This command enables you to modify the Active Directory configuration and to make the cluster join or leave an Active Directory domain.
Usage (Configuration)
activedirectory modify --id ID
[--allow-smb|--disallow-smb]
[--enable-ntlm|--disable-ntlm]
[--enable-auto-discovery|--disable-auto-discovery]
[--enable-use-ldaps|--disable-use-ldaps]
[--urls URI_LIST]
[--port PORT]
[--binddn BIND_DN]
[--bindpw BIND_PASSWORD]
[--basedn BASE_DN]
[--group-basedn GROUP_BASE_DN]
[--method anonymous|simple|sasl]
[--gid-number ATTRIBUTE_NAME]
[--uid ATTRIBUTE_NAME]
[--uid-number ATTRIBUTE_NAME]
[--member-uid ATTRIBUTE_NAME]
[--posix-account ATTRIBUTE_NAME]
[--posix-group ATTRIBUTE_NAME]
[--match-user ATTRIBUTE_NAME]
[--uid-member-value-property-name ATTRIBUTE_NAME]
[--query-groups-mode COMPATIBLE|RFC2307BIS_ONLY|RFC2307_ONLY|NONE]
[--username-property-name ATTRIBUTE_NAME]
[--use-tls|--no-tls]
[--domain-name DOMAIN_NAME]
[--user-login-name ATTRIBUTE_NAME]
[--group-login-name ATTRIBUTE_NAME]
[--mail-property-name ATTRIBUTE_NAME]
[--vms-auth|--no-vms-auth]
[--posix-attributes-source JOINED_DOMAIN|ALL_DOMAINS|SPECIFIC_DOMAINS|GC]
[--domains-with-posix-attributes DOMAINS]
[--abac-read-only-value-name KEYWORD]
[--abac-read-write-value-name KEYWORD]
[--reverse-lookup|--no-reverse-lookup]
[--enable-multi-forest|--disable-multi-forest]
Usage (Joining and Leaving)
activedirectory modify --id ID
[--admin-username USERNAME]
[--admin-passwd PASSWORD]
[--join|--leave]Required Parameters
| Identifies the Active Directory configuration. To obtain the ID of an Active Directory configuration record, run activedirectory list. |
Options (Configuration)
| Allows VAST Cluster to use this Active Directory provider to authenticate and authorize clients accessing the cluster via the SMB storage protocol.
|
| Disables use of this Active Directory provider for SMB client access.
|
| When this option is specified, SMB clients accessing the cluster are allowed to use NTLM authentication to get authenticated via this Active Directory provider. This is the default behavior.
|
| Prohibits use of NTLM authentication on this Active Directory provider.
|
| Enables Active Directory domain auto-discovery. (Enabled by default). When auto-discovery is enabled, VAST Cluster automatically discovers and queries all domains and domain controllers in the forest of the cluster's joined domain and, if multi-forest authentication is enabled by the |
| Disables Active Directory domain auto-discovery. When auto-discovery is disabled, the LDAP URI ( |
| Enables use of LDAPS for Active Directory domain auto-discovery. When enabled, VAST Cluster connects to an alternative port (port 636 for the domain controller, port 3269 for the Global Catalog) and initiates a TLS handshake immediately afterwards. |
| Disables use of LDAPS for Active Directory domain auto-discovery. |
| Use this option only if you choose to disable auto discovery (see Specify The domain controllers should all be in the same Active Directory domain which VAST Cluster joins. Examples:
|
| Sets the port of the remote LDAP server. Recommended values: |
| Sets the bind DN for authenticating to the LDAP server. The bind DN specifies the user with which VAST Cluster authenticates to the LDAP directory. Enter the bind DN for authenticating to the LDAP domain. The bind DN specifies the user with which VAST Cluster authenticates to the LDAP directory. You can specify any user account that has read access to the domain. The format is a comma separated list of components. Each component is an attribute=value pair defining an object in the directory tree. The first component is a cn attribute component specifying the user object, the next component is its container and so on up the tree, with the last component representing the top level domain. The following attributes can be specified:
For example, If multi-forest authentication is enabled and/or SASL authentication method is used, specify the bind DN in one of the following formats:
|
| Sets the password used with the bind DN to authenticate to the LDAP server. |
| Specifies the entry in the LDAP directory tree to use as a starting point for user queries. By default, this is also used as the starting point for group queries. Optionally, you can specify a different entry as the group base DN on To maximize the speed of authentication queries, start the search in the lowest branch of the tree under which all users can be found. For example, if the entire directory must be queried, the search base must specify the root of the tree. However, if the search can be restricted to a specific organizational unit (OU), queries may be faster. Specify The following attributes can be specified:
