Skip to content

Commit 5d64965

Browse files
committed
edits
1 parent 5866b2b commit 5d64965

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

articles/storage/files/storage-files-identity-auth-azure-active-directory-enable.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -203,11 +203,11 @@ Use one of the following three methods:
203203
Changes are not instant, and require a policy refresh or a reboot to take effect.
204204

205205
> [!IMPORTANT]
206-
> Once this change is applied, the client won't be able to connect to storage accounts using on-premises AD DS integration without configuring Kerberos realm mappings. If you want the client(s) to be able to connect to storage accounts using both authentication methods, follow the steps in [Configure coexistence with storage accounts using on-premises AD DS](#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds).
206+
> Once this change is applied, the client(s) won't be able to connect to storage accounts that are configured for on-premises AD DS integration without configuring Kerberos realm mappings. If you want the client(s) to be able to connect to storage accounts configured for AD DS as well as storage accounts configured for Azure AD Kerberos, follow the steps in [Configure coexistence with storage accounts using on-premises AD DS](#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds).
207207
208208
### Configure coexistence with storage accounts using on-premises AD DS
209209

210-
If you want to enable client machines to connect to storage accounts using Azure AD Kerberos and AD DS, follow these steps. If you're only using Azure AD Kerberos, skip this section.
210+
If you want to enable client machines to connect to storage accounts that are configured for AD DS as well as storage accounts configured for Azure AD Kerberos, follow these steps. If you're only using Azure AD Kerberos, skip this section.
211211

212212
Add an entry for each storage account that uses on-premises AD DS integration. Use one of the following three methods to configure Kerberos realm mappings:
213213

@@ -216,6 +216,8 @@ Add an entry for each storage account that uses on-premises AD DS integration. U
216216
- Configure the following registry value on the client(s): `reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\domain_realm /v <DomainName> /d <StorageAccountEndPoint>`
217217
- For example, `reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\domain_realm /v contoso.local /d <your-storage-account-name>.file.core.windows.net`
218218

219+
Changes are not instant, and require a policy refresh or a reboot to take effect.
220+
219221
## Disable Azure AD authentication on your storage account
220222

221223
If you want to use another authentication method, you can disable Azure AD authentication on your storage account by using the Azure portal, Azure PowerShell, or Azure CLI.

0 commit comments

Comments
 (0)