Create and manage Active Directory connections for Azure NetApp Files
Several features of Azure NetApp Files require that you have an Active Directory connection. For example, you need to have an Active Directory connection before you can create an SMB volume, a NFSv4.1 Kerberos volume, or a dual-protocol volume. This article shows you how to create and manage Active Directory connections for Azure NetApp Files.
Before you begin
- You must have already set up a capacity pool. See Create a capacity pool.
- A subnet must be delegated to Azure NetApp Files. See Delegate a subnet to Azure NetApp Files.
Requirements and considerations for Active Directory connections
You can configure only one Active Directory (AD) connection per subscription and per region.
Azure NetApp Files does not support multiple AD connections in a single region, even if the AD connections are in different NetApp accounts. However, you can have multiple AD connections in a single subscription if the AD connections are in different regions. If you need multiple AD connections in a single region, you can use separate subscriptions to do so.
The AD connection is visible only through the NetApp account it is created in. However, you can enable the Shared AD feature to allow NetApp accounts that are under the same subscription and same region to use an AD server created in one of the NetApp accounts. See Map multiple NetApp accounts in the same subscription and region to an AD connection. When you enable this feature, the AD connection becomes visible in all NetApp accounts that are under the same subscription and same region.
The admin account you use must have the capability to create machine accounts in the organizational unit (OU) path that you will specify.
If you change the password of the Active Directory user account that is used in Azure NetApp Files, be sure to update the password configured in the Active Directory Connections. Otherwise, you will not be able to create new volumes, and your access to existing volumes might also be affected depending on the setup.
Proper ports must be open on the applicable Windows Active Directory (AD) server.
The required ports are as follows:Service Port Protocol AD Web Services 9389 TCP DNS 53 TCP DNS 53 UDP ICMPv4 N/A Echo Reply Kerberos 464 TCP Kerberos 464 UDP Kerberos 88 TCP Kerberos 88 UDP LDAP 389 TCP LDAP 389 UDP LDAP 3268 TCP NetBIOS name 138 UDP SAM/LSA 445 TCP SAM/LSA 445 UDP w32time 123 UDP The site topology for the targeted Active Directory Domain Services must adhere to the guidelines, in particular the Azure VNet where Azure NetApp Files is deployed.
The address space for the virtual network where Azure NetApp Files is deployed must be added to a new or existing Active Directory site (where a domain controller reachable by Azure NetApp Files is).
The specified DNS servers must be reachable from the delegated subnet of Azure NetApp Files.
See Guidelines for Azure NetApp Files network planning for supported network topologies.
The Network Security Groups (NSGs) and firewalls must have appropriately configured rules to allow for Active Directory and DNS traffic requests.
The Azure NetApp Files delegated subnet must be able to reach all Active Directory Domain Services (ADDS) domain controllers in the domain, including all local and remote domain controllers. Otherwise, service interruption can occur.
If you have domain controllers that are unreachable by the Azure NetApp Files delegated subnet, you can specify an Active Directory site during creation of the Active Directory connection. Azure NetApp Files needs to communicate only with domain controllers in the site where the Azure NetApp Files delegated subnet address space is.
See Designing the site topology about AD sites and services.
You can enable AES encryption for AD Authentication by checking the AES Encryption box in the Join Active Directory window. Azure NetApp Files supports DES, Kerberos AES 128, and Kerberos AES 256 encryption types (from the least secure to the most secure). If you enable AES encryption, the user credentials used to join Active Directory must have the highest corresponding account option enabled that matches the capabilities enabled for your Active Directory.
For example, if your Active Directory has only the AES-128 capability, you must enable the AES-128 account option for the user credentials. If your Active Directory has the AES-256 capability, you must enable the AES-256 account option (which also supports AES-128). If your Active Directory does not have any Kerberos encryption capability, Azure NetApp Files uses DES by default.
You can enable the account options in the properties of the Active Directory Users and Computers Microsoft Management Console (MMC):