|
| Sets the entry in the LDAP directory tree to use as a starting point for group queries. If not specified, the base DN is used. |
| The authentication method the LDAP server uses to authenticate VAST Cluster as a client querying the LDAP database. When multi-forest authentication is enabled, VAST Cluster uses SASL for the LDAP bind to domain controllers in other trusted forests, and this setting is only honored for the LDAP bind to domain controllers in the forest of the cluster's joined domain. Set the method according to how the LDAP server is configured to authenticate clients:
|
| The attribute of a group entry that contains the GID number of a group. Default: gidNumber |
| The attribute of a user entry that contains the user name. Default: uid |
| The attribute of a user entry that contains the UID number. Default: uidNumber |
| The attribute of the group entry that contains names of group members. Default: member |
| The object class that defines a user entry. Default: user |
| The object class that defines a group entry. Default: group |
| Use this option to specify which attribute to use for matching users across providers during user refresh and user authentication. When querying a provider for a user that matches a user that was already retrieved from another provider, a user entry that contains a matching value in this attribute will be considered the same user as the user previously retrieved. Default: sAMAccountName |
| Specifies the attribute which represents the value of the LDAP group's Default: sAMAccountName |
| The mode for querying a user's auxiliary group memberships, when the auth provider is set as the source for group membership in the view policy:
|
| Overrides 'name' as the attribute to use for querying users in VMS user-initiated user queries. Default: name |
| Enables TLS (StartTLS) to secure communication between VAST Cluster and the LDAP server. When enabled, VAST Cluster connects to the standard port (port 389 for the domain controller, port 3268 for the Global Catalog) and performs a StartTLS operation as defined in RFC 4513.
|
| Disables TLS (STARTTLS) secure communication between VAST Cluster and the LDAP server. |
| Sets the fully qualified domain name (FQDN) of the domain to join. For example: - |
| Specifies the attribute used to query Active Directory for the user login name in NFS ID mapping. Applicable only with Active Directory and NFSv4.1. Default: sAMAccountName |
| Specifies the attribute used to query Active Directory for the group login name in NFS ID mapping. Applicable only with Active Directory and NFSv4.1. Default: sAMAccountName |
| Specifies the attribute to use for the user's email address. Default: mail |
| If this option is specified, the LDAP configuration being created will be the one used for VMS authentication. |
| If this option is specified, the LDAP configuration being created will not be used for VMS authentication. This is the default setting. |
| Determines domains from which VAST Cluster queries POSIX attributes. Options include:
|
| Provides a comma-separated list of the specific domains when For example: |
| Sets the ABAC attribute value that grants read-only access to a view tagged with this ABAC attribute. The default is |
| Sets the ABAC attribute value that grants read/write access to a view tagged with this ABAC attribute. The default is |
Options (Joining and Leaving)
| Specify an Active Directory admin user with permission to join the Active Directory domain. |
| Specify the password for the specified user. If not supplied, you are prompted for the password.
|
| Include this option to join the Active Directory domain. |
| Include this option to leave the Active Directory domain. |
Example
This example shows the cluster joining to an Active Directory domain.
vcli: admin> activedirectory modify --id 1 --join --admin-username myuser
Are you sure you want to modify the Active directory? [y/N] y
Enter admin password:
Password:
Waiting ...
[2020-03-31 10:18:39] waiting for active directory AD enabled state to change to True ...\
[2020-03-31 10:19:45] modify active directory completed successfully .../