Skip to content

Commit 5f954b2

Browse files
authored
Minor updates
1 parent 5b5fb7c commit 5f954b2

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/storage/files/storage-files-active-directory-domain-services-enable.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ description: Learn how to enable identity-based authentication over SMB for Azur
44
author: roygara
55
ms.service: storage
66
ms.topic: conceptual
7-
ms.date: 02/21/2020
7+
ms.date: 02/23/2020
88
ms.author: rogarana
99
---
1010

1111
# Enable Active Directory authentication over SMB for Azure file shares
1212

13-
[Azure Files](storage-files-introduction.md) supports identity-based authentication over Server Message Block (SMB) through two types of Domain Services: Azure Active Directory Domain Services (Azure AD DS) (GA) and Active Directory (AD) (preview). This article focuses on the newly introduced (preview) support of leveraging Active Directory Domain Service for authentication to Azure file shares. If you are interested in enabling Azure AD DS (GA) authentication for Azure file shares refer to [our article on the subject](storage-files-active-directory-enable.md).
13+
[Azure Files](storage-files-introduction.md) supports identity-based authentication over Server Message Block (SMB) through two types of Domain Services: Azure Active Directory Domain Services (Azure AD DS) (GA) and Active Directory (AD) (preview). This article focuses on the newly introduced (preview) support of leveraging Active Directory Domain Service for authentication to Azure file shares. If you are interested in enabling Azure AD DS (GA) authentication for Azure file shares, refer to [our article on the subject](storage-files-active-directory-enable.md).
1414

1515
> [!NOTE]
1616
> Azure file shares only support authentication against one domain service, either Azure Active Directory Domain Service (Azure AD DS) or Active Directory (AD).
@@ -25,7 +25,7 @@ ms.author: rogarana
2525
2626
When you enable AD for Azure file shares over SMB, your AD domain joined machines can mount Azure file shares using your existing AD credentials. This capability can be enabled with an AD environment hosted either in on-prem machines or hosted in Azure.
2727

28-
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
28+
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This feature offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
2929

3030
## Prerequisites
3131

@@ -37,7 +37,7 @@ Before you enable AD authentication for Azure file shares, make sure you have co
3737

3838
To setup an AD domain environment, refer to [Active Directory Domain Services Overview](https://docs.microsoft.com/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview). If you have not synced your AD to your Azure AD, follow the guidance in [What is hybrid identity with Azure Active Directory?](../../active-directory/hybrid/whatis-hybrid-identity.md) in order to determine your preferred authentication method and Azure AD Connect setup option.
3939

40-
- Domain-join an on-premises machine or an Azure VM to AD (also refered as AD DS).
40+
- Domain-join an on-premises machine or an Azure VM to AD (also referred as AD DS).
4141

4242
To access a file share by using AD credentials from a machine or VM, your device must be domain-joined to AD. For information about how to domain-join to AD, refer to [Join a Computer to a Domain](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/join-a-computer-to-a-domain).
4343

@@ -47,7 +47,7 @@ Before you enable AD authentication for Azure file shares, make sure you have co
4747

4848
For information about creating a new file share, see [Create a file share in Azure Files](storage-how-to-create-file-share.md).
4949

50-
For optimal performance, we recommend that your storage account be in the same region as the VM from which you plan to access the share.
50+
For optimal performance, we recommend that you deploy the storage account in the same region as the VM from which you plan to access the share.
5151

5252
- Verify connectivity by mounting Azure file shares using your storage account key.
5353

@@ -103,7 +103,7 @@ You can use the following script to perform the registration and enable the feat
103103
- Make sure your storage account is in a [supported region](#regional-availability).
104104

105105
### 2. Execute AD enablement script
106-
Remember to replace the placeholder values with your own in the parameters below before exeucting it in Powershell.
106+
Remember to replace the placeholder values with your own in the parameters below before executing it in PowerShell.
107107

108108
```PowerShell
109109
#Change the execution policy to unblock importing AzFilesHybrid.psm1 module
@@ -125,7 +125,7 @@ Select-AzureSubscription -SubscriptionId "<your-subscription-id-here>"
125125
join-AzStorageAccountForAuth -ResourceGroupName "<resource-group-name-here>" -Name "<storage-account-name-here>" -DomainAccountType "<ServiceLogonAccount|ComputerAccount>" -OrganizationUnitName "<ou-name-here>"
126126
```
127127

128-
The following is a description of the actions performed when the `join-AzStorageAccountForAuth` command is used. You may perform these steps manually, if you prefer not to use the command:
128+
The following description summarizes all actions performed when the `join-AzStorageAccountForAuth` cmdlet gets executed. You may perform these steps manually, if you prefer not to use the command:
129129

130130
> [!NOTE]
131131
> If you have already executed the join-AzStorageAccountForAuth script above successfuly, go to the next section "3. Confirm that the feature is enabled". You do not need to perform the operations below again.
@@ -136,7 +136,7 @@ First, it checks your environment. Specifically it checks if the [Active Directo
136136

137137
#### b. Creating an identity representing the storage account in your AD manually
138138

139-
To create this account manually, create a new kerberos key for your storage account using `New-AzStorageAccountKey -KeyName kerb1`. Then, use that kerberos key as the password for your account. This key is only used during setup and cannot be used for any control or data plane operations against the storage account.
139+
To create this account manually, create a new kerberos key for your storage account using `New-AzStorageAccountKey -KeyName kerb1`. Then, use that kerberos key as the password for your account. This key is only used during set up and cannot be used for any control or data plane operations against the storage account.
140140

141141
Once you have that key, create either a service or computer account under your OU. Use the following specification:
142142
SPN: "cifs/your-storage-account-name-here.file.core.windows.net"
@@ -148,7 +148,7 @@ Keep the SID of the newly created account, you'll need it for the next step.
148148

149149
##### c. Enable the feature on your storage account
150150

151-
The script would then enable the feature on your storage account. To do this manually, provide some configuration details for the domain properties in the following command, then run it. The storage account SID required in the following command is the SID of the identity you created in AD (section b above).
151+
The script would then enable the feature on your storage account. To perform this setp manually, provide some configuration details for the domain properties in the following command, then run it. The storage account SID required in the following command is the SID of the identity you created in AD (section b above).
152152

153153
```PowerShell
154154
#Set the feature flag on the target storage account and provide the required AD domain information

0 commit comments

Comments
 (0)