Skip to content

Commit 2db34fa

Browse files
Merge pull request #248063 from khdownie/khdownie-patch2-081123
Update storage-files-identity-ad-ds-enable.md
2 parents b97f077 + 40375ce commit 2db34fa

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable Active Directory Domain Services authentication
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 08/02/2023
7+
ms.date: 08/11/2023
88
ms.author: kendownie
99
ms.custom: engagement-fy23, devx-track-azurepowershell
1010
recommendations: false
@@ -153,13 +153,19 @@ Get-AzStorageAccountKey -ResourceGroupName $ResourceGroupName -Name $StorageAcco
153153

154154
The cmdlets should return the key value. Once you have the kerb1 key, create either a [computer account](/powershell/module/activedirectory/new-adcomputer) or [service account](/powershell/module/activedirectory/new-adserviceaccount) in AD under your OU, and use the key as the password for the AD identity.
155155

156-
1. Set the SPN to **cifs/your-storage-account-name-here.file.core.windows.net** either in the AD GUI or by running the `Setspn` command from the Windows command line as administrator (remember to replace the example text with your storage account name and `<ADAccountName>` with your AD account name):
156+
1. Set the SPN to **cifs/your-storage-account-name-here.file.core.windows.net** either in the AD GUI or by running the `Setspn` command from the Windows command line as administrator (remember to replace the example text with your storage account name and `<ADAccountName>` with your AD account name).
157157

158158
```shell
159159
Setspn -S cifs/your-storage-account-name-here.file.core.windows.net <ADAccountName>
160160
```
161161

162-
2. Set the AD account password to the value of the kerb1 key (you must have AD PowerShell cmdlets installed and execute the cmdlet in PowerShell 5.1 with elevated privileges):
162+
2. Modify the UPN to match the SPN for the AD object (you must have AD PowerShell cmdlets installed and execute the cmdlets in PowerShell 5.1 with elevated privileges).
163+
164+
```powershell
165+
Set-ADUser -Identity $UserSamAccountName -UserPrincipalName
166+
```
167+
168+
3. Set the AD account password to the value of the kerb1 key.
163169

164170
```powershell
165171
Set-ADAccountPassword -Identity servername$ -Reset -NewPassword (ConvertTo-SecureString -AsPlainText "kerb1_key_value_here" -Force)

0 commit comments

Comments
 (0)