ActiveDirectoryArgs

data class ActiveDirectoryArgs(val administrators: Output<List<String>>? = null, val aesEncryption: Output<Boolean>? = null, val backupOperators: Output<List<String>>? = null, val description: Output<String>? = null, val dns: Output<String>? = null, val domain: Output<String>? = null, val encryptDcConnections: Output<Boolean>? = null, val kdcHostname: Output<String>? = null, val kdcIp: Output<String>? = null, val labels: Output<Map<String, String>>? = null, val ldapSigning: Output<Boolean>? = null, val location: Output<String>? = null, val name: Output<String>? = null, val netBiosPrefix: Output<String>? = null, val nfsUsersWithLdap: Output<Boolean>? = null, val organizationalUnit: Output<String>? = null, val password: Output<String>? = null, val project: Output<String>? = null, val securityOperators: Output<List<String>>? = null, val site: Output<String>? = null, val username: Output<String>? = null) : ConvertibleToJava<ActiveDirectoryArgs>

ActiveDirectory is the public representation of the active directory config. To get more information about activeDirectory, see:

Example Usage

Netapp Active Directory Full

import * as pulumi from "@pulumi/pulumi";
import * as gcp from "@pulumi/gcp";
const testActiveDirectoryFull = new gcp.netapp.ActiveDirectory("test_active_directory_full", {
name: "test-active-directory-full",
location: "us-central1",
domain: "ad.internal",
dns: "172.30.64.3",
netBiosPrefix: "smbserver",
username: "user",
password: "pass",
aesEncryption: false,
backupOperators: [
"test1",
"test2",
],
administrators: [
"test1",
"test2",
],
description: "ActiveDirectory is the public representation of the active directory config.",
encryptDcConnections: false,
kdcHostname: "hostname",
kdcIp: "10.10.0.11",
labels: {
foo: "bar",
},
ldapSigning: false,
nfsUsersWithLdap: false,
organizationalUnit: "CN=Computers",
securityOperators: [
"test1",
"test2",
],
site: "test-site",
});
import pulumi
import pulumi_gcp as gcp
test_active_directory_full = gcp.netapp.ActiveDirectory("test_active_directory_full",
name="test-active-directory-full",
location="us-central1",
domain="ad.internal",
dns="172.30.64.3",
net_bios_prefix="smbserver",
username="user",
password="pass",
aes_encryption=False,
backup_operators=[
"test1",
"test2",
],
administrators=[
"test1",
"test2",
],
description="ActiveDirectory is the public representation of the active directory config.",
encrypt_dc_connections=False,
kdc_hostname="hostname",
kdc_ip="10.10.0.11",
labels={
"foo": "bar",
},
ldap_signing=False,
nfs_users_with_ldap=False,
organizational_unit="CN=Computers",
security_operators=[
"test1",
"test2",
],
site="test-site")
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Gcp = Pulumi.Gcp;
return await Deployment.RunAsync(() =>
{
var testActiveDirectoryFull = new Gcp.Netapp.ActiveDirectory("test_active_directory_full", new()
{
Name = "test-active-directory-full",
Location = "us-central1",
Domain = "ad.internal",
Dns = "172.30.64.3",
NetBiosPrefix = "smbserver",
Username = "user",
Password = "pass",
AesEncryption = false,
BackupOperators = new[]
{
"test1",
"test2",
},
Administrators = new[]
{
"test1",
"test2",
},
Description = "ActiveDirectory is the public representation of the active directory config.",
EncryptDcConnections = false,
KdcHostname = "hostname",
KdcIp = "10.10.0.11",
Labels =
{
{ "foo", "bar" },
},
LdapSigning = false,
NfsUsersWithLdap = false,
OrganizationalUnit = "CN=Computers",
SecurityOperators = new[]
{
"test1",
