This page provides instructions for how to create an Active Directory policy.
Before you begin
-
Make sure the Active Directory service is reachable, see Active Directory domain controllers and Firewall rules for Active Directory access .
-
Configure Cloud DNS to forward DNS requests for your Windows domain to your Windows DNS servers to enable your Google Cloud Compute Engine virtual machines to resolve Active Directory hostnames, like the Netbios name used by Google Cloud NetApp Volumes. For more information, see Best practices for using Cloud DNS private forwarding zones . This is required for on-premises Active Directory as well as Active Directory built on Compute Engine.
-
When creating SMB volumes, NetApp Volumes uses secure dynamic DNS updates to register its hostname. This process works well when you use Active Directory DNS. If you are using a third-party DNS service to host the zone for your Windows domain, make sure it is configured to support secure DDNS updates. Otherwise, the creation of Flex service type volumes will fail.
Active Directory policy settings don't apply until you create the first volume that requires Active Directory in the specified region. During that volume creation, incorrect settings can cause volume creation failures.
Create an Active Directory policy
Use the following instructions to create an Active Directory policy using the Google Cloud console or Google Cloud CLI.
Console
Use the following instructions to create an Active Directory policy in the Google Cloud console:
-
Go to the NetApp Volumespage in the Google Cloud console.
-
Select Active Directory policies.
-
Click Create.
-
In the Create Active Directory Policydialog, fill out the fields shown in the following table.
Required fields are marked with an asterisk (*).
FieldDescriptionApplies to NFSApplies to SMBApplies to dual protocolActive Directory policy name*The unique identifier name for the policyDescriptionOptional: you can enter a description for the policyRegionRegion*Associates the Active Directory to all volumes in the specified region.Active Directory connection detailsDomain name*Fully qualified domain name for the Active Directory domain.DNS Servers*Comma-separated list of a maximum of three DNS server IP addresses used for DNS-based domain controller discovery .SiteSpecifies an Active Directory site to manage domain controller selection.
Use when Active Directory domain controllers in multiple regions are configured. Defaults to Default-First-Site-Name if left empty.Organizational UnitName of the Organizational Unit where you intend to create the computer account for NetApp Volumes.
Defaults to CN=Computers if left empty.NetBIOS Name Prefix*NetBIOS name prefix of the server to be created.
A five-character random ID is generated automatically, for example,-6f9a
, and appended to the prefix. The full UNC share path has the following format:
\\< NetBIOS_PREFIX >-< 4-random-hexletters >.< DOMAIN_NAME >\< SHARE_NAME >
.Enable AES Encryption for Active Directory authenticationEnables AES-128 and AES-256 encryption for Kerberos-based communication with Active DirectoryActive Directory credentialsUsername* and Password*Credentials for the Active Directory account with permissions to create the compute account within the specified organizational unit.SMB settingsAdministratorsDomain user accounts to be added to the local Administrators group of the SMB service.
Provide a comma-separated list of domain users or groups. The Domain Admin group is automatically added when the service joins your domain as a hidden group.
Administrators only use the Security Account Manager (SAM) Account name. The SAM Account name supports a maximum of 20 characters for your username and 64 characters for your group name.Backup OperatorsDomain user accounts to be added to the Backup Operators group of the SMB service. The Backup Operators group allows members to backup and restore files regardless of whether they have read or write access to the files.
Provide a comma-separated list of domain users or groups.
Backup Operators only use the Security Account Manager (SAM) Account name. The SAM Account name supports a maximum of 20 characters for your username and 64 characters for your group name.Security Privilege UsersDomain accounts that require elevated privileges such asSeSecurityPrivilege
to manage security logs.
Provide a list separated by commas of domain users or groups. This is specifically needed for the installation of a SQL Server where binaries and system databases are stored on an SMB share. This option isn't required if you use an administrator user during installation.NFS settingsKerberos Key Distribution HostnameHostname of the Active Directory server used as Kerberos Key Distribution CenterNFSv4.1 with KerberosSMB and NFSv4.1 with KerberosKDC IPIP address of the Active Directory server used as Kerberos Key Distribution CenterNFSv4.1 with KerberosSMB and NFSv4.1 with KerberosAllow local NFS users with LDAPLocal UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes .
This option can be used to temporarily switch such volumes toAUTH_SYS
authentication (user ID + 1-16 groups).LabelsLabelsOptional: add relevant labels -
Click Create. For Standard, Premium, and Extreme service levels: after creating an Active Directory policy and attaching it with a storage pool, you should test the connection to the Active Directory service .
gcloud
Create an Active Directory policy:
gcloud netapp active-directories create CONFIG_NAME \ --project = PROJECT_ID \ --location = LOCATION \ --dns = DNS_LIST \ --domain = DOMAIN_NAME \ --net-bios-prefix = NetBIOS_PREFIX \ --username = USERNAME \ --password = PASSWORD \
Replace the following information:
-
CONFIG_NAME
: the name of the config you want to create. The config name must be unique per region. -
PROJECT_ID
: project ID you are creating the Active Directory policy in. -
LOCATION
: the region of you want to create the config in. Google Cloud NetApp Volumes only supports one config per region. -
DNS_LIST
: a list separated by commas of up to three IPv4 addresses of Active Directory DNS servers. -
DOMAIN_NAME
: the fully qualified domain name of the Active Directory. -
NetBIOS_PREFIX
: NetBIOS name prefix of the server you want to create. A five-character random ID generates automatically, such as-6f9a
, and appends to the prefix.The full UNC share path has the following format:
\\ < NetBIOS_PREFIX >-< 4 -random-hexletters >.< DOMAIN_NAME > \< SHARE_NAME >.
-
USERNAME
: The name of a domain user with permission to join the domain. -
PASSWORD
: Password for the username.
For more information on additional optional flags, see Google Cloud SDK documentation on Active Directory creation .