You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-active-directory-domain-services-enable.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,13 +4,13 @@ description: Learn how to enable identity-based authentication over SMB for Azur
4
4
author: roygara
5
5
ms.service: storage
6
6
ms.topic: conceptual
7
-
ms.date: 02/21/2020
7
+
ms.date: 02/23/2020
8
8
ms.author: rogarana
9
9
---
10
10
11
11
# Enable Active Directory authentication over SMB for Azure file shares
12
12
13
-
[Azure Files](storage-files-introduction.md) supports identity-based authentication over Server Message Block (SMB) through two types of Domain Services: Azure Active Directory Domain Services (Azure AD DS) (GA) and Active Directory (AD) (preview). This article focuses on the newly introduced (preview) support of leveraging Active Directory Domain Service for authentication to Azure file shares. If you are interested in enabling Azure AD DS (GA) authentication for Azure file shares refer to [our article on the subject](storage-files-active-directory-enable.md).
13
+
[Azure Files](storage-files-introduction.md) supports identity-based authentication over Server Message Block (SMB) through two types of Domain Services: Azure Active Directory Domain Services (Azure AD DS) (GA) and Active Directory (AD) (preview). This article focuses on the newly introduced (preview) support of leveraging Active Directory Domain Service for authentication to Azure file shares. If you are interested in enabling Azure AD DS (GA) authentication for Azure file shares, refer to [our article on the subject](storage-files-active-directory-enable.md).
14
14
15
15
> [!NOTE]
16
16
> Azure file shares only support authentication against one domain service, either Azure Active Directory Domain Service (Azure AD DS) or Active Directory (AD).
@@ -25,7 +25,7 @@ ms.author: rogarana
25
25
26
26
When you enable AD for Azure file shares over SMB, your AD domain joined machines can mount Azure file shares using your existing AD credentials. This capability can be enabled with an AD environment hosted either in on-prem machines or hosted in Azure.
27
27
28
-
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
28
+
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This feature offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
29
29
30
30
## Prerequisites
31
31
@@ -37,7 +37,7 @@ Before you enable AD authentication for Azure file shares, make sure you have co
37
37
38
38
To setup an AD domain environment, refer to [Active Directory Domain Services Overview](https://docs.microsoft.com/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview). If you have not synced your AD to your Azure AD, follow the guidance in [What is hybrid identity with Azure Active Directory?](../../active-directory/hybrid/whatis-hybrid-identity.md) in order to determine your preferred authentication method and Azure AD Connect setup option.
39
39
40
-
- Domain-join an on-premises machine or an Azure VM to AD (also refered as AD DS).
40
+
- Domain-join an on-premises machine or an Azure VM to AD (also referred as AD DS).
41
41
42
42
To access a file share by using AD credentials from a machine or VM, your device must be domain-joined to AD. For information about how to domain-join to AD, refer to [Join a Computer to a Domain](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/join-a-computer-to-a-domain).
43
43
@@ -47,7 +47,7 @@ Before you enable AD authentication for Azure file shares, make sure you have co
47
47
48
48
For information about creating a new file share, see [Create a file share in Azure Files](storage-how-to-create-file-share.md).
49
49
50
-
For optimal performance, we recommend that your storage account be in the same region as the VM from which you plan to access the share.
50
+
For optimal performance, we recommend that you deploy the storage account in the same region as the VM from which you plan to access the share.
51
51
52
52
- Verify connectivity by mounting Azure file shares using your storage account key.
53
53
@@ -103,7 +103,7 @@ You can use the following script to perform the registration and enable the feat
103
103
- Make sure your storage account is in a [supported region](#regional-availability).
104
104
105
105
### 2. Execute AD enablement script
106
-
Remember to replace the placeholder values with your own in the parameters below before exeucting it in Powershell.
106
+
Remember to replace the placeholder values with your own in the parameters below before executing it in PowerShell.
107
107
108
108
```PowerShell
109
109
#Change the execution policy to unblock importing AzFilesHybrid.psm1 module
The following is a description of the actions performed when the `join-AzStorageAccountForAuth`command is used. You may perform these steps manually, if you prefer not to use the command:
128
+
The following description summarizes all actions performed when the `join-AzStorageAccountForAuth`cmdlet gets executed. You may perform these steps manually, if you prefer not to use the command:
129
129
130
130
> [!NOTE]
131
131
> If you have already executed the join-AzStorageAccountForAuth script above successfuly, go to the next section "3. Confirm that the feature is enabled". You do not need to perform the operations below again.
@@ -136,7 +136,7 @@ First, it checks your environment. Specifically it checks if the [Active Directo
136
136
137
137
#### b. Creating an identity representing the storage account in your AD manually
138
138
139
-
To create this account manually, create a new kerberos key for your storage account using `New-AzStorageAccountKey -KeyName kerb1`. Then, use that kerberos key as the password for your account. This key is only used during setup and cannot be used for any control or data plane operations against the storage account.
139
+
To create this account manually, create a new kerberos key for your storage account using `New-AzStorageAccountKey -KeyName kerb1`. Then, use that kerberos key as the password for your account. This key is only used during set up and cannot be used for any control or data plane operations against the storage account.
140
140
141
141
Once you have that key, create either a service or computer account under your OU. Use the following specification:
@@ -148,7 +148,7 @@ Keep the SID of the newly created account, you'll need it for the next step.
148
148
149
149
##### c. Enable the feature on your storage account
150
150
151
-
The script would then enable the feature on your storage account. To do this manually, provide some configuration details for the domain properties in the following command, then run it. The storage account SID required in the following command is the SID of the identity you created in AD (section b above).
151
+
The script would then enable the feature on your storage account. To perform this setp manually, provide some configuration details for the domain properties in the following command, then run it. The storage account SID required in the following command is the SID of the identity you created in AD (section b above).
152
152
153
153
```PowerShell
154
154
#Set the feature flag on the target storage account and provide the required AD domain information
0 commit comments