This command creates an Active Directory (AD) configuration record. After running this command, run activedirectory list to obtain the ID of the configuration record, and then run activedirectory modify to make the cluster join the Active Directory domain using the Active Directory configuration record ID you obtained.
Important
Ensure that your installation meets the prerequisites and requirements listed in Active Directory Overview.
You can create multiple Active Directory configurations. Note that VAST Cluster does not allow adding two different Active Directory configuration records that have:
The same domain name but different settings for multi-forest authentication and/or auto-discovery.
The same domain name and the same machine account name.
Usage
activedirectory create --machine-account-name MACHINE_NAME
--port PORT
--bindpw BIND_PASSWORD
--method anonymous|simple|sasl
[--organizational-unit OU]
[--allow-smb|--disallow-smb]
[--enable-ntlm|--disable-ntlm]
[--abac-read-only-value-name KEYWORD]
[--abac-read-write-value-name KEYWORD]
[--enable-scheduled-ma-pwd-change|--disable-scheduled-ma-pwd-change]
[--ma-pwd-change-frequency FREQUENCY]
[--ma-pwd-update_time TIME]
[--urls URI_LIST]
[--basedn BASE_DN]
[--domain-name DOMAIN_NAME]
[--binddn BIND_DN]
[--group-basedn GROUP_BASE_DN]
[--query-groups-mode COMPATIBLE|RFC2307BIS_ONLY|RFC2307_ONLY|NONE]
[--use-tls|--no-tls]
[--vms-auth|--no-vms-auth]
[--reverse-lookup|--no-reverse-lookup]
[--gid-number ATTRIBUTE_NAME]
[--uid ATTRIBUTE_NAME]
[--uid-number ATTRIBUTE_NAME]
[--member-uid ATTRIBUTE_NAME]
[--posix-account ATTRIBUTE_NAME]
[--posix-group ATTRIBUTE_NAME]
[--match-user ATTRIBUTE_NAME]
[--username-property-name ATTRIBUTE_NAME]
[--user-login-name ATTRIBUTE_NAME]
[--group-login-name ATTRIBUTE_NAME]
[--mail-property-name ATTRIBUTE_NAME]
[--uid-member-value-property-name ATTRIBUTE_NAME]
[--enable-auto-discovery|--disable-auto-discovery]
[--enable-use-ldaps|--disable-use-ldaps]
[--posix-attributes-source JOINED_DOMAIN|ALL_DOMAINS|SPECIFIC_DOMAINS|GC]
[--domains-with-posix-attributes DOMAINS]
[--enable-multi-forest|--disable-multi-forest]
[--super-admin-groups GROUPS]
[--monitor-action PING|BIND]
Required Parameters
| Specifies a name for the machine object that will be created for the cluster within Active Directory, inside the Organizational Unit (see |
| Sets the port of the remote LDAP server. Recommended values: |
| Sets the password used with the bind DN to authenticate to the LDAP server. |
| The authentication method the LDAP server uses to authenticate VAST Cluster as a client querying the LDAP database. When multi-forest authentication is enabled, VAST Cluster uses SASL for the LDAP bind to domain controllers in other trusted forests, and this setting is only honored for the LDAP bind to domain controllers in the forest of the cluster's joined domain. Set the method according to how the LDAP server is configured to authenticate clients:
|
Options
| The organizational unit (OU) in the Active Directory domain in which to create the machine object. The name of an organizational unit (OU) in the Active Directory domain. If unspecified, the machine object is created in the Computers OU. Specify as a Distinguished Name (DN). For example: OU=Computers,DC=company-ad,DC=com |
| When this option is specified, VAST Cluster can use this Active Directory provider to authenticate and authorize clients accessing the cluster via the SMB storage protocol. (Enabled by default). |
| Disables use of this Active Directory provider for SMB client access. |
| When this option is specified, SMB clients accessing the cluster are allowed to use NTLM authentication to get authenticated via this Active Directory provider. This is the default behavior.
|
| Prohibits use of NTLM authentication on this Active Directory provider. SMB clients are expected to use Kerberos authentication, which requires an SPN to be configured for each virtual IP pool. |
| Sets the ABAC attribute value that grants read-only access to a view tagged with this ABAC attribute. The default is |
| Sets the ABAC attribute value that grants read/write access to a view tagged with this ABAC attribute. The default is |
| Enables scheduled password change for the cluster's machine account on Active Directory. (Disabled by default). |
| Disables scheduled password change for the cluster's machine account on Active Directory. (Disabled by default). |
| Sets the frequency, in days, for scheduled password change for the cluster's machine account on Active Directory. Default: 90 |
| The time of day at which scheduled password change for the cluster's Active Directory machine account should take place. Specify Default: 20:00 |
| Enables TLS (StartTLS) to secure communication between VAST Cluster and the LDAP server. When enabled, VAST Cluster connects to the standard port (port 389 for the domain controller, port 3268 for the Global Catalog) and performs a StartTLS operation as defined in RFC 4513.
