Skip to content

Commit 469ac71

Browse files
committed
Fix tabs
1 parent c963706 commit 469ac71

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -216,11 +216,11 @@ If you want to enable client machines to connect to storage accounts that are co
216216

217217
Add an entry for each storage account that uses on-premises AD DS integration. Use one of the following three methods to configure Kerberos realm mappings. Changes aren't instant, and require a policy refresh or a reboot to take effect.
218218

219-
# [Intune](#tab/Intune)
219+
# [Intune](#tab/intune)
220220

221221
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/HostToRealm](/windows/client-management/mdm/policy-csp-admx-kerberos#hosttorealm)
222222

223-
# [Group Policy](#tab/Group Policy)
223+
# [Group Policy](#tab/gpo)
224224

225225
Configure this group policy on the client(s): `Administrative Template\System\Kerberos\Define host name-to-Kerberos realm mappings`
226226

@@ -229,7 +229,7 @@ Configure this group policy on the client(s): `Administrative Template\System\Ke
229229
- `Value` is the AD DS-enabled storage account's host name, i.e. `<your storage account name>.file.core.windows.net`
230230
- `Value name` is the AD DS realm name
231231

232-
# [Registry Key](#tab/Registry Key)
232+
# [Registry Key](#tab/regkey)
233233

234234
Run the following `ksetup` Windows command on the client(s):
235235

0 commit comments

Comments
 (0)