Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 3851a04

Browse files
committedDec 22, 2020
new screenshots for directory services
1 parent d5e2fd5 commit 3851a04

7 files changed

+12
-6
lines changed
 

‎articles/hpc-cache/directory-services.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: How to configure directory services for client access to storage ta
44
author: ekpgh
55
ms.service: hpc-cache
66
ms.topic: how-to
7-
ms.date: 12/21/2020
7+
ms.date: 12/22/2020
88
ms.author: v-erkel
99
---
1010

@@ -21,9 +21,11 @@ After you click the button to enable extended groups, you must choose the source
2121
* [LDAP](#configure-ldap) - Get credentials from a Lightweight Directory Access Protocol (LDAP)-compatible source.
2222

2323
> [!NOTE]
24-
> Make sure that your cache can access its group information source from inside its secure subnetwork.<!-- Provide a < what? > -->
24+
> Make sure that your cache can access its group information source from inside its secure subnetwork.<!-- + details/examples -->
2525
26-
![screenshot of directory services page settings page in portal, with the Yes option selected for extended groups, and Active directory selected from the drop-down control labeled Download source](media/directory-services.png)
26+
The **Username downloaded** field shows the status of the most recent group information download.
27+
28+
![screenshot of directory services page settings page in portal, with the Yes option selected for extended groups, and the drop-down menu labeled Download source open](media/directory-services-select-group-source.png)
2729

2830
## Configure Active Directory
2931

@@ -39,28 +41,32 @@ Under **Active directory details**, supply these values:
3941

4042
* **Cache server name (computer account)** - Set the name that will be assigned to this HPC cache when it joins the AD domain. Specify a name that is easy to recognize as this cache. The name can be up to 15 characters long and can include capital or lowercase letters, numbers, hyphens (-), and underscores (_).
4143

42-
In the **Credentials** section, provide an AD administrator username and password that the Azure HPC Cache can use to access the AD server. This information is encrypted when stored, and can't be queried.
44+
* In the **Credentials** section, provide an AD administrator username and password that the Azure HPC Cache can use to access the AD server. This information is encrypted when stored, and can't be queried.
4345

4446
Save the settings by clicking the button at the top of the page.
4547

48+
![screenshot of Download details section with Active Directory values filled in](media/group-download-details-ad.png)
49+
4650
## Configure file download
4751

4852
These values are required if you want to download files with your user and group information. The files must be in the standard Linux/UNIX `/etc/group` and `/etc/passwrd` format.
4953

5054
* **User file URI** - Enter the complete URI for the `/etc/passwrd` file.
5155
* **Group file URI** - Enter the complete URI for the `/etc/group` file.
5256

57+
![screenshot of Download details section for a flat file download](media/group-download-details-file.png)
58+
5359
## Configure LDAP
5460

5561
Fill in these values if you want to use a non-AD LDAP source to get user and group credentials. Check with your LDAP administrator if you need help with these values.
5662

5763
* **LDAP server** - Enter the fully qualified domain name or the IP address of the LDAP server to use. <!-- only one, not up to 3 -->
5864

59-
* **LDAP base DN** - Specify the base distinguished name for the LDAP domain, in DN format. <!-- xxx we specify base DN here but bind DN only if there's encryption? xxx LDAP queries are performed on the base DN, the DN of the entry, and all entries below it in the directory tree. -->Ask your LDAP administrator if you don’t know your base DN.
65+
* **LDAP base DN** - Specify the base distinguished name for the LDAP domain, in DN format. Ask your LDAP administrator if you don’t know your base DN.
6066

6167
The server and base DN are the only required settings to make LDAP work, but the additional options make your connection more secure.
6268

63-
![screenshot of the LDAP configuration area of the directory services page settings page](media/ldap-settings.png)
69+
![screenshot of the LDAP configuration area of the directory services page settings page](media/group-download-details-ldap.png)
6470

6571
In the **Secure access** section, you can enable encryption and certificate validation for the LDAP connection. After you click **Yes** to enable encryption, you have these options:
6672

Loading
-175 KB
Binary file not shown.
Loading
Loading
Loading
-234 KB
Binary file not shown.

0 commit comments

Comments
 (0)
Please sign in to comment.