This page describes the various options for connecting to a Managed Service for Microsoft Active Directory domain.
Connecting to a domain-joined Windows VM with RDP
You can connect to your domain with Remote Desktop Protocol (RDP). For security reasons, you cannot use RDP to connect directly to a domain controller. Instead, you can use RDP to connect to a Compute Engine instance, and then use the standard AD Manageability tools to work remotely with your AD domain.
Troubleshooting RDP connections
If you are having difficulty connecting to your Windows instance with RDP, see Troubleshooting RDP for tips and approaches to troubleshoot and resolve common RDP issues.
Resolving Kerberos issues
If you try to use Kerberos for your RDP connection, but it falls back to NTLM, your configuration may not meet the necessary requirements.
To RDP to a Managed Microsoft AD-joined VM using Kerberos, the RDP client needs a ticket issued for the target server. To get this ticket, the client must be able to:
- Determine the service principal name (SPN) of the server. For RDP, the SPN is derived from the server's DNS name.
- Contact the domain controller of the domain the client's workstation is joined to and request a ticket for that SPN.
To ensure the client can determine the SPN, add an IP-based SPN to the server's computer object in AD.
To ensure the client can find the right domain controller to contact, you must do one of the following:
- Create a trust to your on-premises AD domain. Learn more about creating and managing trusts.
- Connect from a domain-joined workstation via Cloud VPN or Cloud Interconnect.
Connecting to a domain-joined Linux VM
This section lists some of the open source options for managing Active Directory interoperation with Linux. Learn how to join a Linux VM to a Managed Microsoft AD domain.
System Security Services Daemon (SSSD) joined directly to Active Directory
You can use System Security Services Daemon (SSSD) to manage Active Directory interoperation. Note that SSSD does not support cross-forest trusts. Learn about SSSD.
You can use Winbind to manage Active Directory interoperation. It uses Microsoft Remote Procedure Calls (MSRPCs) to interact with Active Directory, which is similar to a Windows client. Winbind supports cross-forest trusts. Learn about Winbind.
OpenLDAP is a suite of LDAP applications. Some third-party providers have developed proprietary Active Directory interoperation tools based on OpenLDAP. Learn about OpenLDAP.
Connecting to a domain via trust
If you create a trust between your on-premises domain and your Managed Microsoft AD domain, you can access your AD resources in Google Cloud as if they are in your on-premises domain. Learn how to create and manage trusts in Managed Microsoft AD.
Connecting to a domain with Hybrid Connectivity products
You can connect to your Managed Microsoft AD domain with Google Cloud Hybrid Connectivity products, like Cloud VPN or Cloud Interconnect. You can configure the connection from your on-premises or other network to an authorized network of Managed Microsoft AD domain. Learn about hybrid connectivity.
Before you begin
Connecting using domain name
We recommend connecting to a domain controller using its domain name rather than its address because Managed Microsoft AD does not provide static IP addresses. Using the name, the Active Directory DC Locator process can find the domain controller for you, even if it's IP address has changed.
Using IP address for DNS resolution
If you must use the IP address to connect, you can create an inbound DNS policy on your VPC network so it can use the same name resolution services that Managed Microsoft AD uses. Managed Microsoft AD uses Cloud DNS to provide name resolution to Managed Microsoft AD domain using Cloud DNS Peering.
To use the inbound DNS policy, you must configure your on-premises systems or name servers to forward DNS queries to the proxy IP address located in the same region as the Cloud VPN tunnel or VLAN attachment that connects your on-premises network to your VPC network. Learn about creating an inbound server policy.
Managed Microsoft AD does not support nested peering, so only networks that are directly authorized for Active Directory can access the domain. Peers of the authorized network cannot reach the Managed Microsoft AD domain.