Skip to content

Commit 04a7aee

Browse files
Merge pull request #302536 from b-ahibbard/7-10
ad encryption & audit aces
2 parents 665c4ab + 833e92a commit 04a7aee

File tree

4 files changed

+58
-47
lines changed

4 files changed

+58
-47
lines changed

articles/azure-netapp-files/configure-access-control-lists.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure access control lists (ACLs) on NFSv4.1 with
44
author: b-ahibbard
55
ms.service: azure-netapp-files
66
ms.topic: how-to
7-
ms.date: 12/20/2024
7+
ms.date: 07/10/2025
88
ms.author: anfdocs
99
# Customer intent: "As a system administrator, I want to configure access control lists on NFSv4.1 volumes in Azure NetApp Files, so that I can manage fine-grained file permissions for users and groups to enhance security and control over shared resources."
1010
---
@@ -24,7 +24,7 @@ To learn more about ACLs in Azure NetApp Files, see [Understand NFSv4.x ACLs](nf
2424
1. `nfs-utils` to mount NFS volumes
2525
1. `nfs-acl-tools` to view and modify NFSv4 ACLs.
2626
If you do not have either, install them:
27-
- On a Red Hat Enterprise Linux or SuSE Linux instance:
27+
- On a Red Hat Enterprise Linux or SUSE Linux instance:
2828
```bash
2929
sudo yum install -y nfs-utils
3030
sudo yum install -y nfs4-acl-tools
@@ -48,17 +48,22 @@ To learn more about ACLs in Azure NetApp Files, see [Understand NFSv4.x ACLs](nf
4848
- `A:g:GROUP@:rwaDxtTnNcy` - group has full (RWX) access
4949
- `A::EVERYONE@:tcy` - everyone else has no access
5050

51-
1. To modify an ACE for a user, use the `nfs4_setfacl` command: `nfs4_setfacl -a|x A|D::<user|group>:<permissions_alias> <file>`
51+
1. To modify an ACE for a user, use the `nfs4_setfacl` command: `nfs4_setfacl -a|x A|D|U::<user|group>:<permissions_alias> <file>`
52+
5253
- Use `-a` to add permission. Use `-x` to remove permission.
53-
- `A` creates access; `D` denies access.
54+
- `A` creates access; `D` denies access. `U:` is used for audit ACEs to log access attempts.
5455
- In an Active Directory-joined set up, enter an email address for the user. Otherwise, enter the numerical user ID.
55-
- Permission aliases include read, write, append, execute, etc.
56+
- Permission aliases include read, write, append, execute, and others. For a full list of permissions, see: [NFSv4.x permissions](nfs-access-control-lists.md#nfsv4x-permissions).
5657
In the following Active Directory-joined example, user [email protected] is given read, write, and execute access to `/nfsldap/engineering`:
5758
```bash
5859
nfs4_setfacl -a A::[email protected]:RWX /nfsldap/engineering
5960
```
6061

62+
- If you're configuring an ACE for [file access logs](manage-file-access-logs.md), you must use the `U:` prefix to denote the ACE is an audit ACE. The following example configures an audit log for everyone for successful and failed access attempts:
63+
`nfs4_setfacl -a U:fdiSF:EVERYONE@:rwaDdxtTnNcCoy /<mount_point>`
64+
65+
6166
## Next steps
6267
6368
* [Configure NFS clients](configure-nfs-clients.md)
64-
* [Understand NFSv4.x ACLs](nfs-access-control-lists.md).
69+
* [Understand NFSv4.x ACLs](nfs-access-control-lists.md)

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 23 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: b-hchen
66
ms.service: azure-netapp-files
77
ms.custom: devx-track-azurepowershell
88
ms.topic: how-to
9-
ms.date: 05/09/2025
9+
ms.date: 07/10/2025
1010
ms.author: anfdocs
1111
# Customer intent: As an Azure NetApp Files administrator, I want to create and manage Active Directory connections, so that I can enable proper authentication and access control for my SMB and NFS volumes.
1212
---
@@ -19,7 +19,7 @@ Several features of Azure NetApp Files require that you have an Active Directory
1919
> [!IMPORTANT]
2020
> You must follow guidelines described in [Understand guidelines for Active Directory Domain Services site design and planning for Azure NetApp Files](understand-guidelines-active-directory-domain-service-site.md) for Active Directory Domain Services (AD DS) or Microsoft Entra Domain Services used with Azure NetApp Files.
2121
>
22-
> Before creating the AD connection, review [Modify Active Directory connections for Azure NetApp Files](modify-active-directory-connections.md) to understand the impact of making changes to the AD connection configuration options after the AD connection has been created. Changes to the AD connection configuration options are disruptive to client access and some options cannot be changed at all.
22+
> Before creating the AD connection, review [Modify Active Directory connections for Azure NetApp Files](modify-active-directory-connections.md) to understand the impact of making changes to the AD connection configuration options after the AD connection has been created. Changes to the AD connection configuration options are disruptive to client access and some options can't be changed at all.
2323
2424