|
| Disables TLS (STARTTLS) secure communication between VAST Cluster and the LDAP server. |
| If this option is specified, the LDAP configuration being created will be the one used for VMS authentication. |
| If this option is specified, the LDAP configuration being created will not be used for VMS authentication. This is the default setting. |
| Enables use of DNS reverse lookup for the translation of a client IP address to a host name. When this option is specified, the server compares the host name to host names in netgroup entries. If not specified, the server queries DNS for each host name found in the netgroup entries. |
| Disables use of reverse DNS lookup. This is the default setting. |
| Enables Active Directory domain auto-discovery. (Enabled by default). When auto-discovery is enabled, VAST Cluster automatically discovers and queries all domains and domain controllers in the forest of the cluster's joined domain and, if multi-forest authentication is enabled by the |
| Disables Active Directory domain auto-discovery. When auto-discovery is disabled, the LDAP URI ( |
| When this option is specified, VAST Cluster automatically discovers all domains in other trusted forests, in addition to domains in the forest of the cluster's joined domain. For more information, see Active Directory Overview. This option can only be specified when Active Directory domain auto-discovery. is enabled ( |
| Disables multi-forest authentication on the cluster. |
| Enables use of LDAPS for Active Directory domain auto-discovery. When enabled, VAST Cluster connects to an alternative port (port 636 for the domain controller, port 3269 for the Global Catalog) and initiates a TLS handshake immediately afterwards. |
| Disables use of LDAPS for Active Directory domain auto-discovery. |
| Determines domains from which VAST Cluster queries POSIX attributes. Options include:
|
| Provides a comma-separated list of the specific domains when For example: |
| Enter URIs of LDAP servers (domain controllers in the Active Directory joined domain). The order of listing defines the priority order. The URI with highest priority that has a good health status is used. If you are going to use Active Directory domain auto-discovery, specify Otherwise, specify The domain controllers should all be in the same Active Directory domain which VAST Cluster joins. Examples:
|
| Sets the bind DN for authenticating to the LDAP server. The bind DN specifies the user with which VAST Cluster authenticates to the LDAP directory. Enter the bind DN for authenticating to the LDAP domain. The bind DN specifies the user with which VAST Cluster authenticates to the LDAP directory. You can specify any user account that has read access to the domain. The format is a comma separated list of components. Each component is an attribute=value pair defining an object in the directory tree. The first component is a cn attribute component specifying the user object, the next component is its container and so on up the tree, with the last component representing the top level domain. The following attributes can be specified:
For example, If multi-forest authentication is enabled and/or SASL authentication method is used, specify the bind DN in one of the following formats:
|
| Sets the entry in the LDAP directory tree to use as a starting point for group queries. If not specified, the base DN is used. |
| The mode for querying a user's auxiliary group memberships, when the auth provider is set as the source for group membership in the view policy:
|
| Grants members of specified groups on the provider cluster admin manager access to VMS. Users in these groups can log into VMS. To grant permissions to these users, add the group name to roles. By default, they are assigned a read-only role. |
| Determines the type of periodic health check that VAST cluster performs for an Active Directory provider configured for the cluster:
|
Attribute Mapping Options
If your Active Directory server uses attributes that differ from the default RFC2307BIS attribute set that is used for LDAP queries, these options map those attributes to the attribute names used on the server you are connecting the cluster to.
Example: uid=cn --posix-account user --posix-group group
| The attribute of a group entry that contains the GID number of a group. Default: gidNumber |
| The attribute of a user entry that contains the user name. Default: uid |
| The attribute of a user entry that contains the UID number. Default: uidNumber |
| The attribute of the group entry that contains names of group members. Default: member |
| The object class that defines a user entry. Default: user |
| The object class that defines a group entry. Default: group |
| Use this option to specify which attribute to use for matching users across providers during user refresh and user authentication. When querying a provider for a user that matches a user that was already retrieved from another provider, a user entry that contains a matching value in this attribute will be considered the same user as the user previously retrieved. Default: sAMAccountName |
| Overrides 'name' as the attribute to use for querying users in VMS user-initiated user queries. Default: name |
| Specifies the attribute used to query Active Directory for the user login name in NFS ID mapping. Applicable only with Active Directory and NFSv4.1. Default: sAMAccountName |
| Specifies the attribute used to query Active Directory for the group login name in NFS ID mapping. Applicable only with Active Directory and NFSv4.1. Default: sAMAccountName |
| Specifies the attribute to use for the user's email address. Default: mail |
| Specifies the attribute which represents the value of the LDAP group's Default: sAMAccountName |
Example
vcli: admin> activedirectory create --machine-account-name cluster1 --organizational-unit OU=Computers,DC=company,DC=com --port 389 --binddn admin@mydomain.local --bindpw !@WE56yt --method simple --domain-name company-ad.com --uid=distinguishedName --member-uid member --posix-account user --posix-group group --use-tls