"test2",
},
Site = "test-site",
});
});
package main
import (
"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/netapp"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := netapp.NewActiveDirectory(ctx, "test_active_directory_full", &netapp.ActiveDirectoryArgs{
Name: pulumi.String("test-active-directory-full"),
Location: pulumi.String("us-central1"),
Domain: pulumi.String("ad.internal"),
Dns: pulumi.String("172.30.64.3"),
NetBiosPrefix: pulumi.String("smbserver"),
Username: pulumi.String("user"),
Password: pulumi.String("pass"),
AesEncryption: pulumi.Bool(false),
BackupOperators: pulumi.StringArray{
pulumi.String("test1"),
pulumi.String("test2"),
},
Administrators: pulumi.StringArray{
pulumi.String("test1"),
pulumi.String("test2"),
},
Description: pulumi.String("ActiveDirectory is the public representation of the active directory config."),
EncryptDcConnections: pulumi.Bool(false),
KdcHostname: pulumi.String("hostname"),
KdcIp: pulumi.String("10.10.0.11"),
Labels: pulumi.StringMap{
"foo": pulumi.String("bar"),
},
LdapSigning: pulumi.Bool(false),
NfsUsersWithLdap: pulumi.Bool(false),
OrganizationalUnit: pulumi.String("CN=Computers"),
SecurityOperators: pulumi.StringArray{
pulumi.String("test1"),
pulumi.String("test2"),
},
Site: pulumi.String("test-site"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.netapp.ActiveDirectory;
import com.pulumi.gcp.netapp.ActiveDirectoryArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testActiveDirectoryFull = new ActiveDirectory("testActiveDirectoryFull", ActiveDirectoryArgs.builder()
.name("test-active-directory-full")
.location("us-central1")
.domain("ad.internal")
.dns("172.30.64.3")
.netBiosPrefix("smbserver")
.username("user")
.password("pass")
.aesEncryption(false)
.backupOperators(
"test1",
"test2")
.administrators(
"test1",
"test2")
.description("ActiveDirectory is the public representation of the active directory config.")
.encryptDcConnections(false)
.kdcHostname("hostname")
.kdcIp("10.10.0.11")
.labels(Map.of("foo", "bar"))
.ldapSigning(false)
.nfsUsersWithLdap(false)
.organizationalUnit("CN=Computers")
.securityOperators(
"test1",
"test2")
.site("test-site")
.build());
}
}
resources:
testActiveDirectoryFull:
type: gcp:netapp:ActiveDirectory
name: test_active_directory_full
properties:
name: test-active-directory-full
location: us-central1
domain: ad.internal
dns: 172.30.64.3
netBiosPrefix: smbserver
username: user
password: pass
aesEncryption: false
backupOperators:
- test1
- test2
administrators:
- test1
- test2
description: ActiveDirectory is the public representation of the active directory config.
encryptDcConnections: false
kdcHostname: hostname
kdcIp: 10.10.0.11
labels:
foo: bar
ldapSigning: false
nfsUsersWithLdap: false
organizationalUnit: CN=Computers
securityOperators:
- test1
- test2
site: test-site

Import

activeDirectory can be imported using any of these accepted formats:

  • projects/{{project}}/locations/{{location}}/activeDirectories/{{name}}

  • {{project}}/{{location}}/{{name}}

  • {{location}}/{{name}} When using the pulumi import command, activeDirectory can be imported using one of the formats above. For example:

$ pulumi import gcp:netapp/activeDirectory:ActiveDirectory default projects/{{project}}/locations/{{location}}/activeDirectories/{{name}}
$ pulumi import gcp:netapp/activeDirectory:ActiveDirectory default {{project}}/{{location}}/{{name}}
$ pulumi import gcp:netapp/activeDirectory:ActiveDirectory default {{location}}/{{name}}