* An Azure NetApp Files account must be created in the region where the Azure NetApp Files volumes are to be deployed.
2525

@@ -28,10 +28,23 @@ Several features of Azure NetApp Files require that you have an Active Directory
2828
* The Azure NetApp Files AD connection admin account must have the following properties:
2929
* It must be an AD DS domain user account in the same domain where the Azure NetApp Files computer accounts are created.
3030
* It must have the permission to create computer accounts (for example, AD domain join) in the AD DS organizational unit path specified in the **Organizational unit path option** of the AD connection.
31-
* It cannot be a [Group Managed Service Account](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview).
31+
* It can't be a [Group Managed Service Account](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview).
3232

3333
* The AD connection admin account supports Kerberos AES-128 and Kerberos AES-256 encryption types for authentication with AD DS for Azure NetApp Files computer account creation (for example, AD domain join operations).
3434

35+
* To enable AES encryption, you should first enable AES-128, AES-256, RC4, and DES encryption types on Active Directory (AD) then enable AES on the control plane. You must enable encryption in Active Directory first.
36+
37+
* To enable AES encryption support for the admin account in the AD connection, run the following Active Directory PowerShell commands:
38+
39+
```powershell
40+
Get-ADUser -Identity <ANF AD connection account username>
41+
Set-ADUser -KerberosEncryptionType <encryption_type>
42+
```
43+
44+
`KerberosEncryptionType` is a multivalued parameter that supports the values DES, RC4, AES-128, and AES-256.
45+
46+
For more information, refer to the [Set-ADUser documentation](/powershell/module/activedirectory/set-aduser).
47+
3548
* To enable the AES encryption on the Azure NetApp Files AD connection admin account, you must use an AD domain user account that is a member of one of the following AD DS groups:
3649
3750
* Domain Admins
@@ -42,21 +55,10 @@ Several features of Azure NetApp Files require that you have an Active Directory
4255
* Alternatively, an AD domain user account with `msDS-SupportedEncryptionTypes` write permission on the AD connection admin account can also be used to set the Kerberos encryption type property on the AD connection admin account.
4356
4457
>[!NOTE]
45-
>When you modify the setting to enable AES on the AD connection admin account, it is a best practice to use a user account that has write permission to the AD object that is not the Azure NetApp Files AD admin. You can do so with another domain admin account or by delegating control to an account. For more information, see [Delegating Administration by Using OU Objects](/windows-server/identity/ad-ds/plan/delegating-administration-by-using-ou-objects).
58+
>When you modify the setting to enable AES on the AD connection admin account, it's a best practice to use a user account that has write permission to the AD object that is not the Azure NetApp Files AD admin. You can do so with another domain admin account or by delegating control to an account. For more information, see [Delegating Administration by Using OU Objects](/windows-server/identity/ad-ds/plan/delegating-administration-by-using-ou-objects).
4659
4760
If you set both AES-128 and AES-256 Kerberos encryption on the admin account of the AD connection, the Windows client negotiates the highest level of encryption supported by your AD DS. For example, if both AES-128 and AES-256 are supported, and the client supports AES-256, then AES-256 will be used.
4861
49-
* To enable AES encryption support for the admin account in the AD connection, run the following Active Directory PowerShell commands:
50-
51-
```powershell
52-
Get-ADUser -Identity <ANF AD connection account username>
53-
Set-ADUser -KerberosEncryptionType <encryption_type>
54-
```
55-
56-
`KerberosEncryptionType` is a multivalued parameter that supports AES-128 and AES-256 values.
57-
58-
For more information, refer to the [Set-ADUser documentation](/powershell/module/activedirectory/set-aduser).
59-
6062
* If you have a requirement to enable and disable certain Kerberos encryption types for Active Directory computer accounts for domain-joined Windows hosts used with Azure NetApp Files, you must use the Group Policy `Network Security: Configure Encryption types allowed for Kerberos`.
6163
6264
Do not set the registry key `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\SupportedEncryptionTypes`. Doing this will break Kerberos authentication with Azure NetApp Files for the Windows host where this registry key was manually set.
@@ -68,11 +70,11 @@ Several features of Azure NetApp Files require that you have an Active Directory
6870
6971
