Skip to content

Commit 019e901

Browse files
committed
edits
1 parent 55e5547 commit 019e901

File tree

2 files changed

+5
-6
lines changed

2 files changed

+5
-6
lines changed

articles/storage/files/storage-files-identity-auth-azure-active-directory-enable.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ To enable Azure AD Kerberos authentication using the [Azure portal](https://port
6767

6868
:::image type="content" source="media/storage-files-identity-auth-azure-active-directory-enable/enable-azure-ad-kerberos.png" alt-text="Screenshot of the Azure portal showing Active Directory configuration settings for a storage account. Azure AD Kerberos is selected." lightbox="media/storage-files-identity-auth-azure-active-directory-enable/enable-azure-ad-kerberos.png" border="true":::
6969

70-
1. Optional: If you want to configure directory and file-level permissions through Windows File Explorer, then you also need to specify the domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlets from an on-premises AD-joined client:
70+
1. **Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, then you also need to specify the domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlets from an on-premises AD-joined client:
7171

7272
```PowerShell
7373
$domainInformation = Get-ADDomain
@@ -87,7 +87,7 @@ To enable Azure AD Kerberos using Azure PowerShell, run the following command. R
8787
Set-AzStorageAccount -ResourceGroupName <resourceGroupName> -StorageAccountName <storageAccountName> -EnableAzureActiveDirectoryKerberosForFile $true
8888
```
8989

90-
Optional: If you want to configure directory and file-level permissions through Windows File Explorer, then you also need to specify the domain name and domain GUID for your on-premises AD. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need line-of-sight to the on-premises AD.
90+
**Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, then you also need to specify the domain name and domain GUID for your on-premises AD. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need line-of-sight to the on-premises AD.
9191

9292
You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlets from an on-premises AD-joined client:
9393

@@ -111,7 +111,7 @@ To enable Azure AD Kerberos using Azure CLI, run the following command. Remember
111111
az storage account update --name <storageaccountname> --resource-group <resourcegroupname> --enable-files-aadkerb true
112112
```
113113

114-
Optional: If you want to configure directory and file-level permissions through Windows File Explorer, then you also need to specify the domain name and domain GUID for your on-premises AD. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need line-of-sight to the on-premises AD.
114+
**Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, then you also need to specify the domain name and domain GUID for your on-premises AD. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need line-of-sight to the on-premises AD.
115115

116116
You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlets from an on-premises AD-joined client:
117117

@@ -225,6 +225,5 @@ For more information, see these resources:
225225

226226
- [Potential errors when enabling Azure AD Kerberos authentication for hybrid users](storage-troubleshoot-windows-file-connection-problems.md#potential-errors-when-enabling-azure-ad-kerberos-authentication-for-hybrid-users)
227227
- [Overview of Azure Files identity-based authentication support for SMB access](storage-files-active-directory-overview.md)
228-
- [Enable AD DS authentication to Azure file shares](storage-files-identity-ad-ds-enable.md)
229228
- [Create a profile container with Azure Files and Azure Active Directory](../../virtual-desktop/create-profile-container-azure-ad.md)
230229
- [FAQ](storage-files-faq.md)

includes/storage-files-aad-auth-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: khdownie
66
ms.service: storage
77
ms.topic: include
8-
ms.date: 10/03/2022
8+
ms.date: 11/04/2022
99
ms.author: kendownie
1010
ms.custom: include file
1111
---
@@ -14,4 +14,4 @@ Azure Files supports identity-based authentication over Server Message Block (SM
1414

1515
- On-premises Active Directory Domain Services (AD DS)
1616
- Azure Active Directory Domain Services (Azure AD DS)
17-
- Azure Active Directory Kerberos (Azure AD) for hybrid user identities only (preview)
17+
- Azure Active Directory (Azure AD) Kerberos for hybrid user identities

0 commit comments

Comments
 (0)