Constructors

Link copied to clipboard
constructor(administrators: Output<List<String>>? = null, aesEncryption: Output<Boolean>? = null, backupOperators: Output<List<String>>? = null, description: Output<String>? = null, dns: Output<String>? = null, domain: Output<String>? = null, encryptDcConnections: Output<Boolean>? = null, kdcHostname: Output<String>? = null, kdcIp: Output<String>? = null, labels: Output<Map<String, String>>? = null, ldapSigning: Output<Boolean>? = null, location: Output<String>? = null, name: Output<String>? = null, netBiosPrefix: Output<String>? = null, nfsUsersWithLdap: Output<Boolean>? = null, organizationalUnit: Output<String>? = null, password: Output<String>? = null, project: Output<String>? = null, securityOperators: Output<List<String>>? = null, site: Output<String>? = null, username: Output<String>? = null)

Properties

Link copied to clipboard
val administrators: Output<List<String>>? = null

Domain user accounts to be added to the local Administrators group of the SMB service. Comma-separated list of domain users or groups. The Domain Admin group is automatically added when the service joins your domain as a hidden group.

Link copied to clipboard
val aesEncryption: Output<Boolean>? = null

Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory.

Link copied to clipboard
val backupOperators: Output<List<String>>? = null

Domain user/group accounts to be added to the Backup Operators group of the SMB service. The Backup Operators group allows members to backup and restore files regardless of whether they have read or write access to the files. Comma-separated list.

Link copied to clipboard
val description: Output<String>? = null

An optional description of this resource.

Link copied to clipboard
val dns: Output<String>? = null

Comma separated list of DNS server IP addresses for the Active Directory domain.

Link copied to clipboard
val domain: Output<String>? = null

Fully qualified domain name for the Active Directory domain.

Link copied to clipboard
val encryptDcConnections: Output<Boolean>? = null

If enabled, traffic between the SMB server to Domain Controller (DC) will be encrypted.

Link copied to clipboard
val kdcHostname: Output<String>? = null

Hostname of the Active Directory server used as Kerberos Key Distribution Center. Only requried for volumes using kerberized NFSv4.1

Link copied to clipboard
val kdcIp: Output<String>? = null

IP address of the Active Directory server used as Kerberos Key Distribution Center.

Link copied to clipboard
val labels: Output<Map<String, String>>? = null

Labels as key value pairs. Example: { "owner": "Bob", "department": "finance", "purpose": "testing" }. Note: This field is non-authoritative, and will only manage the labels present in your configuration. Please refer to the field effective_labels for all of the labels present on the resource.

Link copied to clipboard
val ldapSigning: Output<Boolean>? = null

Specifies whether or not the LDAP traffic needs to be signed.

Link copied to clipboard
val location: Output<String>? = null

Name of the region for the policy to apply to.

Link copied to clipboard
val name: Output<String>? = null

The resource name of the Active Directory pool. Needs to be unique per location.

Link copied to clipboard
val netBiosPrefix: Output<String>? = null

NetBIOS name prefix of the server to be created. A five-character random ID is generated automatically, for example, -6f9a, and appended to the prefix. The full UNC share path will have the following format: \\NetBIOS_PREFIX-ABCD.DOMAIN_NAME\SHARE_NAME

Link copied to clipboard
val nfsUsersWithLdap: Output<Boolean>? = null

Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes. This option can be used to temporarily switch such volumes to AUTH_SYS authentication (user ID + 1-16 groups).

Link copied to clipboard
val organizationalUnit: Output<String>? = null

Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes. Defaults to CN=Computers if left empty.

Link copied to clipboard
val password: Output<String>? = null
Link copied to clipboard
val project: Output<String>? = null

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

Link copied to clipboard
val securityOperators: Output<List<String>>? = null

Domain accounts that require elevated privileges such as SeSecurityPrivilege to manage security logs. Comma-separated list.

Link copied to clipboard
val site: Output<String>? = null

Specifies an Active Directory site to manage domain controller selection. Use when Active Directory domain controllers in multiple regions are configured. Defaults to Default-First-Site-Name if left empty.

Link copied to clipboard
val username: Output<String>? = null

Username for the Active Directory account with permissions to create the compute account within the specified organizational unit.

Functions

Link copied to clipboard
open override fun toJava(): ActiveDirectoryArgs