1. Packages
  2. Azure Classic
  3. API Docs
  4. netapp
  5. Account

We recommend using Azure Native.

Azure v6.10.0 published on Tuesday, Nov 19, 2024 by Pulumi

azure.netapp.Account

Explore with Pulumi AI

azure logo

We recommend using Azure Native.

Azure v6.10.0 published on Tuesday, Nov 19, 2024 by Pulumi

    Manages a NetApp Account.

    NOTE: Azure allows only one active directory can be joined to a single subscription at a time for NetApp Account.

    NetApp Account Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as azure from "@pulumi/azure";
    
    const example = new azure.core.ResourceGroup("example", {
        name: "example-resources",
        location: "West Europe",
    });
    const current = azure.core.getClientConfig({});
    const exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity("example", {
        name: "anf-user-assigned-identity",
        location: example.location,
        resourceGroupName: example.name,
    });
    const exampleAccount = new azure.netapp.Account("example", {
        name: "netappaccount",
        location: example.location,
        resourceGroupName: example.name,
        activeDirectory: {
            username: "aduser",
            password: "aduserpwd",
            smbServerName: "SMBSERVER",
            dnsServers: ["1.2.3.4"],
            domain: "westcentralus.com",
            organizationalUnit: "OU=FirstLevel",
        },
        identity: {
            type: "UserAssigned",
            identityIds: [exampleUserAssignedIdentity.id],
        },
    });
    
    import pulumi
    import pulumi_azure as azure
    
    example = azure.core.ResourceGroup("example",
        name="example-resources",
        location="West Europe")
    current = azure.core.get_client_config()
    example_user_assigned_identity = azure.authorization.UserAssignedIdentity("example",
        name="anf-user-assigned-identity",
        location=example.location,
        resource_group_name=example.name)
    example_account = azure.netapp.Account("example",
        name="netappaccount",
        location=example.location,
        resource_group_name=example.name,
        active_directory={
            "username": "aduser",
            "password": "aduserpwd",
            "smb_server_name": "SMBSERVER",
            "dns_servers": ["1.2.3.4"],
            "domain": "westcentralus.com",
            "organizational_unit": "OU=FirstLevel",
        },
        identity={
            "type": "UserAssigned",
            "identity_ids": [example_user_assigned_identity.id],
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization"
    	"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core"
    	"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/netapp"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
    			Name:     pulumi.String("example-resources"),
    			Location: pulumi.String("West Europe"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil)
    		if err != nil {
    			return err
    		}
    		exampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, "example", &authorization.UserAssignedIdentityArgs{
    			Name:              pulumi.String("anf-user-assigned-identity"),
    			Location:          example.Location,
    			ResourceGroupName: example.Name,
    		})
    		if err != nil {
    			return err
    		}
    		_, err = netapp.NewAccount(ctx, "example", &netapp.AccountArgs{
    			Name:              pulumi.String("netappaccount"),
    			Location:          example.Location,
    			ResourceGroupName: example.Name,
    			ActiveDirectory: &netapp.AccountActiveDirectoryArgs{
    				Username:      pulumi.String("aduser"),
    				Password:      pulumi.String("aduserpwd"),
    				SmbServerName: pulumi.String("SMBSERVER"),
    				DnsServers: pulumi.StringArray{
    					pulumi.String("1.2.3.4"),
    				},
    				Domain:             pulumi.String("westcentralus.com"),
    				OrganizationalUnit: pulumi.String("OU=FirstLevel"),
    			},
    			Identity: &netapp.AccountIdentityArgs{
    				Type: pulumi.String("UserAssigned"),
    				IdentityIds: pulumi.StringArray{
    					exampleUserAssignedIdentity.ID(),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Azure = Pulumi.Azure;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Azure.Core.ResourceGroup("example", new()
        {
            Name = "example-resources",
            Location = "West Europe",
        });
    
        var current = Azure.Core.GetClientConfig.Invoke();
    
        var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity("example", new()
        {
            Name = "anf-user-assigned-identity",
            Location = example.Location,
            ResourceGroupName = example.Name,
        });
    
