Skip to main content
NetApp Knowledge Base

How to configure AD authentication for cluster when CIFS is not licensed

Views:
10,661
Visibility:
Public
Votes:
3
Category:
clustered-data-ontap-8
Specialty:
nas
Last Updated:

Applies to

  • ONTAP 9
  • Active Directory (AD)

Description

  • Joining a data SVM to a domain does not create a CIFS server or require a CIFS license
  • It enables the authentication of AD users and groups at the SVM or cluster level

Procedure

Prerequisites
Process
  1. Create an active directory connection with any one of the following three methods:
    1. Starting in ONTAP 9.16.1 create an SVM computer account on the domain for the Admin SVM (no domain tunnel required).

      Example:

      cluster1::> vserver active-directory create -vserver <SVM_name> -account-name <NetBIOS_account_name> -domain <domain> -ou <organizational_unit>

    2. Configure an authentication tunnel (referred to as a domain tunnel) ensuring a SVM Management LIF exists (Create ONTAP LIFs).
  • Example:

cluster1::> security login domain-tunnel create -vserver svm01

cluster1::> security login domain-tunnel show
    Tunnel Vserver: svm01

  1. For ASA r2 Configure active directory domain controller access.
    1. Grant an AD user or group access to the cluster by using the security login create command with the -authmethod parameter set to domain:
    cluster1::> security login create -vserver <cluster_name> -user-or-group-name DOMAIN1\AD_user -application ssh -authmethod domain
    Note: Specify either the Admin SVM or the Data SVM if access is to be granted for the data SVM.
      Video Overview
      NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.