Skip to content

Commit 10d0fed

Browse files
Merge pull request #245139 from khdownie/kendownie071723-2
specify needing write access to domain object
2 parents 6a0227f + 10bd89f commit 10d0fed

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/storage/files/storage-files-identity-auth-domain-services-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based authentication over Server Messa
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 05/03/2023
7+
ms.date: 07/17/2023
88
ms.author: kendownie
99
ms.custom: engagement-fy23, devx-track-azurecli, devx-track-azurepowershell
1010
recommendations: false
@@ -156,7 +156,7 @@ The action requires running an operation on the Active Directory domain that's m
156156
> [!IMPORTANT]
157157
> The Windows Server Active Directory PowerShell cmdlets in this section must be run in Windows PowerShell 5.1 from a client machine that's domain-joined to the Azure AD DS domain. PowerShell 7.x and Azure Cloud Shell won't work in this scenario.
158158
159-
Log into the domain-joined client machine as an Azure AD DS user with the required permissions (typically, members of the **AAD DC Administrators** group will have the necessary permissions). Open a normal (non-elevated) PowerShell session and execute the following commands.
159+
Log into the domain-joined client machine as an Azure AD DS user with the required permissions. You must have write access to the `msDS-SupportedEncryptionTypes` attribute of the domain object. Typically, members of the **AAD DC Administrators** group will have the necessary permissions. Open a normal (non-elevated) PowerShell session and execute the following commands.
160160

161161
```powershell
162162
# 1. Find the service account in your managed domain that represents the storage account.

0 commit comments

Comments
 (0)