        var exampleAccount = new Azure.NetApp.Account("example", new()
        {
            Name = "netappaccount",
            Location = example.Location,
            ResourceGroupName = example.Name,
            ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs
            {
                Username = "aduser",
                Password = "aduserpwd",
                SmbServerName = "SMBSERVER",
                DnsServers = new[]
                {
                    "1.2.3.4",
                },
                Domain = "westcentralus.com",
                OrganizationalUnit = "OU=FirstLevel",
            },
            Identity = new Azure.NetApp.Inputs.AccountIdentityArgs
            {
                Type = "UserAssigned",
                IdentityIds = new[]
                {
                    exampleUserAssignedIdentity.Id,
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.azure.core.ResourceGroup;
    import com.pulumi.azure.core.ResourceGroupArgs;
    import com.pulumi.azure.core.CoreFunctions;
    import com.pulumi.azure.authorization.UserAssignedIdentity;
    import com.pulumi.azure.authorization.UserAssignedIdentityArgs;
    import com.pulumi.azure.netapp.Account;
    import com.pulumi.azure.netapp.AccountArgs;
    import com.pulumi.azure.netapp.inputs.AccountActiveDirectoryArgs;
    import com.pulumi.azure.netapp.inputs.AccountIdentityArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new ResourceGroup("example", ResourceGroupArgs.builder()
                .name("example-resources")
                .location("West Europe")
                .build());
    
            final var current = CoreFunctions.getClientConfig();
    
            var exampleUserAssignedIdentity = new UserAssignedIdentity("exampleUserAssignedIdentity", UserAssignedIdentityArgs.builder()
                .name("anf-user-assigned-identity")
                .location(example.location())
                .resourceGroupName(example.name())
                .build());
    
            var exampleAccount = new Account("exampleAccount", AccountArgs.builder()
                .name("netappaccount")
                .location(example.location())
                .resourceGroupName(example.name())
                .activeDirectory(AccountActiveDirectoryArgs.builder()
                    .username("aduser")
                    .password("aduserpwd")
                    .smbServerName("SMBSERVER")
                    .dnsServers("1.2.3.4")
                    .domain("westcentralus.com")
                    .organizationalUnit("OU=FirstLevel")
                    .build())
                .identity(AccountIdentityArgs.builder()
                    .type("UserAssigned")
                    .identityIds(exampleUserAssignedIdentity.id())
                    .build())
                .build());
    
        }
    }
    
    resources:
      example:
        type: azure:core:ResourceGroup
        properties:
          name: example-resources
          location: West Europe
      exampleUserAssignedIdentity:
        type: azure:authorization:UserAssignedIdentity
        name: example
        properties:
          name: anf-user-assigned-identity
          location: ${example.location}
          resourceGroupName: ${example.name}
      exampleAccount:
        type: azure:netapp:Account
        name: example
        properties:
          name: netappaccount
          location: ${example.location}
          resourceGroupName: ${example.name}
          activeDirectory:
            username: aduser
            password: aduserpwd
            smbServerName: SMBSERVER
            dnsServers:
              - 1.2.3.4
            domain: westcentralus.com
            organizationalUnit: OU=FirstLevel
          identity:
            type: UserAssigned
            identityIds:
              - ${exampleUserAssignedIdentity.id}
    variables:
      current:
        fn::invoke:
          Function: azure:core:getClientConfig
          Arguments: {}
    

    Create Account Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new Account(name: string, args: AccountArgs, opts?: CustomResourceOptions);
    @overload
    def Account(resource_name: str,
                args: AccountArgs,
                opts: Optional[ResourceOptions] = None)
    
    @overload
    def Account(resource_name: str,
                opts: Optional[ResourceOptions] = None,
                resource_group_name: Optional[str] = None,
                active_directory: Optional[AccountActiveDirectoryArgs] = None,
                identity: Optional[AccountIdentityArgs] = None,
                location: Optional[str] = None,
                name: Optional[str] = None,
                tags: Optional[Mapping[str, str]] = None)
    func NewAccount(ctx *Context, name string, args AccountArgs, opts ...ResourceOption) (*Account, error)
    public Account(string name, AccountArgs args, CustomResourceOptions? opts = null)
    public Account(String name, AccountArgs args)
    public Account(String name, AccountArgs args, CustomResourceOptions options)
    
