You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Get answers to Azure Files frequently asked questions. You can mount Azure file shares concurrently on cloud or on-premises Windows, Linux, or macOS deployments.
4
4
author: khdownie
5
5
ms.service: storage
6
-
ms.date: 02/03/2023
6
+
ms.date: 02/16/2023
7
7
ms.author: kendownie
8
8
ms.subservice: files
9
9
ms.topic: conceptual
@@ -16,7 +16,7 @@ ms.topic: conceptual
16
16
17
17
* <aid="cross-domain-sync"></a>
18
18
**Can I have domain-joined and non-domain-joined servers in the same sync group?**
19
-
Yes. A sync group can contain server endpoints that have different Active Directory memberships, even if they are not domain-joined. Although this configuration technically works, we do not recommend this as a typical configuration because access control lists (ACLs) that are defined for files and folders on one server might not be able to be enforced by other servers in the sync group. For best results, we recommend syncing between servers that are in the same Active Directory forest, between servers that are in different Active Directory forests but have established trust relationships, or between servers that aren't in a domain. We recommend that you avoid using a mix of these configurations.
19
+
Yes. A sync group can contain server endpoints that have different Active Directory memberships, even if they are not domain-joined. Although this configuration technically works, we do not recommend this as a typical configuration because access control lists (ACLs) that are defined for files and folders on one server might not be able to be enforced by other servers in the sync group. For best results, we recommend syncing between servers that are in the same Active Directory forest, between servers that are in different Active Directory forests but have [established trust relationships](storage-files-identity-multiple-forests.md#how-forest-trust-relationships-work), or between servers that aren't in a domain. We recommend that you avoid using a mix of these configurations.
20
20
21
21
* <aid="afs-change-detection"></a>
22
22
**I created a file directly in my Azure file share by using SMB or in the portal. How long does it take for the file to sync to the servers in the sync group?**
@@ -113,34 +113,12 @@ ms.topic: conceptual
113
113
* <aid="ad-multiple-forest"></a>
114
114
**Does on-premises AD DS authentication for Azure file shares support integration with an AD DS environment using multiple forests?**
115
115
116
-
Azure Files on-premises AD DS authentication only integrates with the forest of the domain service that the storage account is registered to. To support authentication from another forest, your environment must have a forest trust configured correctly.
116
+
Azure Files on-premises AD DS authentication only integrates with the forest of the domain service that the storage account is registered to. To support authentication from another forest, your environment must have a forest trust configured correctly. For detailed instructions, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
117
117
118
118
> [!Note]
119
119
> In a multi-forest setup, don't use Windows Explorer to configure Windows ACLs/NTFS permissions at the root, directory, or file level. [Use icacls](storage-files-identity-ad-ds-configure-permissions.md#configure-windows-acls-with-icacls) instead.
120
120
121
-
The way Azure Files register in AD DS almost the same as a regular file server, where it creates an identity (computer or service logon account) in AD DS for authentication. The only difference is that the registered SPN of the storage account ends with "file.core.windows.net" which does not match with the domain suffix. Consult your domain administrator to see if any update to your suffix routing policy is required to enable multiple forest authentication due to the different domain suffix. We provide an example below to configure suffix routing policy.
122
-
123
-
Example: When users in forest A domain want to reach a file share with the storage account registered against a domain in forest B, this won't automatically work because the service principal of the storage account doesn't have a suffix matching the suffix of any domain in forest A. We can address this issue by manually configuring a suffix routing rule from forest A to forest B for a custom suffix of "file.core.windows.net".
124
-
125
-
First, you must add a new custom suffix on forest B. Make sure you have the appropriate administrative permissions to change the configuration, then follow these steps:
126
-
127
-
1. Logon to a machine domain joined to forest B.
128
-
2. Open up the **Active Directory Domains and Trusts** console.
129
-
3. Right-click on **Active Directory Domains and Trusts**.
130
-
4. Select **Properties**.
131
-
5. Select **Add**.
132
-
6. Add "file.core.windows.net" as the UPN Suffixes.
133
-
7. Select **Apply**, then **OK** to close the wizard.
134
-
135
-
Next, add the suffix routing rule on forest A, so that it redirects to forest B.
136
-
137
-
1. Logon to a machine domain joined to forest A.
138
-
2. Open up "Active Directory Domains and Trusts" console.
139
-
3. Right-click on the domain that you want to access the file share, then select the **Trusts** tab and select forest B domain from outgoing trusts. If you haven't configured trust between the two forests, you need to set up the trust first.
140
-
4. Select **Properties** and then **Name Suffix Routing**
141
-
5. Check if the "*.file.core.windows.net" suffix shows up. If not, click **Refresh**.
142
-
6. Select "*.file.core.windows.net", then select **Enable** and **Apply**.
143
-
121
+
144
122
* <aid="ad-aad-smb-files"></a>
145
123
**Is there any difference in creating a computer account or service logon account to represent my storage account in AD?**
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-ad-ds-enable.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ recommendations: false
16
16
This article describes the process for enabling Active Directory Domain Services (AD DS) authentication on your storage account in order to use on-premises Active Directory (AD) credentials for authenticating to Azure file shares.
17
17
18
18
> [!IMPORTANT]
19
-
> Before you enable AD DS authentication, make sure you understand the supported scenarios and requirements in the [overview article](storage-files-identity-auth-active-directory-enable.md) and complete the necessary [prerequisites](storage-files-identity-auth-active-directory-enable.md#prerequisites).
19
+
> Before you enable AD DS authentication, make sure you understand the supported scenarios and requirements in the [overview article](storage-files-identity-auth-active-directory-enable.md) and complete the necessary [prerequisites](storage-files-identity-auth-active-directory-enable.md#prerequisites). If your Active Directory environment spans multiple forests, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
20
20
21
21
To enable AD DS authentication over SMB for Azure file shares, you need to register your Azure storage account with your on-premises AD DS and then set the required domain properties on the storage account. To register your storage account with AD DS, you create a computer account (or service logon account) representing it in your AD DS. Think of this process as if it were like creating an account representing an on-premises Windows file server in your AD DS. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account.
0 commit comments