We recommend using Azure Native.
azure.netapp.Account
Explore with Pulumi AI
Manages a NetApp Account.
NOTE: Azure allows only one active directory can be joined to a single subscription at a time for NetApp Account.
NetApp Account Usage
import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
const example = new azure.core.ResourceGroup("example", {
    name: "example-resources",
    location: "West Europe",
});
const current = azure.core.getClientConfig({});
const exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity("example", {
    name: "anf-user-assigned-identity",
    location: example.location,
    resourceGroupName: example.name,
});
const exampleAccount = new azure.netapp.Account("example", {
    name: "netappaccount",
    location: example.location,
    resourceGroupName: example.name,
    activeDirectory: {
        username: "aduser",
        password: "aduserpwd",
        smbServerName: "SMBSERVER",
        dnsServers: ["1.2.3.4"],
        domain: "westcentralus.com",
        organizationalUnit: "OU=FirstLevel",
    },
    identity: {
        type: "UserAssigned",
        identityIds: [exampleUserAssignedIdentity.id],
    },
});
import pulumi
import pulumi_azure as azure
example = azure.core.ResourceGroup("example",
    name="example-resources",
    location="West Europe")
current = azure.core.get_client_config()
example_user_assigned_identity = azure.authorization.UserAssignedIdentity("example",
    name="anf-user-assigned-identity",
    location=example.location,
    resource_group_name=example.name)
example_account = azure.netapp.Account("example",
    name="netappaccount",
    location=example.location,
    resource_group_name=example.name,
    active_directory={
        "username": "aduser",
        "password": "aduserpwd",
        "smb_server_name": "SMBSERVER",
        "dns_servers": ["1.2.3.4"],
        "domain": "westcentralus.com",
        "organizational_unit": "OU=FirstLevel",
    },
    identity={
        "type": "UserAssigned",
        "identity_ids": [example_user_assigned_identity.id],
    })
package main
import (
	"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization"
	"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core"
	"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/netapp"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
			Name:     pulumi.String("example-resources"),
			Location: pulumi.String("West Europe"),
		})
		if err != nil {
			return err
		}
		_, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil)
		if err != nil {
			return err
		}
		exampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, "example", &authorization.UserAssignedIdentityArgs{
			Name:              pulumi.String("anf-user-assigned-identity"),
			Location:          example.Location,
			ResourceGroupName: example.Name,
		})
		if err != nil {
			return err
		}
		_, err = netapp.NewAccount(ctx, "example", &netapp.AccountArgs{
			Name:              pulumi.String("netappaccount"),
			Location:          example.Location,
			ResourceGroupName: example.Name,
			ActiveDirectory: &netapp.AccountActiveDirectoryArgs{
				Username:      pulumi.String("aduser"),
				Password:      pulumi.String("aduserpwd"),
				SmbServerName: pulumi.String("SMBSERVER"),
				DnsServers: pulumi.StringArray{
					pulumi.String("1.2.3.4"),
				},
				Domain:             pulumi.String("westcentralus.com"),
				OrganizationalUnit: pulumi.String("OU=FirstLevel"),
			},
			Identity: &netapp.AccountIdentityArgs{
				Type: pulumi.String("UserAssigned"),
				IdentityIds: pulumi.StringArray{
					exampleUserAssignedIdentity.ID(),
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Azure = Pulumi.Azure;
return await Deployment.RunAsync(() => 
{
    var example = new Azure.Core.ResourceGroup("example", new()
    {
        Name = "example-resources",
        Location = "West Europe",
    });
    var current = Azure.Core.GetClientConfig.Invoke();
    var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity("example", new()
    {
        Name = "anf-user-assigned-identity",
        Location = example.Location,
        ResourceGroupName = example.Name,
    });
    var exampleAccount = new Azure.NetApp.Account("example", new()
    {
        Name = "netappaccount",
        Location = example.Location,
        ResourceGroupName = example.Name,
        ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs
        {
            Username = "aduser",
            Password = "aduserpwd",
            SmbServerName = "SMBSERVER",
            DnsServers = new[]
            {
                "1.2.3.4",
            },
            Domain = "westcentralus.com",
            OrganizationalUnit = "OU=FirstLevel",
        },