    type: azure:netapp:Account
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AccountArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AccountArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AccountArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AccountArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AccountArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var exampleaccountResourceResourceFromNetappaccount = new Azure.NetApp.Account("exampleaccountResourceResourceFromNetappaccount", new()
    {
        ResourceGroupName = "string",
        ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs
        {
            Password = "string",
            DnsServers = new[]
            {
                "string",
            },
            Domain = "string",
            Username = "string",
            SmbServerName = "string",
            KerberosAdName = "string",
            LdapSigningEnabled = false,
            LocalNfsUsersWithLdapAllowed = false,
            OrganizationalUnit = "string",
            LdapOverTlsEnabled = false,
            ServerRootCaCertificate = "string",
            SiteName = "string",
            KerberosKdcIp = "string",
            AesEncryptionEnabled = false,
        },
        Identity = new Azure.NetApp.Inputs.AccountIdentityArgs
        {
            Type = "string",
            IdentityIds = new[]
            {
                "string",
            },
            PrincipalId = "string",
            TenantId = "string",
        },
        Location = "string",
        Name = "string",
        Tags = 
        {
            { "string", "string" },
        },
    });
    
    example, err := netapp.NewAccount(ctx, "exampleaccountResourceResourceFromNetappaccount", &netapp.AccountArgs{
    	ResourceGroupName: pulumi.String("string"),
    	ActiveDirectory: &netapp.AccountActiveDirectoryArgs{
    		Password: pulumi.String("string"),
    		DnsServers: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Domain:                       pulumi.String("string"),
    		Username:                     pulumi.String("string"),
    		SmbServerName:                pulumi.String("string"),
    		KerberosAdName:               pulumi.String("string"),
    		LdapSigningEnabled:           pulumi.Bool(false),
    		LocalNfsUsersWithLdapAllowed: pulumi.Bool(false),
    		OrganizationalUnit:           pulumi.String("string"),
    		LdapOverTlsEnabled:           pulumi.Bool(false),
    		ServerRootCaCertificate:      pulumi.String("string"),
    		SiteName:                     pulumi.String("string"),
    		KerberosKdcIp:                pulumi.String("string"),
    		AesEncryptionEnabled:         pulumi.Bool(false),
    	},
    	Identity: &netapp.AccountIdentityArgs{
    		Type: pulumi.String("string"),
    		IdentityIds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		PrincipalId: pulumi.String("string"),
    		TenantId:    pulumi.String("string"),
    	},
    	Location: pulumi.String("string"),
    	Name:     pulumi.String("string"),
    	Tags: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    })
    
    var exampleaccountResourceResourceFromNetappaccount = new Account("exampleaccountResourceResourceFromNetappaccount", AccountArgs.builder()
        .resourceGroupName("string")
        .activeDirectory(AccountActiveDirectoryArgs.builder()
            .password("string")
            .dnsServers("string")
            .domain("string")
            .username("string")
            .smbServerName("string")
            .kerberosAdName("string")
            .ldapSigningEnabled(false)
            .localNfsUsersWithLdapAllowed(false)
            .organizationalUnit("string")
            .ldapOverTlsEnabled(false)
            .serverRootCaCertificate("string")
            .siteName("string")
            .kerberosKdcIp("string")
            .aesEncryptionEnabled(false)
            .build())
        .identity(AccountIdentityArgs.builder()
            .type("string")
            .identityIds("string")
            .principalId("string")
            .tenantId("string")
            .build())
        .location("string")
        .name("string")
        .tags(Map.of("string", "string"))
        .build());
    
    exampleaccount_resource_resource_from_netappaccount = azure.netapp.Account("exampleaccountResourceResourceFromNetappaccount",
        resource_group_name="string",
        active_directory={
            "password": "string",
            "dns_servers": ["string"],
            "domain": "string",
            "username": "string",
            "smb_server_name": "string",
            "kerberos_ad_name": "string",
            "ldap_signing_enabled": False,
            "local_nfs_users_with_ldap_allowed": False,
            "organizational_unit": "string",
            "ldap_over_tls_enabled": False,
            "server_root_ca_certificate": "string",
            "site_name": "string",
            "kerberos_kdc_ip": "string",
            "aes_encryption_enabled": False,
        },
        identity={
            "type": "string",
            "identity_ids": ["string"],
            "principal_id": "string",
            "tenant_id": "string",
        },
        location="string",
        name="string",
        tags={
            "string": "string",
        })
    
