Skip to content

Commit 27b1f2a

Browse files
Merge pull request #209547 from khdownie/kendownie082922-4
Mine edit to AAD Kerb
2 parents 3c15bb6 + 282a09d commit 27b1f2a

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/storage/files/storage-files-identity-auth-azure-active-directory-enable.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based Kerberos authentication for hybr
44
author: khdownie
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 08/26/2022
7+
ms.date: 08/29/2022
88
ms.author: kendownie
99
ms.subservice: files
1010
---
@@ -120,6 +120,8 @@ Once your share-level permissions are in place, there are two options for config
120120
- **Windows Explorer experience:** If you choose this option, then the client must be domain-joined to the on-premises AD.
121121
- **icacls utility:** If you choose this option, then the client needs line-of-sight to the on-premises AD.
122122

123+
To configure directory and file level permissions through Windows File explorer, you also need to specify domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or from an on-premises AD-joined client. If you prefer to configure using icacls, this step is not required.
124+
123125
To configure directory and file-level permissions, follow the instructions in [Configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md).
124126

125127
## Disable Azure AD authentication on your storage account

0 commit comments

Comments
 (0)