        Identity = new Azure.NetApp.Inputs.AccountIdentityArgs
        {
            Type = "UserAssigned",
            IdentityIds = new[]
            {
                exampleUserAssignedIdentity.Id,
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.core.ResourceGroup;
import com.pulumi.azure.core.ResourceGroupArgs;
import com.pulumi.azure.core.CoreFunctions;
import com.pulumi.azure.authorization.UserAssignedIdentity;
import com.pulumi.azure.authorization.UserAssignedIdentityArgs;
import com.pulumi.azure.netapp.Account;
import com.pulumi.azure.netapp.AccountArgs;
import com.pulumi.azure.netapp.inputs.AccountActiveDirectoryArgs;
import com.pulumi.azure.netapp.inputs.AccountIdentityArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var example = new ResourceGroup("example", ResourceGroupArgs.builder()
            .name("example-resources")
            .location("West Europe")
            .build());
        final var current = CoreFunctions.getClientConfig();
        var exampleUserAssignedIdentity = new UserAssignedIdentity("exampleUserAssignedIdentity", UserAssignedIdentityArgs.builder()
            .name("anf-user-assigned-identity")
            .location(example.location())
            .resourceGroupName(example.name())
            .build());
        var exampleAccount = new Account("exampleAccount", AccountArgs.builder()
            .name("netappaccount")
            .location(example.location())
            .resourceGroupName(example.name())
            .activeDirectory(AccountActiveDirectoryArgs.builder()
                .username("aduser")
                .password("aduserpwd")
                .smbServerName("SMBSERVER")
                .dnsServers("1.2.3.4")
                .domain("westcentralus.com")
                .organizationalUnit("OU=FirstLevel")
                .build())
            .identity(AccountIdentityArgs.builder()
                .type("UserAssigned")
                .identityIds(exampleUserAssignedIdentity.id())
                .build())
            .build());
    }
}
resources:
  example:
    type: azure:core:ResourceGroup
    properties:
      name: example-resources
      location: West Europe
  exampleUserAssignedIdentity:
    type: azure:authorization:UserAssignedIdentity
    name: example
    properties:
      name: anf-user-assigned-identity
      location: ${example.location}
      resourceGroupName: ${example.name}
  exampleAccount:
    type: azure:netapp:Account
    name: example
    properties:
      name: netappaccount
      location: ${example.location}
      resourceGroupName: ${example.name}
      activeDirectory:
        username: aduser
        password: aduserpwd
        smbServerName: SMBSERVER
        dnsServers:
          - 1.2.3.4
        domain: westcentralus.com
        organizationalUnit: OU=FirstLevel
      identity:
        type: UserAssigned
        identityIds:
          - ${exampleUserAssignedIdentity.id}
variables:
  current:
    fn::invoke:
      function: azure:core:getClientConfig
      arguments: {}
Create Account Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Account(name: string, args: AccountArgs, opts?: CustomResourceOptions);@overload
def Account(resource_name: str,
            args: AccountArgs,
            opts: Optional[ResourceOptions] = None)
@overload
def Account(resource_name: str,
            opts: Optional[ResourceOptions] = None,
            resource_group_name: Optional[str] = None,
            active_directory: Optional[AccountActiveDirectoryArgs] = None,
            identity: Optional[AccountIdentityArgs] = None,
            location: Optional[str] = None,
            name: Optional[str] = None,
            tags: Optional[Mapping[str, str]] = None)func NewAccount(ctx *Context, name string, args AccountArgs, opts ...ResourceOption) (*Account, error)public Account(string name, AccountArgs args, CustomResourceOptions? opts = null)
public Account(String name, AccountArgs args)
public Account(String name, AccountArgs args, CustomResourceOptions options)
type: azure:netapp:Account
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var exampleaccountResourceResourceFromNetappaccount = new Azure.NetApp.Account("exampleaccountResourceResourceFromNetappaccount", new()
{
    ResourceGroupName = "string",
    ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs
    {
        Password = "string",
        DnsServers = new[]
        {
            "string",
        },
        Domain = "string",
        Username = "string",
        SmbServerName = "string",
        KerberosAdName = "string",
        LdapSigningEnabled = false,
        LocalNfsUsersWithLdapAllowed = false,
        OrganizationalUnit = "string",
