Best practices for joining FSx for Windows File Server file systems to a self-managed Microsoft Active Directory domain
Here are some suggestions and guidelines you should consider when joining Amazon FSx for Windows File Server file systems to your self-managed Microsoft Active Directory. Note that these are recommended as best practices, but not required.
Delegating privileges to your Amazon FSx service account
Make sure to configure the service account that you provide to Amazon FSx with the minimum privileges required. In addition, segregate the Organizational Unit (OU) from other domain controller concerns.
To join Amazon FSx file systems to your domain, make sure that the service account has delegated privileges. Members of the Domain Admins group have sufficient privileges to perform this task. However, as a best practice, use a service account that only has the minimum privileges necessary to do this. The following procedure demonstrates how to delegate just the privileges necessary to join Amazon FSx file systems to your domain.
Perform this procedure on a machine that is joined to your directory and has the Active Directory User and Computers MMC snap-in installed.
To create a service account for your Active Directory domain
Make sure that you are logged in as a domain administrator for your Active Directory domain.
-
Open the Active Directory User and Computers MMC snap-in.
-
Select View from the menu bar and ensure that Advanced Features is enabled (a check mark will appear next to it if the feature is enabled).
-
In the task pane, expand the domain node.
-
Locate and open (right-click) the context menu for the OU that you want to modify, and then choose Properties.
-
In the OU Properties pane, select the Security tab.
-
In the Security tab, select Advanced. Then select Add.
-
On the Permission Entry page, choose Select a principal and enter the name of your Amazon FSx service account or group. For Applies to:, choose This object and all descendant objects. Ensure that the following are selected:
-
Reset Password
-
Read Account Restrictions
-
Write Account Restrictions
-
Validated write to DNS host name
-
Validated write to service principal name
-
Modify permissions
-
-
Select OK.
-
Select Add. On the Permissions Entry page, enter the name of your FSx service account or group for Select a Principal.
-
Change the scope to This object and all descendant objects. Ensure that the following are selected:
Create Computer Objects
Delete Computer Objects
-
Select Apply and then select OK.
Important
Do not move computer objects that Amazon FSx creates in the OU after your file system is created. Doing so will cause your file system to become misconfigured.
Keeping your Active Directory configuration updated with Amazon FSx
To help ensure continued, uninterrupted availability of your Amazon FSx file system, update the file system's self-managed Active Directory (AD) configuration any time that you make changes to your self-managed AD setup.
For example, suppose that your AD uses a time-based password reset policy. In this case, as soon as the password is reset, make sure to update the service account password with Amazon FSx. To do this, use the Amazon FSx console, Amazon FSx API, or Amazon CLI. Similarly, if the DNS server IP addresses change for your Active Directory domain, as soon as the change occurs update the DNS server IP addresses with Amazon FSx. Again, do this using the Amazon FSx console, API, or CLI.
When you update the self-managed AD configuration for your Amazon FSx file system, your file system's state switches from Available to Updating while the update is applied. Verify that the state switches back to Available after the update has been applied – note that the update can take up to several minutes to complete. For more information, see Updating the self-managed Active Directory configuration.
If there's an issue with the updated self-managed AD configuration, the file system state switches to Misconfigured. This state shows an error message and recommended corrective action beside the file system description in the console, API, and CLI. After taking the recommended corrective action, verify that your file system's state eventually changes to Available.
To learn more about troubleshooting possible self-managed AD misconfigurations, see File system is in a misconfigured state.
Using security groups to limit traffic within your VPC
To limit network traffic in your virtual private cloud (VPC), you can implement the principle of least privilege in your VPC. In other words, you can limit privileges to the minimum ones necessary. To do this, use security group rules. To learn more, see Amazon VPC Security Groups.
Creating outbound security group rules for your file system's network interface
For greater security, consider configuring a security group with outbound traffic rules. These rules should allow outbound traffic only to your self-managed Microsoft AD domains controllers or within the subnet or security group. Apply this security group to the VPC associated with your Amazon FSx file system's elastic network interface. To learn more, see File System Access Control with Amazon VPC.