|
1 | 1 | :github-address: https://github.com/hazelcast-guides/active-directory-authentication |
2 | | -:templates-url: https://raw.githubusercontent.com/hazelcast-guides/adoc-templates/master |
| 2 | +:templates-url: templates:ROOT:page$/ |
3 | 3 |
|
4 | 4 | = Active Directory authentication |
5 | 5 |
|
@@ -31,13 +31,13 @@ starts a domain for you on few clicks: |
31 | 31 | * https://github.com/maxskunkworks/TLG/tree/master/tlg-base-config_3-vm |
32 | 32 |
|
33 | 33 | .Screenshot - Azure AD template on GitHub |
34 | | -image::screenshots/azure-ad-template-on-github.png[Azure AD template on GitHub.] |
| 34 | +image::azure-ad-template-on-github.png[Azure AD template on GitHub.] |
35 | 35 |
|
36 | 36 | .Screenshot - AD domain template parameters on Azure |
37 | | -image::screenshots/azure-deployment.png[Azure AD deployment parameters.] |
| 37 | +image::azure-deployment.png[Azure AD deployment parameters.] |
38 | 38 |
|
39 | 39 | .Screenshot - AD domain deployment on Azure |
40 | | -image::screenshots/azure-deployed-ad-domain.png[Deployed AD domain.] |
| 40 | +image::azure-deployed-ad-domain.png[Deployed AD domain.] |
41 | 41 |
|
42 | 42 | == Environment |
43 | 43 |
|
@@ -74,7 +74,7 @@ include::../../../../allow-hazelcast-port.ps1[] |
74 | 74 | ---- |
75 | 75 |
|
76 | 76 | .Screenshot - Adding Windows Firewall Rule in PowerShell |
77 | | -image::screenshots/add-firewall-rule.png[Adding firewall rule in a PowerShell window.] |
| 77 | +image::add-firewall-rule.png[Adding firewall rule in a PowerShell window.] |
78 | 78 |
|
79 | 79 | === Kerberos configuration file |
80 | 80 |
|
@@ -122,7 +122,7 @@ Commands used: |
122 | 122 | - https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/ktpass[ktpass] |
123 | 123 |
|
124 | 124 | .Screenshot - New accounts in AD users GUI |
125 | | -image::screenshots/ad-new-accounts-for-members.png[Users and groups in Active Directory.] |
| 125 | +image::ad-new-accounts-for-members.png[Users and groups in Active Directory.] |
126 | 126 |
|
127 | 127 | The `hz/ [email protected]` and `hz/ [email protected]` are Service Principal Names (SPN) |
128 | 128 | and we will reference them in the Hazelcast member configuration. |
@@ -175,7 +175,7 @@ Starting Hazelcast members on both servers should now result in forming |
175 | 175 | a new Hazelcast cluster with both members. |
176 | 176 |
|
177 | 177 | .Screenshot - Running Hazelcast cluster |
178 | | -image::screenshots/client-running.png[Running Hazelcast cluster.] |
| 178 | +image::client-running.png[Running Hazelcast cluster.] |
179 | 179 |
|
180 | 180 | Within the `security` configuration, we defined which realm is used for |
181 | 181 | the member-to-member authentication (`kerberosRealm`). |
@@ -361,7 +361,7 @@ The application should successfully connect to the cluster and data operations |
361 | 361 | should work. |
362 | 362 |
|
363 | 363 | .Screenshot - Client Console Demo Application |
364 | | -image::screenshots/client-running.png[Running the client demo application.] |
| 364 | +image::client-running.png[Running the client demo application.] |
365 | 365 |
|
366 | 366 | == Troubleshooting |
367 | 367 |
|
|
0 commit comments