        LdapOverTlsEnabled = false,
        ServerRootCaCertificate = "string",
        SiteName = "string",
        KerberosKdcIp = "string",
        AesEncryptionEnabled = false,
    },
    Identity = new Azure.NetApp.Inputs.AccountIdentityArgs
    {
        Type = "string",
        IdentityIds = new[]
        {
            "string",
        },
        PrincipalId = "string",
        TenantId = "string",
    },
    Location = "string",
    Name = "string",
    Tags = 
    {
        { "string", "string" },
    },
});
example, err := netapp.NewAccount(ctx, "exampleaccountResourceResourceFromNetappaccount", &netapp.AccountArgs{
	ResourceGroupName: pulumi.String("string"),
	ActiveDirectory: &netapp.AccountActiveDirectoryArgs{
		Password: pulumi.String("string"),
		DnsServers: pulumi.StringArray{
			pulumi.String("string"),
		},
		Domain:                       pulumi.String("string"),
		Username:                     pulumi.String("string"),
		SmbServerName:                pulumi.String("string"),
		KerberosAdName:               pulumi.String("string"),
		LdapSigningEnabled:           pulumi.Bool(false),
		LocalNfsUsersWithLdapAllowed: pulumi.Bool(false),
		OrganizationalUnit:           pulumi.String("string"),
		LdapOverTlsEnabled:           pulumi.Bool(false),
		ServerRootCaCertificate:      pulumi.String("string"),
		SiteName:                     pulumi.String("string"),
		KerberosKdcIp:                pulumi.String("string"),
		AesEncryptionEnabled:         pulumi.Bool(false),
	},
	Identity: &netapp.AccountIdentityArgs{
		Type: pulumi.String("string"),
		IdentityIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		PrincipalId: pulumi.String("string"),
		TenantId:    pulumi.String("string"),
	},
	Location: pulumi.String("string"),
	Name:     pulumi.String("string"),
	Tags: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
})
var exampleaccountResourceResourceFromNetappaccount = new Account("exampleaccountResourceResourceFromNetappaccount", AccountArgs.builder()
    .resourceGroupName("string")
    .activeDirectory(AccountActiveDirectoryArgs.builder()
        .password("string")
        .dnsServers("string")
        .domain("string")
        .username("string")
        .smbServerName("string")
        .kerberosAdName("string")
        .ldapSigningEnabled(false)
        .localNfsUsersWithLdapAllowed(false)
        .organizationalUnit("string")
        .ldapOverTlsEnabled(false)
        .serverRootCaCertificate("string")
        .siteName("string")
        .kerberosKdcIp("string")
        .aesEncryptionEnabled(false)
        .build())
    .identity(AccountIdentityArgs.builder()
        .type("string")
        .identityIds("string")
        .principalId("string")
        .tenantId("string")
        .build())
    .location("string")
    .name("string")
    .tags(Map.of("string", "string"))
    .build());
exampleaccount_resource_resource_from_netappaccount = azure.netapp.Account("exampleaccountResourceResourceFromNetappaccount",
    resource_group_name="string",
    active_directory={
        "password": "string",
        "dns_servers": ["string"],
        "domain": "string",
        "username": "string",
        "smb_server_name": "string",
        "kerberos_ad_name": "string",
        "ldap_signing_enabled": False,
        "local_nfs_users_with_ldap_allowed": False,
        "organizational_unit": "string",
        "ldap_over_tls_enabled": False,
        "server_root_ca_certificate": "string",
        "site_name": "string",
        "kerberos_kdc_ip": "string",
        "aes_encryption_enabled": False,
    },
    identity={
        "type": "string",
        "identity_ids": ["string"],
        "principal_id": "string",
        "tenant_id": "string",
    },
    location="string",
    name="string",
    tags={
        "string": "string",
    })
const exampleaccountResourceResourceFromNetappaccount = new azure.netapp.Account("exampleaccountResourceResourceFromNetappaccount", {
    resourceGroupName: "string",
    activeDirectory: {
        password: "string",
        dnsServers: ["string"],
        domain: "string",
        username: "string",
        smbServerName: "string",
        kerberosAdName: "string",
        ldapSigningEnabled: false,
        localNfsUsersWithLdapAllowed: false,
        organizationalUnit: "string",
        ldapOverTlsEnabled: false,
        serverRootCaCertificate: "string",
        siteName: "string",
        kerberosKdcIp: "string",
        aesEncryptionEnabled: false,
    },
    identity: {
        type: "string",
        identityIds: ["string"],
        principalId: "string",
        tenantId: "string",
    },
    location: "string",
    name: "string",
    tags: {
        string: "string",
    },