Azure NetApp Files supports LDAP signing, which enables secure transmission of LDAP traffic between the Azure NetApp Files service and the targeted Active Directory domain controllers. If you are following the guidance of Microsoft Advisory ADV190023 for LDAP signing, then you should enable the LDAP signing feature in Azure NetApp Files by checking the LDAP Signing box in the Join Active Directory window.
LDAP channel binding configuration alone has no effect on the Azure NetApp Files service. However, if you use both LDAP channel binding and secure LDAP (for example, LDAPS or
start_tls), then the SMB volume creation will fail.For non-AD integrated DNS, you should add a DNS A/PTR record to enable Azure NetApp Files to function by using a “friendly name".
The following table describes the Time to Live (TTL) settings for the LDAP cache. You need to wait until the cache is refreshed before trying to access a file or directory through a client. Otherwise, an access or permission denied message appears on the client.
Error condition Resolution Cache Default Timeout Group membership list 24-hour TTL Unix groups 24-hour TTL, 1-minute negative TTL Unix users 24-hour TTL, 1-minute negative TTL Caches have a specific timeout period called Time to Live. After the timeout period, entries age out so that stale entries do not linger. The negative TTL value is where a lookup that has failed resides to help avoid performance issues due to LDAP queries for objects that might not exist.”
Decide which Domain Services to use
Azure NetApp Files supports both Active Directory Domain Services (ADDS) and Azure Active Directory Domain Services (AADDS) for AD connections. Before you create an AD connection, you need to decide whether to use ADDS or AADDS.
For more information, see Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services.
Active Directory Domain Services
You can use your preferred Active Directory Sites and Services scope for Azure NetApp Files. This option enables reads and writes to Active Directory Domain Services (ADDS) domain controllers that are accessible by Azure NetApp Files. It also prevents the service from communicating with domain controllers that are not in the specified Active Directory Sites and Services site.
To find your site name when you use ADDS, you can contact the administrative group in your organization that is responsible for Active Directory Domain Services. The example below shows the Active Directory Sites and Services plugin where the site name is displayed:

When you configure an AD connection for Azure NetApp Files, you specify the site name in scope for the AD Site Name field.
Azure Active Directory Domain Services
For Azure Active Directory Domain Services (AADDS) configuration and guidance, see Azure AD Domain Services documentation.
Additional AADDS considerations apply for Azure NetApp Files:
- Ensure the VNet or subnet where AADDS is deployed is in the same Azure region as the Azure NetApp Files deployment.
- If you use another VNet in the region where Azure NetApp Files is deployed, you should create a peering between the two VNets.
- Azure NetApp Files supports
userandresource foresttypes. - For synchronization type, you can select
AllorScoped.
If you selectScoped, ensure the correct Azure AD group is selected for accessing SMB shares. If you are uncertain, you can use theAllsynchronization type. - If you use AADDS with a dual-protocol volume, you must be in a custom OU in order to apply POSIX attributes. See Manage LDAP POSIX Attributes for details.
When you create an Active Directory connection, note the following specifics for AADDS:
You can find information for Primary DNS, Secondary DNS, and AD DNS Domain Name in the AADDS menu.
For DNS servers, two IP addresses will be used for configuring the Active Directory connection.The organizational unit path is
OU=AADDC Computers.
This setting is configured in the Active Directory Connections under NetApp Account:
Username credentials can be any user that is a member of the Azure AD group Azure AD DC Administrators.
Create an Active Directory connection
From your NetApp account, click Active Directory connections, then click Join.
Azure NetApp Files supports only one Active Directory connection within the same region and the same subscription. If Active Directory is already configured by another NetApp account in the same subscription and region, you cannot configure and join a different Active Directory from your NetApp account. However, you can enable the Shared AD feature to allow an Active Directory configuration to be shared by multiple NetApp accounts within the same subscription and the same region. See Map multiple NetApp accounts in the same subscription and region to an AD connection.

In the Join Active Directory window, provide the following information, based on the Domain Services you want to use:
For information specific to the Domain Services you use, see Decide which Domain Services to use.
Primary DNS
This is the DNS that is required for the Active Directory domain join and SMB authentication operations.Secondary DNS
This is the secondary DNS server for ensuring redundant name services.AD DNS Domain Name
This is the domain name of your Active Directory Domain Services that you want to join.AD Site Name
This is the site name that the domain controller discovery will be limited to. This should match the site name in Active Directory Sites and Services.SMB server (computer account) prefix
This is the naming prefix for the machine account in Active Directory that Azure NetApp Files will use for creation of new accounts.For example, if the naming standard that your organization uses for file servers is NAS-01, NAS-02..., NAS-045, then you would enter "NAS" for the prefix.
The service will create additional machine accounts in Active Directory as needed.
Important
Renaming the SMB server prefix after you create the Active Directory connection is disruptive. You will need to re-mount existing SMB shares after renaming the SMB server prefix.
Organizational unit path
This is the LDAP path for the organizational unit (OU) where SMB server machine accounts will be created. That is, OU=second level, OU=first level.If you are using Azure NetApp Files with Azure Active Directory Domain Services, the organizational unit path is
OU=AADDC Computerswhen you configure Active Directory for your NetApp account.
AES Encryption
Select this checkbox if you want to enable AES encryption for AD authentication or if you require encryption for SMB volumes.See Requirements for Active Directory connections for requirements.