* LDAP queries take effect only in the domain specified in the Active Directory connections (the **AD DNS Domain Name** field). This behavior applies to NFS, SMB, and dual-protocol volumes.
7072
71-
* <a name="ldap-query-timeouts"></a> LDAP query time outs
73+
* <a name="ldap-query-timeouts"></a> LDAP query timeouts
7274
73-
By default, LDAP queries time out if they cannot be completed in a timely fashion. If an LDAP query fails due to a time out, the user and/or group lookup will fail and access to the Azure NetApp Files volume may be denied, depending on the permission settings of the volume.
75+
By default, LDAP queries timeout if they can't be completed in a timely fashion. If an LDAP query fails due to a timeout, the user and/or group lookup will fail and access to the Azure NetApp Files volume may be denied, depending on the permission settings of the volume.
7476
75-
Query time outs can occur in large LDAP environments with many user and group objects, over slow WAN connections, and if an LDAP server is over-utilized with requests. Azure NetApp Files time-out setting for LDAP queries is set to 10 seconds. Consider leveraging the user and group DN features on the Active Directory Connection for the LDAP server to filter searches if you're experiencing LDAP query time-out issues.
77+
Query timeouts can occur in large LDAP environments with many user and group objects, over slow WAN connections, and if an LDAP server is over-utilized with requests. Azure NetApp Files time-out setting for LDAP queries is set to 10 seconds. Consider leveraging the user and group DN features on the Active Directory Connection for the LDAP server to filter searches if you're experiencing LDAP query time-out issues.
7678
7779
## NetApp accounts and Active Directory type
7880
@@ -124,7 +126,7 @@ For more information about the relationship between NetApp accounts and subscrip
124126
Azure NetApp Files will create additional computer accounts in AD DS as needed.
125127
126128
>[!IMPORTANT]
127-
>Renaming the SMB server prefix after you create the Active Directory connection is disruptive. You will need to re-mount existing SMB shares after renaming the SMB server prefix.
129+
>Renaming the SMB server prefix after you create the Active Directory connection is disruptive. You need to re-mount existing SMB shares after renaming the SMB server prefix.
128130
129131
* **Organizational unit path**
130132
This is the LDAP path for the organizational unit (OU) where SMB server computer accounts will be created. That is, `OU=second level, OU=first level`. For example, if you want to use an OU called `ANF` created at the root of the domain, the value would be `OU=ANF`.
@@ -234,11 +236,11 @@ For more information about the relationship between NetApp accounts and subscrip
234236
This feature is used for installing SQL Server in certain scenarios where a non-administrator AD DS domain account must temporarily be granted elevated security privilege.
235237
236238
>[!NOTE]
237-
> Using the Security privilege users feature relies on the [SMB Continuous Availability Shares feature](azure-netapp-files-create-volumes-smb.md#continuous-availability). SMB Continuous Availability is **not** supported on custom applications. It is only supported for workloads using Citrix App Layering, [FSLogix user profile containers](/azure/virtual-desktop/create-fslogix-profile-container), and Microsoft SQL Server (not Linux SQL Server).
239+
> Using the Security privilege users feature relies on the [SMB Continuous Availability Shares feature](azure-netapp-files-create-volumes-smb.md#continuous-availability). SMB Continuous Availability is **not** supported on custom applications. It's only supported for workloads using Citrix App Layering, [FSLogix user profile containers](/azure/virtual-desktop/create-fslogix-profile-container), and Microsoft SQL Server (not Linux SQL Server).
238240
239241
> [!IMPORTANT]
240242
> Using the **Security privilege users** feature requires that you submit a waitlist request through the **[Azure NetApp Files SMB Continuous Availability Shares Public Preview waitlist submission page](https://aka.ms/anfsmbcasharespreviewsignup)**. Wait for an official confirmation email from the Azure NetApp Files team before using this feature.
241-
>This feature is optional and supported only with SQL server. The AD DS domain account used for installing SQL server must already exist before you add it to the **Security privilege users** option. When you add the SQL Server installer account to **Security privilege users** option, the Azure NetApp Files service might validate the account by contacting an AD DS domain controller. This action might fail if Azure NetApp Files cannot contact the AD DS domain controller.
243+
>This feature is optional and supported only with SQL server. The AD DS domain account used for installing SQL server must already exist before you add it to the **Security privilege users** option. When you add the SQL Server installer account to **Security privilege users** option, the Azure NetApp Files service might validate the account by contacting an AD DS domain controller. This action might fail if Azure NetApp Files can't contact the AD DS domain controller.
242244
243245
For more information about `SeSecurityPrivilege` and SQL Server, see [SQL Server installation fails if the Setup account doesn't have certain user rights](/troubleshoot/sql/install/installation-fails-if-remove-user-right).
244246

articles/azure-netapp-files/manage-file-access-logs.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 04/18/2025
8+
ms.date: 07/10/2025
99
ms.author: anfdocs
1010
ms.custom: references_regions
1111
# Customer intent: As a storage administrator, I want to enable file access logs on Azure NetApp Files volumes so that I can monitor file access operations and troubleshoot access issues effectively.
@@ -20,20 +20,24 @@ File access logs provide file access logging for individual volumes, capturing f
2020
>[!IMPORTANT]
2121
>The file access logs feature is only supported with SMB3, NFSv4.1, and dual-protocol volumes. It's not supported on NFSv3 volumes.
2222
23+
2324
* Once file access logs are enabled on a volume, they can take up to 75 minutes to become visible.
2425
* Each log entry consumes approximately 1 KB of space.
2526
* File access logs occasionally create duplicate log entries that must be filtered manually.
2627
* Deleting any diagnostic settings configured for `ANFFileAccess` causes any file access logs for any volume with that setting to become disabled. See the [diagnostic setting configuration](#diagnostic) for more information.
2728
* Before enabling file access logs on a volume, either [access control lists (ACLs)](configure-access-control-lists.md) or Audit access control entries (ACEs) need to be set on a file or directory. You must set ACLs or Audit ACEs after mounting a volume.
29+
>[!IMPORTANT]
30+
>For dual-protocol volumes using the NTFS security style, you must set Audit ACLs from a Windows machine. For dual-protocol volumes using UNIX security style, Audit ACLs must be set from a Linux machine.
2831
* Azure NetApp Files file access logs provide detailed information about successful and failed requests to the storage service. This information can be used to monitor individual requests and to diagnose file access issues. Requests are logged on a best-effort basis, meaning that most requests result in a log record, but the completeness and timeliness of file access logs aren't guaranteed. The Azure NetApp Files file access logs feature doesn't provide explicit or implicit expectations or guarantees around logging for auditing and compliance purposes.
2932

33+
3034
### Performance considerations
3135

3236
* All file access log file access events have a performance impact.
3337
* Events such as file/folder creation or deletion are key events to log.
3438
* System access control list (SACL) settings for logging should be used sparingly. Frequent operations (for example, READ or GET) can have significant performance impact, but have limited logging value. It's recommended that SACL setting not log these frequent operations to conserve performance.
3539
* SACL policy additions aren't currently supported with file access logs.
36-
* When clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate. 
40+
* With clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate. 
3741
* File access logs support a [log generation rate metric](azure-netapp-files-metrics.md). The log generation rate shouldn't exceed 64 MiB/minute.
3842

3943
If the rate of file access event generation exceeds 64 MiB/minute, the [Activity log](monitor-azure-netapp-files.md) sends a message stating that the rate of file access log generation is exceeding the limit. If log generation exceeds the limit, logging events can be delayed or dropped. If you're approaching this limit, disable noncritical auditing ACLs to reduce the event generation rate. As a precaution, you can [create an alert](/azure/azure-monitor/alerts/alerts-create-activity-log-alert-rule) for this event.
@@ -151,7 +155,7 @@ To enable logging access on individual files and directories, complete the follo
151155
152156
For NFSv4.1, both discretionary and system ACEs are stored in the same ACL, not separate discretionary ACLs and SACLs. Exercise caution when adding audit ACEs to an existing ACL to avoid overwriting and losing an existing ACL. The order in which you add audit ACEs to an existing ACL doesn't matter.
153157
154-
**For steps**, see [Configure access control lists on NFSv4.1 volumes](configure-access-control-lists.md).
158+
Whe configuring the Audit ACE, ensure you use the `U:` prefix to denote it's an Audit ACE. **For steps**, see [Configure access control lists on NFSv4.1 volumes](configure-access-control-lists.md).
155159
156160
---
157161

0 commit comments

Comments
 (0)