    const exampleaccountResourceResourceFromNetappaccount = new azure.netapp.Account("exampleaccountResourceResourceFromNetappaccount", {
        resourceGroupName: "string",
        activeDirectory: {
            password: "string",
            dnsServers: ["string"],
            domain: "string",
            username: "string",
            smbServerName: "string",
            kerberosAdName: "string",
            ldapSigningEnabled: false,
            localNfsUsersWithLdapAllowed: false,
            organizationalUnit: "string",
            ldapOverTlsEnabled: false,
            serverRootCaCertificate: "string",
            siteName: "string",
            kerberosKdcIp: "string",
            aesEncryptionEnabled: false,
        },
        identity: {
            type: "string",
            identityIds: ["string"],
            principalId: "string",
            tenantId: "string",
        },
        location: "string",
        name: "string",
        tags: {
            string: "string",
        },
    });
    
    type: azure:netapp:Account
    properties:
        activeDirectory:
            aesEncryptionEnabled: false
            dnsServers:
                - string
            domain: string
            kerberosAdName: string
            kerberosKdcIp: string
            ldapOverTlsEnabled: false
            ldapSigningEnabled: false
            localNfsUsersWithLdapAllowed: false
            organizationalUnit: string
            password: string
            serverRootCaCertificate: string
            siteName: string
            smbServerName: string
            username: string
        identity:
            identityIds:
                - string
            principalId: string
            tenantId: string
            type: string
        location: string
        name: string
        resourceGroupName: string
        tags:
            string: string
    

    Account Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The Account resource accepts the following input properties:

    ResourceGroupName string
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    ActiveDirectory AccountActiveDirectory
    A active_directory block as defined below.
    Identity AccountIdentity
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    Location string
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    Name string
    The name of the NetApp Account. Changing this forces a new resource to be created.
    Tags Dictionary<string, string>
    A mapping of tags to assign to the resource.
    ResourceGroupName string
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    ActiveDirectory AccountActiveDirectoryArgs
    A active_directory block as defined below.
    Identity AccountIdentityArgs
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    Location string
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    Name string
    The name of the NetApp Account. Changing this forces a new resource to be created.
    Tags map[string]string
    A mapping of tags to assign to the resource.
    resourceGroupName String
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    activeDirectory AccountActiveDirectory
    A active_directory block as defined below.
    identity AccountIdentity
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location String
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name String
    The name of the NetApp Account. Changing this forces a new resource to be created.
    tags Map<String,String>
    A mapping of tags to assign to the resource.
    resourceGroupName string
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    activeDirectory AccountActiveDirectory
    A active_directory block as defined below.
    identity AccountIdentity
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location string
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name string
    The name of the NetApp Account. Changing this forces a new resource to be created.
    tags {[key: string]: string}
    A mapping of tags to assign to the resource.
    resource_group_name str
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    active_directory AccountActiveDirectoryArgs
    A active_directory block as defined below.
    identity AccountIdentityArgs
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location str
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name str
    The name of the NetApp Account. Changing this forces a new resource to be created.
    tags Mapping[str, str]
    A mapping of tags to assign to the resource.
    resourceGroupName String
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    activeDirectory Property Map
    A active_directory block as defined below.
    identity Property Map
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location String
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name String
    The name of the NetApp Account. Changing this forces a new resource to be created.
    tags Map<String>
    A mapping of tags to assign to the resource.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the Account resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing Account Resource

