Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 2a43c17

Browse files
authored
Merge pull request #17024 from cloudmelon/20200915-ad-deployment
add AD security
2 parents 793b560 + 6ddb128 commit 2a43c17

1 file changed

Lines changed: 25 additions & 6 deletions

File tree

docs/big-data-cluster/deploy-active-directory.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to upgrade SQL Server Big Data Clusters in an Active Dire
55
author: mihaelablendea
66
ms.author: mihaelab
77
ms.reviewer: mikeray
8-
ms.date: 08/04/2020
8+
ms.date: 09/15/2020
99
ms.topic: conceptual
1010
ms.prod: sql
1111
ms.technology: big-data-cluster
@@ -20,12 +20,31 @@ authentication mode. The cluster uses an existing AD domain for authentication.
2020

2121
>[!Note]
2222
>Before SQL Server 2019 CU5 release, there is a restriction in big data clusters so that only one cluster could be deployed against an Active Directory domain. This restriction is removed with the CU5 release, see [Concept: deploy [!INCLUDE[big-data-clusters-2019](../includes/ssbigdataclusters-ss-nover.md)] in Active Directory mode](active-directory-deployment-background.md) for details on the new capabilities. Examples in this article are adjusted to accommodate both deployment use cases.
23+
>
2324
2425
## Background
2526

26-
To enable Active Directory (AD) authentication, the BDC automatically creates the users, groups, machine accounts, and service principal names (SPN) that the various services in the cluster need. To provide some containment of these accounts and allow scoping permissions, choose an organizational unit (OU) during deployment where all BDC-related AD objects will be created. Create this OU before cluster deployment.
27+
To enable Active Directory (AD) authentication, the BDC automatically creates the users, groups, machine accounts, and service principal names (SPN) that the various services in the cluster need. To provide some containment of these accounts and allow scoping permissions, we suggest create an organizational unit (OU) before cluster deployment. All BDC-related AD objects will be created during deployment.
28+
29+
## Pre-requisites
30+
31+
### Organizational Unit (OU)
32+
An organizational unit (OU) is a subdivision within an Active Directory into where place users, groups, and even other organizational units. Big picture Organizational units can be used to mirror an organization's functional or business structure. This article we'll create an OU called `bdc` as an example.
33+
34+
>[!Note]
35+
The organizational unit (OU) represents administrative boundaries and enable customers to control the scope of authority of data administrators.
36+
>
37+
38+
You can follow [OU Design Principles](/windows-server/identity/ad-ds/plan/reviewing-ou-design-concepts.md) to decide on the best structure on working with OUs within your organization.
39+
40+
### AD account for BDC domain service account
41+
42+
To be able to create all the required objects in Active Directory automatically, the BDC needs an AD account which have specific permissions to create users, groups, and machine accounts inside the provided organizational unit (OU). This article will explain how to configure the permission of this AD account. We use an AD Account call `bdcDSA` as an example in this article.
43+
44+
### Auto generated Active Directory objects
45+
BDC deployment automatically generates account and group names. Each of the accounts represents a service in BDC and will be managed by BDC throughout the lifetime where BDC cluster is in use. Those accounts own the Service Principal Names (SPNs) are required by each service. For a full list of AD auto-generated accounts, groups, and service that they managed, see [Auto generated Active Directory objects](active-directory-objects.md).
46+
2747

28-
To automatically create all the required objects in Active Directory, the BDC needs an AD account during deployment. This account needs to have permissions to create users, groups, and machine accounts inside the provided OU.
2948

3049
>[!IMPORTANT]
3150
>Depending on the password expiration policy set in the Domain Controller, passwords for these accounts can expire. The default expiration policy is 42 days. There is no mechanism to rotate credentials for all accounts in BDC, so the cluster will become inoperable once the expiration period is met. To workaround this issue, update the expiration policy for the BDC service accounts to “Password never expires” in the Domain Controller. This action can be done before or after the expiration time. In the latter case, Active Directory will reactivate the expired passwords.
@@ -34,16 +53,16 @@ To automatically create all the required objects in Active Directory, the BDC ne
3453
>
3554
>:::image type="content" source="media/deploy-active-directory/image25.png" alt-text="Set password expiration policy":::
3655
37-
For a list of AD accounts and groups, see [Auto generated Active Directory objects](active-directory-objects.md).
3856

3957
The steps below assume you already have an Active Directory domain controller. If you don't have a domain controller, the following [guide](https://social.technet.microsoft.com/wiki/contents/articles/37528.create-and-configure-active-directory-domain-controller-in-azure-windows-server.aspx) includes steps that can be helpful.
4058

59+
4160
## Create AD objects
4261

4362
Do the following things before you deploy a BDC with AD integration:
4463

45-
1. Create an organizational unit (OU) where all BDC AD objects will be stored. Alternatively you can choose an existing OU upon deployment.
46-
1. Create an AD account for BDC, or use an existing account, and provide this BDC AD account the right permissions.
64+
1. Create an organizational unit (OU) where all BDC-related AD objects will be stored. Alternatively you can choose an existing OU upon deployment.
65+
1. Create an AD account for BDC, or use an existing account, and provide this BDC AD account the right permissions inside the provided organizational unit (OU).
4766

4867
### Create a user in AD for BDC domain service account
4968

0 commit comments

Comments
 (0)