Microsoft Entra ID instance to the cloud.
145145

146-
Create an Active Directory tenant administrator.
146+
Create a Microsoft Entra ID tenant administrator.
147147

148148
1. Sign in to the Azure portal and select your Microsoft Entra tenant, **HDIFabrikam**.
149149

@@ -189,11 +189,11 @@ Create an Active Directory tenant administrator.
189189

190190
1. Select **Use express settings**.
191191

192-
1. On the **Connect to Microsoft Entra ID** page, enter the username and password of the administrator for Microsoft Entra ID. Use the username `[email protected]` that you created when you configured your Active Directory tenant. Then select **Next**.
193-
192+
1. On the **Connect to Microsoft Entra ID** page, enter the username and password of the [Domain Name Administrator](/entra/identity/role-based-access-control/permissions-reference#domain-name-administrator) for Microsoft Entra ID. Use the username `[email protected]` that you created when you configured your tenant. Then select **Next**.
193+
194194
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0058.png" alt-text="Connect to Microsoft Entra ID." border="true":::
195195

196-
1. On the **Connect to Active Directory Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
196+
1. On the **Connect to Microsoft Entra ID Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
197197

198198
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0060.png" alt-text="Connect to A D D S page." border="true":::
199199

@@ -423,11 +423,11 @@ This step requires the following prerequisites:
423423
424424
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0137.jpg" alt-text="Assign the cluster admin role to hdiusergroup." border="true":::
425425
426-
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Active Directory instance.
426+
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Microsoft Entra ID instance.
427427
428428
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0139.jpg" alt-text="Sign in to the cluster by using the SSH client." border="true":::
429429
430-
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Active Directory instance.
430+
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Microsoft Entra ID instance.
431431
432432
## Next steps
433433

0 commit comments

Comments
 (0)