    Get an existing Account resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AccountState, opts?: CustomResourceOptions): Account
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            active_directory: Optional[AccountActiveDirectoryArgs] = None,
            identity: Optional[AccountIdentityArgs] = None,
            location: Optional[str] = None,
            name: Optional[str] = None,
            resource_group_name: Optional[str] = None,
            tags: Optional[Mapping[str, str]] = None) -> Account
    func GetAccount(ctx *Context, name string, id IDInput, state *AccountState, opts ...ResourceOption) (*Account, error)
    public static Account Get(string name, Input<string> id, AccountState? state, CustomResourceOptions? opts = null)
    public static Account get(String name, Output<String> id, AccountState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    ActiveDirectory AccountActiveDirectory
    A active_directory block as defined below.
    Identity AccountIdentity
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    Location string
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    Name string
    The name of the NetApp Account. Changing this forces a new resource to be created.
    ResourceGroupName string
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    Tags Dictionary<string, string>
    A mapping of tags to assign to the resource.
    ActiveDirectory AccountActiveDirectoryArgs
    A active_directory block as defined below.
    Identity AccountIdentityArgs
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    Location string
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    Name string
    The name of the NetApp Account. Changing this forces a new resource to be created.
    ResourceGroupName string
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    Tags map[string]string
    A mapping of tags to assign to the resource.
    activeDirectory AccountActiveDirectory
    A active_directory block as defined below.
    identity AccountIdentity
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location String
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name String
    The name of the NetApp Account. Changing this forces a new resource to be created.
    resourceGroupName String
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    tags Map<String,String>
    A mapping of tags to assign to the resource.
    activeDirectory AccountActiveDirectory
    A active_directory block as defined below.
    identity AccountIdentity
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location string
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name string
    The name of the NetApp Account. Changing this forces a new resource to be created.
    resourceGroupName string
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    tags {[key: string]: string}
    A mapping of tags to assign to the resource.
    active_directory AccountActiveDirectoryArgs
    A active_directory block as defined below.
    identity AccountIdentityArgs
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location str
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name str
    The name of the NetApp Account. Changing this forces a new resource to be created.
    resource_group_name str
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    tags Mapping[str, str]
    A mapping of tags to assign to the resource.
    activeDirectory Property Map
    A active_directory block as defined below.
    identity Property Map
    The identity block where it is used when customer managed keys based encryption will be enabled as defined below.
    location String
    Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
    name String
    The name of the NetApp Account. Changing this forces a new resource to be created.
    resourceGroupName String
    The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
    tags Map<String>
    A mapping of tags to assign to the resource.

    Supporting Types

    AccountActiveDirectory, AccountActiveDirectoryArgs

    DnsServers List<string>
    A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4 address.
    Domain string
    The name of the Active Directory domain.
    Password string
    The password associated with the username.
    SmbServerName string
    The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
    Username string
    The Username of Active Directory Domain Administrator.
    AesEncryptionEnabled bool
    If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
    KerberosAdName string
    Name of the active directory machine.
    KerberosKdcIp string

    kdc server IP addresses for the active directory machine.

    IMPORTANT: If you plan on using Kerberos volumes, both ad_name and kdc_ip are required in order to create the volume.

    LdapOverTlsEnabled bool
    Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
    LdapSigningEnabled bool
    Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
    LocalNfsUsersWithLdapAllowed bool
    If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
    OrganizationalUnit string
    The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
    ServerRootCaCertificate string
    When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabled is set to true.
    SiteName string
    The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
    DnsServers []string
    A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4 address.
    Domain string
    The name of the Active Directory domain.
    Password string
    The password associated with the username.
    SmbServerName string
    The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
    Username string
    The Username of Active Directory Domain Administrator.
    AesEncryptionEnabled bool
    If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
    KerberosAdName string
    Name of the active directory machine.
    KerberosKdcIp string

    kdc server IP addresses for the active directory machine.

    IMPORTANT: If you plan on using Kerberos volumes, both ad_name and kdc_ip are required in order to create the volume.

    LdapOverTlsEnabled bool
    Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
    LdapSigningEnabled bool
    Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
    LocalNfsUsersWithLdapAllowed bool
    If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
    OrganizationalUnit string
    The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
    ServerRootCaCertificate string
    When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabled is set to true.
    SiteName string
    The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
    dnsServers List<String>
    A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4 address.
    domain String
    The name of the Active Directory domain.
    password String
    The password associated with the username.
    smbServerName String
    The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
    username String
    The Username of Active Directory Domain Administrator.
    aesEncryptionEnabled Boolean
    If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
    kerberosAdName String
    Name of the active directory machine.
    kerberosKdcIp String

    kdc server IP addresses for the active directory machine.

    IMPORTANT: If you plan on using Kerberos volumes, both ad_name and kdc_ip are required in order to create the volume.

    ldapOverTlsEnabled Boolean
    Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
    ldapSigningEnabled Boolean
    Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
    localNfsUsersWithLdapAllowed Boolean
    If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
    organizationalUnit String
    The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
    serverRootCaCertificate String
    When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabled is set to true.
    siteName String
    The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
    dnsServers string[]
    A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4 address.
    domain string
    The name of the Active Directory domain.
    password string
    The password associated with the username.
    smbServerName string
    The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
    username string
    The Username of Active Directory Domain Administrator.
    aesEncryptionEnabled boolean
    If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
    kerberosAdName string
    Name of the active directory machine.
    kerberosKdcIp string

    kdc server IP addresses for the active directory machine.