});
type: azure:netapp:Account
properties:
    activeDirectory:
        aesEncryptionEnabled: false
        dnsServers:
            - string
        domain: string
        kerberosAdName: string
        kerberosKdcIp: string
        ldapOverTlsEnabled: false
        ldapSigningEnabled: false
        localNfsUsersWithLdapAllowed: false
        organizationalUnit: string
        password: string
        serverRootCaCertificate: string
        siteName: string
        smbServerName: string
        username: string
    identity:
        identityIds:
            - string
        principalId: string
        tenantId: string
        type: string
    location: string
    name: string
    resourceGroupName: string
    tags:
        string: string
Account Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Account resource accepts the following input properties:
- ResourceGroup stringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- ActiveDirectory AccountActive Directory 
- A active_directoryblock as defined below.
- Identity
AccountIdentity 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Dictionary<string, string>
- A mapping of tags to assign to the resource.
- ResourceGroup stringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- ActiveDirectory AccountActive Directory Args 
- A active_directoryblock as defined below.
- Identity
AccountIdentity Args 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- map[string]string
- A mapping of tags to assign to the resource.
- resourceGroup StringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- activeDirectory AccountActive Directory 
- A active_directoryblock as defined below.
- identity
AccountIdentity 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Map<String,String>
- A mapping of tags to assign to the resource.
- resourceGroup stringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- activeDirectory AccountActive Directory 
- A active_directoryblock as defined below.
- identity
AccountIdentity 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- {[key: string]: string}
- A mapping of tags to assign to the resource.
- resource_group_ strname 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- active_directory AccountActive Directory Args 
- A active_directoryblock as defined below.
- identity
AccountIdentity Args 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location str
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name str
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Mapping[str, str]
- A mapping of tags to assign to the resource.
- resourceGroup StringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- activeDirectory Property Map
- A active_directoryblock as defined below.
- identity Property Map
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Map<String>
- A mapping of tags to assign to the resource.
Outputs
All input properties are implicitly available as output properties. Additionally, the Account resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Account Resource
Get an existing Account resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AccountState, opts?: CustomResourceOptions): Account@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        active_directory: Optional[AccountActiveDirectoryArgs] = None,
        identity: Optional[AccountIdentityArgs] = None,
        location: Optional[str] = None,
        name: Optional[str] = None,
        resource_group_name: Optional[str] = None,
        tags: Optional[Mapping[str, str]] = None) -> Accountfunc GetAccount(ctx *Context, name string, id IDInput, state *AccountState, opts ...ResourceOption) (*Account, error)public static Account Get(string name, Input<string> id, AccountState? state, CustomResourceOptions? opts = null)public static Account get(String name, Output<String> id, AccountState state, CustomResourceOptions options)resources:  _:    type: azure:netapp:Account    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- ActiveDirectory AccountActive Directory 
- A active_directoryblock as defined below.
- Identity
AccountIdentity 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- ResourceGroup stringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Dictionary<string, string>
- A mapping of tags to assign to the resource.
- ActiveDirectory AccountActive Directory Args 
- A active_directoryblock as defined below.
- Identity
AccountIdentity Args 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- ResourceGroup stringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- map[string]string
- A mapping of tags to assign to the resource.
- activeDirectory AccountActive Directory 
- A active_directoryblock as defined below.