The AES Encryption feature is currently in preview. If this is your first time using this feature, register the feature before using it:
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFAesEncryptionCheck the status of the feature registration:
Note
The RegistrationState may be in the
Registeringstate for up to 60 minutes before changing toRegistered. Wait until the status isRegisteredbefore continuing.Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFAesEncryptionYou can also use Azure CLI commands
az feature registerandaz feature showto register the feature and display the registration status.LDAP Signing
Select this checkbox to enable LDAP signing. This functionality enables secure LDAP lookups between the Azure NetApp Files service and the user-specified Active Directory Domain Services domain controllers. For more information, see ADV190023 | Microsoft Guidance for Enabling LDAP Channel Binding and LDAP Signing.
The LDAP Signing feature is currently in preview. If this is your first time using this feature, register the feature before using it:
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFLdapSigningCheck the status of the feature registration:
Note
The RegistrationState may be in the
Registeringstate for up to 60 minutes before changing toRegistered. Wait until the status isRegisteredbefore continuing.Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFLdapSigningYou can also use Azure CLI commands
az feature registerandaz feature showto register the feature and display the registration status.Security privilege users
You can grant security privilege (SeSecurityPrivilege) to users that require elevated privilege to access the Azure NetApp Files volumes. The specified user accounts will be allowed to perform certain actions on Azure NetApp Files SMB shares that require security privilege not assigned by default to domain users.For example, user accounts used for installing SQL Server in certain scenarios must be granted elevated security privilege. If you are using a non-administrator (domain) account to install SQL Server and the account does not have the security privilege assigned, you should add security privilege to the account.
Important
Using the Security privilege users feature requires that you submit a waitlist request through the Azure NetApp Files SMB Continuous Availability Shares Public Preview waitlist submission page. Wait for an official confirmation email from the Azure NetApp Files team before using this feature.
Using this feature is optional and supported only for SQL Server. The domain account used for installing SQL Server must already exist before you add it to the Security privilege users field. When you add the SQL Server installer's account to Security privilege users, the Azure NetApp Files service might validate the account by contacting the domain controller. The command might fail if it cannot contact the domain controller.
For more information about
SeSecurityPrivilegeand SQL Server, see SQL Server installation fails if the Setup account doesn't have certain user rights.
Backup policy users
You can include additional accounts that require elevated privileges to the computer account created for use with Azure NetApp Files. The specified accounts will be allowed to change the NTFS permissions at the file or folder level. For example, you can specify a non-privileged service account used for migrating data to an SMB file share in Azure NetApp Files.
The Backup policy users feature is currently in preview. If this is your first time using this feature, register the feature before using it:
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFBackupOperatorCheck the status of the feature registration:
Note
The RegistrationState may be in the
Registeringstate for up to 60 minutes before changing toRegistered. Wait until the status isRegisteredbefore continuing.Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFBackupOperatorYou can also use Azure CLI commands
az feature registerandaz feature showto register the feature and display the registration status.Administrators
You can specify users or groups that will be given administrator privileges on the volume.

The Administrators feature is currently in preview. If this is your first time using this feature, register the feature before using it:
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFAdAdministratorsCheck the status of the feature registration:
Note
The RegistrationState may be in the
Registeringstate for up to 60 minutes before changing toRegistered. Wait until the status isRegisteredbefore continuing.Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFAdAdministratorsYou can also use Azure CLI commands
az feature registerandaz feature showto register the feature and display the registration status.Credentials, including your username and password

Click Join.
The Active Directory connection you created appears.

Map multiple NetApp accounts in the same subscription and region to an AD connection
The Shared AD feature enables all NetApp accounts to share an Active Directory (AD) connection created by one of the NetApp accounts that belong to the same subscription and the same region. For example, using this feature, all NetApp accounts in the same subscription and region can use the common AD configuration to create an SMB volume, a NFSv4.1 Kerberos volume, or a dual-protocol volume. When you use this feature, the AD connection will be visible in all NetApp accounts that are under the same subscription and same region.
This feature is currently in preview. You need to register the feature before using it for the first time. After registration, the feature is enabled and works in the background. No UI control is required.
Register the feature:
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFSharedADCheck the status of the feature registration:
Note
The RegistrationState may be in the
Registeringstate for up to 60 minutes before changing toRegistered. Wait until the status is Registered before continuing.Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFSharedAD
You can also use Azure CLI commands az feature register and az feature show to register the feature and display the registration status.