    IMPORTANT: If you plan on using Kerberos volumes, both ad_name and kdc_ip are required in order to create the volume.

    ldapOverTlsEnabled boolean
    Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
    ldapSigningEnabled boolean
    Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
    localNfsUsersWithLdapAllowed boolean
    If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
    organizationalUnit string
    The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
    serverRootCaCertificate string
    When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabled is set to true.
    siteName string
    The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
    dns_servers Sequence[str]
    A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4 address.
    domain str
    The name of the Active Directory domain.
    password str
    The password associated with the username.
    smb_server_name str
    The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
    username str
    The Username of Active Directory Domain Administrator.
    aes_encryption_enabled bool
    If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
    kerberos_ad_name str
    Name of the active directory machine.
    kerberos_kdc_ip str

    kdc server IP addresses for the active directory machine.

    IMPORTANT: If you plan on using Kerberos volumes, both ad_name and kdc_ip are required in order to create the volume.

    ldap_over_tls_enabled bool
    Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
    ldap_signing_enabled bool
    Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
    local_nfs_users_with_ldap_allowed bool
    If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
    organizational_unit str
    The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
    server_root_ca_certificate str
    When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabled is set to true.
    site_name str
    The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
    dnsServers List<String>
    A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4 address.
    domain String
    The name of the Active Directory domain.
    password String
    The password associated with the username.
    smbServerName String
    The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
    username String
    The Username of Active Directory Domain Administrator.
    aesEncryptionEnabled Boolean
    If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
    kerberosAdName String
    Name of the active directory machine.
    kerberosKdcIp String

    kdc server IP addresses for the active directory machine.

    IMPORTANT: If you plan on using Kerberos volumes, both ad_name and kdc_ip are required in order to create the volume.

    ldapOverTlsEnabled Boolean
    Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
    ldapSigningEnabled Boolean
    Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
    localNfsUsersWithLdapAllowed Boolean
    If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
    organizationalUnit String
    The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
    serverRootCaCertificate String
    When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabled is set to true.
    siteName String
    The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.

    AccountIdentity, AccountIdentityArgs

    Type string
    The identity type, which can be SystemAssigned or UserAssigned. Only one type at a time is supported by Azure NetApp Files.
    IdentityIds List<string>
    The identity id of the user assigned identity to use when type is UserAssigned
    PrincipalId string
    TenantId string
    Type string
    The identity type, which can be SystemAssigned or UserAssigned. Only one type at a time is supported by Azure NetApp Files.
    IdentityIds []string
    The identity id of the user assigned identity to use when type is UserAssigned
    PrincipalId string
    TenantId string
    type String
    The identity type, which can be SystemAssigned or UserAssigned. Only one type at a time is supported by Azure NetApp Files.
    identityIds List<String>
    The identity id of the user assigned identity to use when type is UserAssigned
    principalId String
    tenantId String
    type string
    The identity type, which can be SystemAssigned or UserAssigned. Only one type at a time is supported by Azure NetApp Files.
    identityIds string[]
    The identity id of the user assigned identity to use when type is UserAssigned
    principalId string
    tenantId string
    type str
    The identity type, which can be SystemAssigned or UserAssigned. Only one type at a time is supported by Azure NetApp Files.
    identity_ids Sequence[str]
    The identity id of the user assigned identity to use when type is UserAssigned
    principal_id str
    tenant_id str
    type String
    The identity type, which can be SystemAssigned or UserAssigned. Only one type at a time is supported by Azure NetApp Files.
    identityIds List<String>
    The identity id of the user assigned identity to use when type is UserAssigned
    principalId String
    tenantId String

    Import

    NetApp Accounts can be imported using the resource id, e.g.

    $ pulumi import azure:netapp/account:Account example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.NetApp/netAppAccounts/account1
    

    ~> IMPORTANT: When importing a NetApp account, the active_directory.password and active_directory.server_root_ca_certificate values cannot be retrieved from the Azure API and will need to be redeclared within the resource.

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Azure Classic pulumi/pulumi-azure
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the azurerm Terraform Provider.
    azure logo

    We recommend using Azure Native.

    Azure v6.10.0 published on Tuesday, Nov 19, 2024 by Pulumi