What do I have to enter into the active directory authentication settings of my NAS to get it to work with Active Directory server authentication?

Joining a NAS to AD

To integrate a Network Attaced Storage (NAS)—such as a NAS device (e.g., Synology, QNAP, NetApp)—with Active Directory (AD) authentication, you’ll typically need to enter several key details in the Active Directory authentication settings panel of the NA.

Here’s what you usually need to enter:


🔑 Required Fields to Join Active Directory

  1. Domain Name (or Full Domain Name)
    • Format: corp.example.com or just example.com
    • This is your AD domain, not the NetBIOS name.
  2. Domain NetBIOS Name (sometimes optional, but good to provide)
    • Format: EXAMPLE
    • This is the short name of your AD domain (used in EXAMPLE\username format).
  3. Domain Controller (DC) Hostname or IP Address
    • e.g., dc1.corp.example.com or 192.168.1.10
    • Some systems auto-discover via DNS, but manual entry can prevent issues.
  4. Organizational Unit (OU) (optional, but recommended if you want to scope machine accounts)
    • Format: OU=NAS,OU=Servers,DC=corp,DC=example,DC=com
    • This ensures the NAS joins to the correct part of the AD tree.
  5. Username and Password of AD Account with Join Rights
  6. Workgroup Name (only required for older systems or when not joining a domain)
    • Usually matches the NetBIOS name.

đź§  Additional Required Considerations

  • Time Sync: Your NAS must have correct time and match the AD DC’s time (within 5 minutes), or Kerberos auth will fail.
  • DNS: Ensure the NAS uses the AD DNS server (typically your DC) and not an external one.
  • Hostname: Give your NAS a static and valid hostname before joining AD.

đź›  Example Settings

SettingExample
Domain Namecorp.example.com
Domain NetBIOS NameCORP
Domain Controller Address192.168.0.10
Admin UsernameCORP\Administrator
Admin Password********
OUOU=NAS,OU=Servers,DC=corp,DC=example,DC=com
DNS Server192.168.0.10 (same as DC)

If your NAS still fails to join, check the logs for:

  • KRB5KDC_ERR_PREAUTH_FAILED (Kerberos error → time or password issue)
  • DNS_ERROR_BAD_KEY (→ DNS misconfigured or no SRV records)
  • LDAP bind failed (→ username/password wrong or permission issue)

For Example Domain ‘sircles.net’

Thanks, Simon — with sircles.net as your domain, here’s exactly what you should enter into your NAS Active Directory authentication settings to get it working:


âś… Active Directory Authentication Settings (for domain sircles.net)

FieldValue or FormatNotes
Domain Name / Full Domainsircles.netThis is your AD DNS name.
NetBIOS Domain NameSIRCLES (you can confirm by running echo %USERDOMAIN% on a domain-joined PC)Often just the uppercase of your domain prefix, but confirm.
Domain Controller (DC)e.g., dc1.sircles.net or IP 192.168.1.XUse IP if DNS SRV records are unreliable.
Admin UsernameSIRCLES\Administrator or [email protected]Must have permission to join machines to domain.
Admin Password••••••••Use the domain admin or a delegated user account.
Organizational Unit (OU)Optional: OU=Servers,DC=sircles,DC=netIf left blank, the NAS will be added to the default Computers container.
DNS Server192.168.1.X (same as your AD DC)This is critical — don’t use Google DNS or anything external.
Time server / NTP192.168.1.X (or same as DC)Clock must be in sync with AD (±5 mins for Kerberos).

đź”§ Tips for Smooth Integration

  • Give the NAS a fixed IP and set the hostname to something meaningful before joining AD.
  • Check DNS: nslookup _ldap._tcp.dc._msdcs.sircles.net — this should return your DC(s).
  • Make sure ports are open:
    • TCP 88 (Kerberos)
    • TCP/UDP 389 (LDAP)
    • TCP 445 (SMB)
    • TCP 135 + dynamic RPC range (135 + 49152–65535 usually)

đź§Ş Troubleshooting Checklist

  • ❌ “Incorrect credentials” – Double-check domain format: use SIRCLES\Administrator not just Administrator
  • ❌ “Cannot find domain” – Check NAS is pointing to your AD DNS
  • ❌ “Clock skew/Kerberos error” – Set NTP to same server as DC
  • ❌ “OU not found” – Check spelling/case in the Distinguished Name (DN) format

Let us know your NAS brand (e.g., Synology, NetApp) and I’ll give you screenshots or command line equivalents for more direct setup steps.

It says ‘specified OU does not exist in domain’

Perfect — let’s fix that “Specified OU does not exist in domain” error with precision and no fluff.

This means the Organizational Unit (OU) you entered isn’t being found exactly as typed. Active Directory is case-sensitive for distinguished names and very picky about syntax. Let’s walk through fixing it.


âś… Step-by-Step to Get the Correct OU Format

âś… Option 1: Use Active Directory Users and Computers (ADUC)

  1. Open ADUC on a domain-joined Windows machine.
  2. Navigate to the OU where you want the NAS to be added.
  3. Right-click the OU → Properties → Attribute Editor tab.
  4. Look for distinguishedName — copy the full value exactly. Example: OU=NAS,OU=Servers,DC=sircles,DC=net Or: OU=NetworkAppliances,DC=sircles,DC=net

âś… Option 2: Use PowerShell

On your AD server or any domain-joined workstation with RSAT tools installed:

Get-ADOrganizationalUnit -Filter * | Select-Object Name, DistinguishedName

This will list all available OUs and their correct DN format.


đź’ˇ Common Pitfalls

MistakeExample Fix
Wrong caseUse OU=NAS, not ou=nas
Typo in OU nameConfirm exact spelling/casing
Using container, not OUYou can’t use the default CN=Computers,... container
Escaping not neededDon’t escape commas or special characters manually unless they’re literal

🚀 Safe Shortcut (for testing)

If you’re not fussed about where the NAS account ends up for now, leave the OU field blank — it will default to:

CN=Computers,DC=sircles,DC=net

You can move the computer account later in ADUC.


Let me know the OU you’re trying to use, and I’ll write out the exact DN for you.

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *