Skip to content

Commit 4277471

Browse files
Merge pull request #220272 from khdownie/kendownie120222
adding MFA links
2 parents 2fa240c + f1412f6 commit 4277471

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

articles/storage/files/storage-files-identity-auth-azure-active-directory-enable.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based Kerberos authentication for hybr
44
author: khdownie
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 11/29/2022
7+
ms.date: 12/02/2022
88
ms.author: kendownie
99
ms.subservice: files
1010
ms.custom: engagement-fy23
@@ -154,11 +154,16 @@ After enabling Azure AD Kerberos authentication, you'll need to explicitly grant
154154

155155
## Disable multi-factor authentication on the storage account
156156

157-
Azure AD Kerberos doesn't support using MFA to access Azure file shares configured with Azure AD Kerberos. You must exclude the Azure AD app representing your storage account from your MFA conditional access policies if they apply to all apps. The storage account app should have the same name as the storage account in the conditional access exclusion list.
157+
Azure AD Kerberos doesn't support using MFA to access Azure file shares configured with Azure AD Kerberos. You must exclude the Azure AD app representing your storage account from your MFA conditional access policies if they apply to all apps. The storage account app should have the same name as the storage account in the conditional access exclusion list, for example **[Storage Account] $storageAccountName.file.core.windows.net**.
158158

159159
> [!IMPORTANT]
160160
> If you don't exclude MFA policies from the storage account app, you won't be able to access the file share. Trying to map the file share using `net use` will result in an error message that says "System error 1327: Account restrictions are preventing this user from signing in. For example: blank passwords aren't allowed, sign-in times are limited, or a policy restriction has been enforced."
161161
162+
For guidance on disabling MFA, see the following:
163+
164+
- [Add exclusions for service principals of Azure resources](../../active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md#user-exclusions)
165+
- [Create a conditional access policy](../../active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md#create-a-conditional-access-policy)
166+
162167
## Assign share-level permissions
163168

164169
When you enable identity-based access, you can set for each share which users and groups have access to that particular share. Once a user is allowed into a share, Windows ACLs (also called NTFS permissions) on individual files and directories take over. This allows for fine-grained control over permissions, similar to an SMB share on a Windows server.

0 commit comments

Comments
 (0)