Create an Active Directory policy

This page provides instructions for how to create an Active Directory policy.

Before you begin

  • Make sure the Active Directory service is reachable, see Active Directory domain controllers and Firewall rules for Active Directory access .

  • Configure Cloud DNS to forward DNS requests for your Windows domain to your Windows DNS servers to enable your Google Cloud Compute Engine virtual machines to resolve Active Directory hostnames, like the Netbios name used by Google Cloud NetApp Volumes. For more information, see Best practices for using Cloud DNS private forwarding zones . This is required for on-premises Active Directory as well as Active Directory built on Compute Engine.

  • When creating SMB volumes, NetApp Volumes uses secure dynamic DNS updates to register its hostname. This process works well when you use Active Directory DNS. If you are using a third-party DNS service to host the zone for your Windows domain, make sure it is configured to support secure DDNS updates. Otherwise, the creation of Flex service type volumes will fail.

Active Directory policy settings don't apply until you create the first volume that requires Active Directory in the specified region. During that volume creation, incorrect settings can cause volume creation failures.

Create an Active Directory policy

Use the following instructions to create an Active Directory policy using the Google Cloud console or Google Cloud CLI.

Console

Use the following instructions to create an Active Directory policy in the Google Cloud console:

  1. Go to the NetApp Volumespage in the Google Cloud console.

    Go to NetApp Volumes

  2. Select Active Directory policies.

  3. Click Create.

  4. In the Create Active Directory Policydialog, fill out the fields shown in the following table.

    Required fields are marked with an asterisk (*).

    Field
    Description
    Applies to NFS
    Applies to SMB
    Applies to dual protocol
    Active Directory policy name*
    The unique identifier name for the policy
    Description
    Optional: you can enter a description for the policy
    Region
    Region*
    Associates the Active Directory to all volumes in the specified region.
    Active Directory connection details
    Domain name*
    Fully qualified domain name for the Active Directory domain.
    DNS Servers*
    Comma-separated list of a maximum of three DNS server IP addresses used for DNS-based domain controller discovery .
    Site
    Specifies an Active Directory site to manage domain controller selection.

    Use when Active Directory domain controllers in multiple regions are configured. Defaults to Default-First-Site-Name if left empty.
    Organizational Unit
    Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes.

    Defaults to CN=Computers if left empty.
    NetBIOS Name Prefix*
    NetBIOS name prefix of the server to be created.

    A five-character random ID is generated automatically, for example, -6f9a , and appended to the prefix. The full UNC share path has the following format:

    \\< NetBIOS_PREFIX >-< 4-random-hexletters >.< DOMAIN_NAME >\< SHARE_NAME > .
    Enable AES Encryption for Active Directory authentication
    Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory
    Active Directory credentials
    Username* and Password*
    Credentials for the Active Directory account with permissions to create the compute account within the specified organizational unit.
    SMB settings
    Administrators
    Domain user accounts to be added to the local Administrators group of the SMB service.

    Provide a comma-separated list of domain users or groups. The Domain Admin group is automatically added when the service joins your domain as a hidden group.

    Administrators only use the Security Account Manager (SAM) Account name. The SAM Account name supports a maximum of 20 characters for your username and 64 characters for your group name.

    Backup Operators
    Domain user accounts to be added to the Backup Operators group of the SMB service. The Backup Operators group allows members to backup and restore files regardless of whether they have read or write access to the files.

    Provide a comma-separated list of domain users or groups.

    Backup Operators only use the Security Account Manager (SAM) Account name. The SAM Account name supports a maximum of 20 characters for your username and 64 characters for your group name.
    Security Privilege Users
    Domain accounts that require elevated privileges such as SeSecurityPrivilege to manage security logs.

    Provide a list separated by commas of domain users or groups. This is specifically needed for the installation of a SQL Server where binaries and system databases are stored on an SMB share. This option isn't required if you use an administrator user during installation.
    NFS settings
    Kerberos Key Distribution Hostname
    Hostname of the Active Directory server used as Kerberos Key Distribution Center
    NFSv4.1 with Kerberos
    SMB and NFSv4.1 with Kerberos
    KDC IP
    IP address of the Active Directory server used as Kerberos Key Distribution Center
    NFSv4.1 with Kerberos
    SMB and NFSv4.1 with Kerberos
    Allow local NFS users with LDAP
    Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes .

    This option can be used to temporarily switch such volumes to AUTH_SYS authentication (user ID + 1-16 groups).
    Labels
    Labels
    Optional: add relevant labels
  5. Click Create. For Standard, Premium, and Extreme service levels: after creating an Active Directory policy and attaching it with a storage pool, you should test the connection to the Active Directory service .

gcloud

Create an Active Directory policy:

  
gcloud  
netapp  
active-directories  
create  
 CONFIG_NAME 
  
 \ 
  
--project = 
 PROJECT_ID 
  
 \ 
  
--location = 
 LOCATION 
  
 \ 
  
--dns = 
 DNS_LIST 
  
 \ 
  
--domain = 
 DOMAIN_NAME 
  
 \ 
  
--net-bios-prefix = 
 NetBIOS_PREFIX 
  
 \ 
  
--username = 
 USERNAME 
  
 \ 
  
--password = 
 PASSWORD 
  
 \ 
  

Replace the following information:

  • CONFIG_NAME : the name of the config you want to create. The config name must be unique per region.

  • PROJECT_ID : project ID you are creating the Active Directory policy in.

  • LOCATION : the region of you want to create the config in. Google Cloud NetApp Volumes only supports one config per region.

  • DNS_LIST : a list separated by commas of up to three IPv4 addresses of Active Directory DNS servers.

  • DOMAIN_NAME : the fully qualified domain name of the Active Directory.

  • NetBIOS_PREFIX : NetBIOS name prefix of the server you want to create. A five-character random ID generates automatically, such as -6f9a , and appends to the prefix.

    The full UNC share path has the following format:

     \\ 
    < NetBIOS_PREFIX 
    >-<  4 
    -random-hexletters 
    >.< DOMAIN_NAME 
    > \< 
     SHARE_NAME 
    >.
  • USERNAME : The name of a domain user with permission to join the domain.

  • PASSWORD : Password for the username.

For more information on additional optional flags, see Google Cloud SDK documentation on Active Directory creation .

What's next

Test the Active Directory policy connection .

Create a Mobile Website
View Site in Mobile | Classic
Share by: