You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/kerberos.md
+55-54Lines changed: 55 additions & 54 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ The following table displays the amount of time a cache entry lives in an Azure
87
87
| Idle name server connections | 60 seconds |
88
88
| LDAP query timeout | 10 seconds |
89
89
| Local DNS host entry for KDC TTL | 24 hours |
90
-
| Kerberos ticket age | Specified by KDC* and/or client <br></br> *[Defaults to 10 hours](/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket#default-values) for Windows Active Directory KDCs |
90
+
| Kerberos ticket age | Specified by KDC* and/or client <br></br> *[Defaults to 10 hours](/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket#default-values) for Windows Active Directory KDCs |
91
91
| User credentials | 24 hours |
92
92
| Kerberos time skew | 5 minutes |
93
93
@@ -115,7 +115,7 @@ Key considerations for time sync issues:
115
115
-[Time skew errors can be seen in the event viewer](/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4768) on the KDC with the error KRB_AP_ERR_SKEW, as well as in packet captures.
116
116
-[Replay attack attempts get logged](/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4649) in the event viewer with KRB_AP_ERR_REPEAT.
117
117
118
-
For more information, see [Maximum tolerance for computer clock synchronization](/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization)
118
+
For more information, see [Maximum tolerance for computer clock synchronization](/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization)
119
119
120
120
### Domain Name Systems (DNS)
121
121
@@ -126,7 +126,7 @@ In Windows SMB environments, a backup authentication method may be tried (such a
126
126
In addition to SPN resolution, DNS is heavily utilized to resolve hostnames and IP addresses for domain services, such as LDAP, Kerberos KDCs, etc. via SRV records. For more detailed information on DNS in Azure NetApp Files (including what SRV records are required), see [About DNS in Azure NetApp Files](domain-name-system-concept.md).
127
127
128
128
>[!NOTE]
129
-
>If an IP address is used for Kerberos access, the behavior depends on the NAS protocol (NFS or SMB) in use. See [IP addresses for access with Kerberos](LINK)for more information.
129
+
>If an IP address is used for Kerberos access, the behavior depends on the NAS protocol (NFS or SMB) in use. For more information, see [IP addresses for access with Kerberos](#ip-addresses-for-access-with-kerberos).
130
130
131
131
### Lightweight directory access protocol
132
132
@@ -281,65 +281,66 @@ When an Azure NetApp Files volume is mounting using Kerberos, a Kerberos ticket
281
281
<summary>For steps detailing how SMB share is accessed in Azure NetApp Files, expand the list.</summary>
282
282
- The client attempts to access an SMB share using the UNC path shown in Azure NetApp Files. By default, the UNC path would include the SMB server name (such as ANF-XXXX)
283
283
- DNS is queried to map the hostname to an IP address
284
-
- An initial SMB2 “Negotiate Protocol” conversation takes place
285
-
o A request is sent from the client to discover which SMB dialects are supported by the server and includes what the requesting client supports
286
-
o The server responds with what it supports, including:
* SMB preauth integrity and encryption capabilities
308
+
- If the protocol negotiation succeeds, a "Session setup" request is made
309
+
- Setup uses the preauth hash from the protocol negotiation
310
+
- Setup informs the SMB server what the requesting client supports, including:
311
+
* StructureSize
312
+
* Session binding flag
313
+
* Security mode (Signing enabled/required)
314
+
* Capabilities
315
+
* Supported Kerberos encryption types
316
+
- A "Session setup" response is sent
317
+
318
+
* SMB credits are granted
319
+
- Session ID is established
320
+
- Session flags are set (guest, null, encrypt)
321
+
- Kerberos encryption type is defined
321
322
- A tree connect request is sent by the client for connection to the SMB share
322
-
o Share flags/capabilities are sent from server, along with share permissions
323
+
-Share flags/capabilities are sent from server, along with share permissions
323
324
- The ioctl command FSCTL_QUERY_NETWORK_INTERFACE_INFO is sent to get the IP address of the SMB server
324
-
o The SMB server in Azure NetApp Files reports back with the network information, including:
325
-
IP address
326
-
Interface capability (RSS on or off)
327
-
RSS queue count
328
-
Link speed
329
-
- A tree connect request is sent by the client for connection to the IPC$ administrative share
330
-
o The ipc$ share is a resource that shares the named pipes that are essential for communication between programs. The ipc$ share is used during remote administration of a computer and when viewing a computer's shared resources. You cannot change the share settings, share properties, or ACLs of the ipc$ share. You also cannot rename or delete the ipc$ share.
331
-
o A file named srvsvc is created in the share as a service handle
325
+
-The SMB server in Azure NetApp Files reports back with the network information, including:
326
+
* IP address
327
+
* Interface capability (RSS on or off)
328
+
* RSS queue count
329
+
* Link speed
330
+
- A tree connect request is sent by the client for connection to the IPC$ administrative share
331
+
*The ipc$ share is a resource that shares the named pipes that are essential for communication between programs. The ipc$ share is used during remote administration of a computer and when viewing a computer's shared resources. You cannot change the share settings, share properties, or ACLs of the ipc$ share. You also cannot rename or delete the ipc$ share.
332
+
-A file named srvsvc is created in the share as a service handle
332
333
- A DCERPC bind is done to the srvsvc file to establish a secure connection
333
-
o The file is written to with the previously retrieved information
334
+
-The file is written to with the previously retrieved information
334
335
- A Kerberos TGS-REQ is issued by the Windows client to the KDC to get a service ticket (ST) for the SMB service
335
336
- NetShareGetInfo command is run by the SMB client to the server and a response is sent
336
337
- The SMB service ticket is retrieved from the KDC
337
338
- Azure NetApp Files attempts to map the Windows user requesting access to the share to a valid UNIX user
338
-
o A Kerberos TGS request is made using the SMB server Kerberos credentials stored with the SMB server’s keytab from initial SMB server creation to use for an LDAP server bind
339
-
o LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user “pcuser” is used by Azure NetApp Files for name mapping (files/folders written in dual protocol volumes will use the mapped UNIX user as the UNIX owner)
339
+
-A Kerberos TGS request is made using the SMB server Kerberos credentials stored with the SMB server’s keytab from initial SMB server creation to use for an LDAP server bind
340
+
-LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user “pcuser” is used by Azure NetApp Files for name mapping (files/folders written in dual protocol volumes will use the mapped UNIX user as the UNIX owner)
340
341
- Another negotiate protocol/session request/tree connect is performed, this time using the SMB server’s Kerberos SPN to the Active Directory DC’s IPC$ share
341
-
o A named pipe is established to the share via the srvsvc
342
-
o A netlogon session is established to the share and the Windows user is authenticated
342
+
-A named pipe is established to the share via the srvsvc
343
+
-A netlogon session is established to the share and the Windows user is authenticated
343
344
- If permissions allow it for the user, the share lists the files and folders contained in the volume
0 commit comments