You can integrate Cloud SQL for SQL Server with Managed Service for Microsoft Active Directory (also called Managed Microsoft AD).
This page contains information to review before you start an integration. After reviewing the following information, including the limitations, see Using Cloud SQL with Managed Microsoft AD.
Advantages of integrating with Managed Microsoft AD
Authentication, authorization, and more are available through Managed Microsoft AD. For example, joining an instance to a Managed Microsoft AD domain lets you to sign in using Windows Authentication with an AD-based identity.
Integrating Cloud SQL for SQL Server with an AD domain has the additional advantage of Cloud integration with your on-premises AD domains.
Prerequisites for integration
You can integrate with Managed Microsoft AD, adding support for Windows Authentication to an instance. However, before integrating, the following are required for your Google Cloud project:
- A Managed Microsoft AD domain. For information about setting up a
domain, see
Create a domain.
- On-premises AD domains require a managed AD trust. See Creating a one-way trust and Use an on-premises AD user to create a Windows login to Cloud SQL.
- A Per-Product, Per-Project Service account, as described in the following sections; see Creating a service account.
Create and configure a service account
You need a Per-Product, Per-Project Service account for each project that you
plan to integrate with Managed Microsoft AD. Use gcloud
or the Console to
create the account at the project level. The Per-Product, Per-Project Service
account should be granted the managedidentities.sqlintegrator
role on the
project. For additional information, see
gcloud projects set-iam-policy.
If you are using the Google Cloud console, then Cloud SQL automatically creates a
service account for you, and prompts you to grant the
managedidentities.sqlintegrator
role.
To create a service account with gcloud
, run the following command:
gcloud beta services identity create --service=sqladmin.googleapis.com \ --project=PROJECT_NUMBER
That command returns a service account name in the following format:
service-PROJECT_NUMBER
@gcp-sa-cloud-sql.iam.gserviceaccount.com
Here is an example of a service account name:
[email protected]
Granting the necessary permission for integration requires existing permissions. For the required permissions, see Required permissions.
To grant the necessary permission for integration, run the following command. If
your Managed Microsoft AD is in a different project,
AD_PROJECT_ID
should be the one containing the
Managed Service for Microsoft Active Directory instance, while the service account's
SQL_PROJECT_NUMBER
should be the one containing the SQL
Server instance:
gcloud projects add-iam-policy-binding AD_PROJECT_ID \ --member=serviceAccount:service-SQL_PROJECT_NUMBER@gcp-sa-cloud-sql.iam.gserviceaccount.com \ --role=roles/managedidentities.sqlintegrator
Also see gcloud beta services identity create.
Best practices for integrating with Managed Microsoft AD
When you plan an integration, review the following:
- Prerequisites for integration
- Integrating with a managed AD domain in a different project
- Managed Microsoft AD documentation
- Deploy domain controllers in additional regions
- Use the AD diagnosis tool to troubleshoot AD setup issues with your on-premises domain and Cloud SQL for SQL Server instances in Google Cloud console.
Having a SQL Server instance and a managed AD instance in the same region offers the lowest network latency and the best performance. Thus, when possible, set up a SQL Server instance and an AD instance in the same region. Additionally, whether or not you set them up in the same region, set up a primary and a backup region for higher availability.
Topologies for integrating with Managed Microsoft AD
Cloud SQL for SQL Server doesn't support domain local groups. However, you can:
- Add global groups or individual user logins directly in SQL Server
- Use universal groups when all groups and users belong to the same forest
If domain local groups were supported, individual user accounts, and global and universal groups, could be added as children of a domain local group (that guards access to SQL Server). This would enable you to add a domain local group as a SQL Server login. In Cloud SQL for SQL Server, you can enable similar capabilities, as described in this section.
Option 1: Add user accounts and groups as logins to SQL Server
If you have multiple domains, in multiple forests, and you have multiple global groups, you can add all of the individual user accounts, and the global and universal groups, directly as logins to SQL Server. As an example of Option 1, see the following diagram:
Option 2: Define a universal group in one of your domains
If your domains are in the same forest, you can define a universal group in one of your domains. Then you can add all of the individual user accounts, and the global and universal groups, as children of that defined universal group, and add the defined universal group as a SQL Server login. As an example of Option 2, see the following diagram:
Limitations and alternatives
The following limitations apply when integrating with Managed Microsoft AD:
- Domain local groups are not supported, but you can add global groups or individual user logins directly in SQL Server. Alternatively, you can use universal groups when all groups and users belong to the same forest.
- In general, new users created through the Google Cloud console are assigned the
CustomerDbRootRole
role, which has this SQL Server Agent fixed database role:SQLAgentUserRole
. However, users created through SQL Server directly, such as Managed Microsoft AD users, cannot be granted this role, or use SQL Server Agent, because the MSDB database where this role must be granted is protected. - Some restricted operations may result in the following error: "Could not obtain information about Windows NT group/user". One example of this type of restricted operation is creating logins by users from domains that are connected through a trust relationship. Another example is granting privileges to users from domains that are connected through a trust relationship. In these cases, retrying the operation is often successful. If retrying fails, close the connection and open a new connection.
- Fully qualified domain names (FQDNs) aren't supported by SQL Server on
Windows. Therefore, use domain names (short names), rather than FQDNs, when
you create SQL Server logins. For example, if your domain name is
ad.mydomain.com
, then create SQL Server logins forad\user
, rather than forad.mydomain.com\user
. - To access SQL Server instances, always use FQDNs. For example, you could
use an FQDN similar to
private.myinstance.us-central1.myproject.cloudsql.mydomain.com
. Netbios names aren't supported, nor are any short names if DNS suffixes are omitted. - SQL Server logins based on Active Directory users and groups cannot be managed from the Google Cloud console.
- In Cloud SQL, if a SQL Server instance was created on or before March 12, 2021, it cannot be integrated with Managed Microsoft AD.
- Windows Authentication won't work with an external trust. The error might be the following: "The target principal name is incorrect. Cannot generate SSPI context." Additionally, as related to Microsoft's recommendations, use a forest trust instead of an external trust for Kerberos authentication.
Unsupported for integration
The following features are unsupported when integrating with Managed Microsoft AD:
- Domain local groups.
- Dropping SQL Server logins by users from domains that are connected through
a trust relationship. You can do this operation with a user from your
managed domain, or through the
sqlserver
login. - NTLM authentication.
- Login with an IP address from domains connected through a trust relationship.
- Instances with long names (more than 63 characters).
What's next
- Review the Quickstart for creating a Managed Microsoft AD domain.
- Prepare to create an integrated Cloud SQL instance.
- Learn how to create a trust relationship between on-premises domains and a Managed Microsoft AD domain.
- Review how to view integrated instances.