- identity
AccountIdentity 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resourceGroup StringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Map<String,String>
- A mapping of tags to assign to the resource.
- activeDirectory AccountActive Directory 
- A active_directoryblock as defined below.
- identity
AccountIdentity 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resourceGroup stringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- {[key: string]: string}
- A mapping of tags to assign to the resource.
- active_directory AccountActive Directory Args 
- A active_directoryblock as defined below.
- identity
AccountIdentity Args 
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location str
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name str
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resource_group_ strname 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Mapping[str, str]
- A mapping of tags to assign to the resource.
- activeDirectory Property Map
- A active_directoryblock as defined below.
- identity Property Map
- The identityblock where it is used when customer managed keys based encryption will be enabled as defined below.
- location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resourceGroup StringName 
- The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Map<String>
- A mapping of tags to assign to the resource.
Supporting Types
AccountActiveDirectory, AccountActiveDirectoryArgs      
- DnsServers List<string>
- A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4address.
- Domain string
- The name of the Active Directory domain.
- Password string
- The password associated with the username.
- SmbServer stringName 
- The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- Username string
- The Username of Active Directory Domain Administrator.
- AesEncryption boolEnabled 
- If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
- KerberosAd stringName 
- Name of the active directory machine.
- KerberosKdc stringIp 
- kdc server IP addresses for the active directory machine. - IMPORTANT: If you plan on using Kerberos volumes, both - ad_nameand- kdc_ipare required in order to create the volume.
- LdapOver boolTls Enabled 
- Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
- LdapSigning boolEnabled 
- Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
- LocalNfs boolUsers With Ldap Allowed 
- If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
- OrganizationalUnit string
- The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
- ServerRoot stringCa Certificate 
- When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabledis set totrue.
- SiteName string
- The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
- DnsServers []string
- A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4address.
- Domain string
- The name of the Active Directory domain.
- Password string
- The password associated with the username.
- SmbServer stringName 
- The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- Username string
- The Username of Active Directory Domain Administrator.
- AesEncryption boolEnabled 
- If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
- KerberosAd stringName 
- Name of the active directory machine.
- KerberosKdc stringIp 
- kdc server IP addresses for the active directory machine. - IMPORTANT: If you plan on using Kerberos volumes, both - ad_nameand- kdc_ipare required in order to create the volume.
- LdapOver boolTls Enabled 
- Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
- LdapSigning boolEnabled 
- Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
- LocalNfs boolUsers With Ldap Allowed 
- If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
- OrganizationalUnit string
- The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
- ServerRoot stringCa Certificate 
- When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabledis set totrue.
- SiteName string
- The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
- dnsServers List<String>
- A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4address.
- domain String
- The name of the Active Directory domain.
- password String
- The password associated with the username.
- smbServer StringName 
- The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username String
- The Username of Active Directory Domain Administrator.
- aesEncryption BooleanEnabled 
- If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
- kerberosAd StringName 
- Name of the active directory machine.
- kerberosKdc StringIp 
- kdc server IP addresses for the active directory machine. - IMPORTANT: If you plan on using Kerberos volumes, both - ad_nameand- kdc_ipare required in order to create the volume.
- ldapOver BooleanTls Enabled 
- Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
- ldapSigning BooleanEnabled 
- Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
- localNfs BooleanUsers With Ldap Allowed 
- If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
- organizationalUnit String
- The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
- serverRoot StringCa Certificate 
- When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabledis set totrue.
- siteName String
- The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
- dnsServers string[]
- A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4address.
- domain string
- The name of the Active Directory domain.
- password string
- The password associated with the username.
- smbServer stringName 
- The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username string
- The Username of Active Directory Domain Administrator.
- aesEncryption booleanEnabled 
- If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
- kerberosAd stringName 
- Name of the active directory machine.
- kerberosKdc stringIp 
- kdc server IP addresses for the active directory machine. - IMPORTANT: If you plan on using Kerberos volumes, both - ad_nameand- kdc_ipare required in order to create the volume.
- ldapOver booleanTls Enabled 
- Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
- ldapSigning booleanEnabled 
- Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
- localNfs booleanUsers With Ldap Allowed 
- If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
- organizationalUnit string
- The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
- serverRoot stringCa Certificate 
- When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabledis set totrue.
- siteName string
- The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
- dns_servers Sequence[str]
- A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4address.
- domain str
- The name of the Active Directory domain.
- password str
- The password associated with the username.
- smb_server_ strname 
- The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username str
- The Username of Active Directory Domain Administrator.
- aes_encryption_ boolenabled 
- If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
- kerberos_ad_ strname 
- Name of the active directory machine.
- kerberos_kdc_ strip 
- kdc server IP addresses for the active directory machine. - IMPORTANT: If you plan on using Kerberos volumes, both - ad_nameand- kdc_ipare required in order to create the volume.
- ldap_over_ booltls_ enabled 
- Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
- ldap_signing_ boolenabled 
- Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
- local_nfs_ boolusers_ with_ ldap_ allowed 
- If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
- organizational_unit str
- The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
- server_root_ strca_ certificate 
- When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabledis set totrue.
- site_name str
- The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
- dnsServers List<String>
- A list of DNS server IP addresses for the Active Directory domain. Only allows IPv4address.
- domain String
- The name of the Active Directory domain.
- password String
- The password associated with the username.
- smbServer StringName 
- The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username String
- The Username of Active Directory Domain Administrator.
- aesEncryption BooleanEnabled 
- If enabled, AES encryption will be enabled for SMB communication. Defaults to false.
- kerberosAd StringName 
- Name of the active directory machine.
- kerberosKdc StringIp 
- kdc server IP addresses for the active directory machine. - IMPORTANT: If you plan on using Kerberos volumes, both - ad_nameand- kdc_ipare required in order to create the volume.
- ldapOver BooleanTls Enabled 
- Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to false.
- ldapSigning BooleanEnabled 
- Specifies whether or not the LDAP traffic needs to be signed. Defaults to false.
- localNfs BooleanUsers With Ldap Allowed 
- If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to false.
- organizationalUnit String
- The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to CN=Computers.
- serverRoot StringCa Certificate 
- When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if ldap_over_tls_enabledis set totrue.
- siteName String
- The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to Default-First-Site-Name.
AccountIdentity, AccountIdentityArgs    
- Type string
- The identity type, which can be SystemAssignedorUserAssigned. Only one type at a time is supported by Azure NetApp Files.
- IdentityIds List<string>
- The identity id of the user assigned identity to use when type is UserAssigned
- PrincipalId string
- TenantId string
- Type string
- The identity type, which can be SystemAssignedorUserAssigned. Only one type at a time is supported by Azure NetApp Files.
- IdentityIds []string
- The identity id of the user assigned identity to use when type is UserAssigned
- PrincipalId string
- TenantId string
- type String
- The identity type, which can be SystemAssignedorUserAssigned. Only one type at a time is supported by Azure NetApp Files.
- identityIds List<String>
- The identity id of the user assigned identity to use when type is UserAssigned
- principalId String
- tenantId String
- type string
- The identity type, which can be SystemAssignedorUserAssigned. Only one type at a time is supported by Azure NetApp Files.
- identityIds string[]
- The identity id of the user assigned identity to use when type is UserAssigned
- principalId string
- tenantId string
- type str
- The identity type, which can be SystemAssignedorUserAssigned. Only one type at a time is supported by Azure NetApp Files.
- identity_ids Sequence[str]
- The identity id of the user assigned identity to use when type is UserAssigned
- principal_id str
- tenant_id str
- type String
- The identity type, which can be SystemAssignedorUserAssigned. Only one type at a time is supported by Azure NetApp Files.
- identityIds List<String>
- The identity id of the user assigned identity to use when type is UserAssigned
- principalId String
- tenantId String
Import
NetApp Accounts can be imported using the resource id, e.g.
$ pulumi import azure:netapp/account:Account example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.NetApp/netAppAccounts/account1
~> IMPORTANT: When importing a NetApp account, the active_directory.password and active_directory.server_root_ca_certificate values cannot be retrieved from the Azure API and will need to be redeclared within the resource.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Classic pulumi/pulumi-azure
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the azurermTerraform Provider.