Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit c2548e5

Browse files
20211005 1013
1 parent b66e53a commit c2548e5

2 files changed

Lines changed: 6 additions & 3 deletions

File tree

docs/azdata/reference/reference-azdata-bdc-rotate.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,9 @@ ms.technology: big-data-cluster
1515

1616
Applies to [!INCLUDE [azure-data-cli-azdata](../../includes/azure-data-cli-azdata.md)]
1717

18-
This command rotates the passwords of autogenerated AD accounts in a big data cluster. For more information, see [AD password rotation overview](../../big-data-cluster/active-directory-password-rotation.md). Autorotation of passwords for autogenerated AD objects was introduced with SQL Server Big Data Clusters CU13.
18+
This command rotates the passwords of autogenerated AD accounts in a big data cluster. For more information, see [AD password rotation overview](../../big-data-cluster/active-directory-password-rotation.md). You can add this command to your automation scripts or pipelines as part of the security hardening process.
19+
20+
This feature for rotation of passwords for autogenerated AD objects was introduced with SQL Server Big Data Clusters CU13.
1921

2022
> [!IMPORTANT]
2123
> The `azdata bdc rotate` command rotates passwords for autogenerated AD objects only. The `azdata bdc rotate` command does not rotate the password for the AD for big data cluster domain service account (DSA) created manually while performing a big data cluster AD-integrated deployment. For more information, see [big data cluster AD integrated deployment](../../big-data-cluster/active-directory-prerequisites.md).

docs/big-data-cluster/active-directory-prerequisites.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ To be able to create all the required objects in Active Directory automatically,
4444
Big Data Clusters deployment automatically generates account and group names. Each of the accounts represents a service and will be managed by the big data cluster throughout the lifetime where the big data cluster is in use. Those accounts own the Service Principal Names (SPNs) are required by each service. For a full list of AD autogenerated accounts, groups, and service that they managed, see [Autogenerated Active Directory objects](active-directory-objects.md).
4545

4646
>[!IMPORTANT]
47-
> Depending on the password expiration policy set in the Domain Controller, passwords for these accounts can expire. There is no mechanism to automatically rotate credentials for all accounts in the big data cluster, so the cluster will become inoperable once the expiration period is met. You can use `azdata bdc rotate` to rotate the passwords of autogenerated AD accounts for the big data cluster. For more information, see [azdata-bdc-rotate](../azdata/reference/reference-azdata-bdc-rotate.md). You may want to add this to their automation scripts or pipelines as part of security hardening process.
47+
> Depending on the password expiration policy set in the Domain Controller, passwords for these accounts can expire. There is no mechanism to automatically rotate credentials for all accounts in the big data cluster, so the cluster will become inoperable once the expiration period is met. You can use `azdata bdc rotate` to rotate the passwords of autogenerated AD accounts for the big data cluster. For more information, see [azdata-bdc-rotate](../azdata/reference/reference-azdata-bdc-rotate.md). You can add this command to your automation scripts or pipelines as part of the security hardening process.
4848
4949
The steps below assume you already have an Active Directory domain controller. If you don't have a domain controller, the following [guide](https://social.technet.microsoft.com/wiki/contents/articles/37528.create-and-configure-active-directory-domain-controller-in-azure-windows-server.aspx) includes steps that can be helpful.
5050

@@ -83,7 +83,8 @@ The examples in this article use `bdc` for the OU name.
8383

8484
Whether you have created a new AD user or using an existing AD user, there are certain permissions the user needs to have. This account is the user account that the big data cluster controller will use when joining the cluster to AD.
8585

86-
The DSA needs to be able to create users, groups, and computer accounts in the OU. In the following steps, we have named the big data cluster domain service account `bdcDSA`. You can choose any name for this account depending on your project requirements for big data cluster deployment, but we do not recommend altering the account name once the big data cluster is deployed.
86+
> [!IMPORTANT]
87+
> The DSA needs to be able to create users, groups, and computer accounts in the OU. In the following steps, we have named the big data cluster domain service account `bdcDSA`. You can choose any name for this account depending on your project requirements for big data cluster deployment, but we do not recommend altering the account name once the big data cluster is deployed.
8788
8889
1. On the domain controller, open **Active Directory Users and Computers**
8990

0 commit comments

Comments
 (0)