Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 1 question 68 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 68
Topic #: 1
[All Professional Cloud Architect Questions]

Your company wants to start using Google Cloud resources but wants to retain their on-premises Active Directory domain controller for identity management.
What should you do?

  • A. Use the Admin Directory API to authenticate against the Active Directory domain controller.
  • B. Use Google Cloud Directory Sync to synchronize Active Directory usernames with cloud identities and configure SAML SSO.
  • C. Use Cloud Identity-Aware Proxy configured to use the on-premises Active Directory domain controller as an identity provider.
  • D. Use Compute Engine to create an Active Directory (AD) domain controller that is a replica of the on-premises AD domain controller using Google Cloud Directory Sync.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
KouShikyou
Highly Voted 5 years, 1 month ago
According to the reference, my understanding is B is correct. And in the document(https://cloud.google.com/iap/docs/concepts-overview), it says: If you need to create Google Accounts for your existing users, you can use Google Cloud Directory Sync to synchronize with your Active Directory or LDAP server. Is it possible to explain why correct answer is C?
upvoted 44 times
MikeB19
3 years, 2 months ago
It’s simple. Domain controllers are not meant authenticate saas or web applications. This includes iam. Domain controllers speak ntlm and Kerberos. This why we use federation. Because web apps do not speak Kerberos or ntlm. They speak languages such oauth. Hence the need for ad federation proxy B is correct
upvoted 5 times
Bill831231
3 years, 1 month ago
thanks for the explanation, may I ask if we go with SAML, why need sync the useraccount? seems we just need set up the federation between cloud and on-premise
upvoted 2 times
Ekramy_Elnaggar
2 days, 2 hours ago
if not, you will not be able to access resources on GCP with same accounts as onprem.
upvoted 1 times
...
BiddlyBdoyng
2 years, 1 month ago
"...As a prerequisite for access to GCP resources, employees must have a Google identity set up..."
upvoted 4 times
...
...
...
tartar
4 years, 3 months ago
B is ok
upvoted 9 times
...
kumarp6
4 years ago
B should be correct
upvoted 5 times
...
nitinz
3 years, 8 months ago
B, use GCDS.
upvoted 5 times
...
...
MeasService
Highly Voted 5 years, 1 month ago
B is the nearest answer I feel !
upvoted 25 times
...
eff12c1
Most Recent 5 months, 3 weeks ago
Selected Answer: B
To integrate Google Cloud with your on-premises Active Directory (AD) domain controller for identity management while retaining your on-premises AD, the best approach is: B. Use Google Cloud Directory Sync to synchronize Active Directory usernames with cloud identities and configure SAML SSO.
upvoted 1 times
...
svkds
6 months, 2 weeks ago
Selected Answer: D
The most suitable option for integrating Google Cloud resources with an on-premises Active Directory domain controller for identity management is option D. This involves creating a replica of the on-premises Active Directory domain controller using Compute Engine and Google Cloud Directory Sync for synchronization.
upvoted 1 times
...
LaxmanTiwari
1 year, 6 months ago
B is correct https://cloud.google.com/architecture/identity/federating-gcp-with-active-directory-introduction
upvoted 2 times
...
vamgcp
1 year, 9 months ago
Connect your on-premises Active Directory to Google Cloud: You can use Google Cloud Directory Sync (GCDS) to synchronize your on-premises Active Directory with Google Cloud. This allows you to use your existing Active Directory users and groups in Google Cloud. Set up single sign-on (SSO): You can use Google Cloud Identity-Aware Proxy (IAP) to set up SSO for your Google Cloud resources. IAP integrates with your on-premises Active Directory and allows users to log in to Google Cloud using their existing Active Directory credentials.
upvoted 2 times
...
omermahgoub
1 year, 11 months ago
B. Use Google Cloud Directory Sync to synchronize Active Directory usernames with cloud identities and configure SAML SSO. To retain their on-premises Active Directory domain controller for identity management while using Google Cloud resources, the company can use Google Cloud Directory Sync to synchronize Active Directory usernames with cloud identities and configure SAML single sign-on (SSO). This will allow users to use their existing Active Directory credentials to access Google Cloud resources, while still maintaining their on-premises Active Directory domain controller as the primary source of identity management.
upvoted 7 times
omermahgoub
1 year, 11 months ago
Option A, using the Admin Directory API to authenticate against the Active Directory domain controller, would not be a suitable solution because it would require implementing custom authentication logic in the application, which would be time-consuming and error-prone. Option C, using Cloud Identity-Aware Proxy configured to use the on-premises Active Directory domain controller as an identity provider, would be a suitable solution, but it would not allow you to synchronize Active Directory usernames with cloud identities. Option D, using Compute Engine to create an Active Directory (AD) domain controller that is a replica of the on-premises AD domain controller using Google Cloud Directory Sync, would not be a suitable solution because it would require setting up and maintaining an additional AD domain controller in Google Cloud, which would be unnecessary if the company wants to retain their on-premises AD domain controller as the primary source of identity management.
upvoted 3 times
...
...
SureshbabuK
1 year, 11 months ago
Selected Answer: B
GCDS and Cloud Identity is provided exactly for this use case
upvoted 1 times
...
megumin
2 years ago
Selected Answer: B
B is ok
upvoted 2 times
...
Mahmoud_E
2 years, 1 month ago
Selected Answer: B
B is correct https://cloud.google.com/architecture/identity/federating-gcp-with-active-directory-introduction
upvoted 2 times
...
cbarg
2 years, 4 months ago
Selected Answer: B
Answer is B
upvoted 1 times
...
SAMBIT
2 years, 8 months ago
https://support.google.com/a/answer/106368?hl=en
upvoted 1 times
...
haroldbenites
2 years, 11 months ago
Go for B. Cloud Directory Sync https://cloud.google.com/blog/products/identity-security/using-your-existing-identity-management-system-with-google-cloud-platform
upvoted 4 times
...
vincy2202
2 years, 11 months ago
B is the correct answer
upvoted 1 times
...
pulkit0627
3 years ago
B as AD groups are directly mapped to Cloud Directory Sync
upvoted 1 times
...
MaxNRG
3 years ago
B – use Google Cloud Directory Sync to sync Active Directory user names with cloud identities and configure SAML SSO. Check the flowchart here illustrating integration of your existing identity management system into GCP: https://cloud.google.com/blog/products/identity-security/using-your-existing-identity-management-system-with-google-cloud-platform C – does not work, since Cloud IAP serves different purpose. It s a building block toward BeyondCorp, an enterprise security model that enables every employee to work from untrusted networks without the use of a VPN.
upvoted 2 times
...
MamthaSJ
3 years, 4 months ago
Answer is B
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...