Mantenha tudo organizado com as coleções
Salve e categorize o conteúdo com base nas suas preferências.
Associar uma VM do Linux a um domínio
Esta página mostra como associar uma VM do Linux, executando distribuições Linux compatíveis, a um domínio no Serviço gerenciado para Microsoft Active Directory usando o SSSD (System Security Services Daemon).
Crie a VM no projeto que hospeda seu domínio do Managed Microsoft AD.
Se o domínio do Managed Microsoft AD tiver uma VPC compartilhada
como uma rede autorizada, você também poderá criar a VM em qualquer um dos
projetos de serviço da VPC compartilhada.
Crie a VM em uma rede VPC que tenha peering com o domínio do Managed Microsoft AD.
Para associar uma VM do Linux a um domínio, você precisa das seguintes informações:
O nome de domínio do seu domínio gerenciado do Microsoft AD. Por exemplo, mydomain.example.com.
O nome de usuário e a senha de uma conta com permissões para associar uma VM ao domínio. Por padrão, os membros do grupo Cloud Service Domain Join Accounts têm essas permissões. Para mais informações sobre os grupos padrão
criados pelo Managed Microsoft AD, consulte
Grupos.
O nome de usuário precisa estar no seguinte formato:
USERNAME@DOMAIN_NAME. A parte do nome de domínio do
nome de usuário precisa estar em letras maiúsculas. Por exemplo, user@MYDOMAIN.EXAMPLE.COM.
É possível associar a VM do Linux ao domínio do Managed Microsoft AD usando o comando
realm
join. Confira um exemplo de comando:
realm join DOMAIN_NAME -U 'USERNAME@DOMAIN_NAME'
Para uma saída detalhada, adicione a flag -v ao final do comando.
Especificar o local da conta com realm join
Por padrão, o comando realm join cria uma conta de máquina localizada em:
Para especificar onde criar a conta, use a flag --computer-ou para fornecer
o caminho para o comando realm join. O exemplo a seguir mostra como especificar o caminho:
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-09-04 UTC."],[],[],null,["# Quickstart: Join a Linux VM to a domain\n\nJoin a Linux VM to a domain\n===========================\n\nThis page shows you how to join a Linux VM, running [supported Linux\ndistributions](/managed-microsoft-ad/docs/os-versions#linux-domain-join), to a\ndomain in Managed Service for Microsoft Active Directory using the System Security Services Daemon (SSSD).\n\nManaged Microsoft AD interoperability works for many Linux distributions\nand other connectivity tools. Learn about\n[these open source connectivity tools](/managed-microsoft-ad/docs/connect-to-active-directory-domain#connecting_to_a_domain-joined_linux_vm).\n\nBefore you begin\n----------------\n\n- [Create a Managed Microsoft AD domain](/managed-microsoft-ad/docs/quickstart-create-domain).\n\n- [Create a Linux VM](/compute/docs/create-linux-vm-instance#create_a_virtual_machine_instance).\n When you create the VM, make sure that you complete the following tasks:\n\n - On the **Public images** tab, select the appropriate distribution. For example, **Ubuntu 22.04 LTS** or **Red Hat Enterprise Linux 8**.\n - Select a [Linux version that Managed Microsoft AD\n supports](/managed-microsoft-ad/docs/os-versions#linux-domain-join).\n - Create the VM in the project that hosts your Managed Microsoft AD domain. If your Managed Microsoft AD domain has a [Shared VPC](/vpc/docs/shared-vpc) as an authorized network, you can also create the VM in any of the Shared VPC service projects.\n - Create the VM on a VPC network that you have peered with the Managed Microsoft AD domain.\n- Install `realmd` on the VM. Learn about\n [`realm`](https://www.systutorials.com/docs/linux/man/8-realm/).\n\n See\n [Ubuntu](https://ubuntu.com/server/docs/service-sssd-ad#software-installation-3)\n and [Red\n Hat](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/windows_integration_guide/realmd-prepreqs)\n documentation for instructions.\n\n The following are some sample commands: \n\n ### Ubuntu 22.04 LTS or later\n\n ```\n apt-get update\n apt-get install realmd sssd packagekit\n ```\n\n ### RHEL 8 or later\n\n ```\n sudo yum install realmd oddjob oddjob-mkhomedir\n sssd adcli\n ```\n\nJoin a Linux VM to a domain\n---------------------------\n\nTo join a Linux VM to a domain, you need the following information:\n\n- The domain name of your Managed Microsoft AD domain. For example,\n `mydomain.example.com`.\n\n- The username and password of an account that has permissions to join a VM to\n the domain. By default, members of the `Cloud Service Domain Join Accounts`\n group have these permissions. For more information about the default groups\n that Managed Microsoft AD creates, see\n [Groups](/managed-microsoft-ad/docs/objects#groups).\n\n - The username must be in the following format: \u003cvar translate=\"no\"\u003eUSERNAME\u003c/var\u003e@\u003cvar translate=\"no\"\u003eDOMAIN_NAME\u003c/var\u003e. The domain name part of the username must be in uppercase. For example, `user@MYDOMAIN.EXAMPLE.COM`.\n\nYou can join the Linux VM to the Managed Microsoft AD domain using the\n[`realm\njoin`](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/windows_integration_guide/realmd-domain#realm-join)\ncommand. The following is a sample command: \n\n```\nrealm join DOMAIN_NAME -U 'USERNAME@DOMAIN_NAME'\n```\n\nFor verbose output, add the `-v` flag at the end of the command.\n\n### Specify account location with `realm join`\n\nBy default, the `realm join` command creates a machine account that is located at: \n\n```\nCN=ACCOUNT_NAME,OU=Computers,OU=Cloud,DC=MACHINE,DC=MID_LEVEL,DC=EXTENSION\n```\n\nTo specify where to create the account, use the `--computer-ou` flag to provide\nthe path for the `realm join` command. The following example shows how to\nspecify the path: \n\n```\n--computer-ou=\"OU=CUSTOM_OU,DC=MACHINE,DC=MID_LEVEL,DC=EXTENSION\"\n```\n\nThe user must have the permissions that are required to create accounts in the specified OU.\n\nRemove a Linux VM from a domain\n-------------------------------\n\nTo remove a Linux VM from a domain, you need the domain name of your\nManaged Microsoft AD domain and the username of your user account.\n\nYou can remove a Linux VM from the Managed Microsoft AD domain using the\n[`realm\nleave`](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/windows_integration_guide/realmd-ad-unenroll)\ncommand. The following is a sample command: \n\n```\nrealm leave DOMAIN_NAME -U 'USERNAME@DOMAIN_NAME'\n```\n\nWhat's next\n-----------\n\n- [Connect to a Managed Microsoft AD domain](/managed-microsoft-ad/docs/connect-to-active-directory-domain).\n- Learn about the [delegated administrator account](/managed-microsoft-ad/docs/how-to-use-delegated-admin)."]]