Skip to content

Commit 66b533d

Browse files
Merge pull request #299414 from b-ahibbard/anf-ip-ad
ANF-51969: kdc ip can only be modified in ad settings
2 parents 6b0ecd7 + b580d32 commit 66b533d

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create and manage Active Directory connections for Azure NetApp Files | Microsoft Docs
2+
title: Create and manage Active Directory connections for Azure NetApp Files
33
description: This article shows you how to create and manage Active Directory connections for Azure NetApp Files.
44
services: azure-netapp-files
55
author: b-hchen
@@ -41,7 +41,7 @@ Several features of Azure NetApp Files require that you have an Active Directory
4141
* Enterprise Admins
4242
* Administrators
4343
* Account Operators
44-
* Microsoft Entra Domain Services Administrators _ (Microsoft Entra Domain Services Only)_
44+
* Microsoft Entra Domain Services Administrators _(Microsoft Entra Domain Services Only)_
4545
* Alternatively, an AD domain user account with `msDS-SupportedEncryptionTypes` write permission on the AD connection admin account can also be used to set the Kerberos encryption type property on the AD connection admin account.
4646

4747
>[!NOTE]
@@ -316,7 +316,7 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
316316
317317
The Shared AD feature enables all NetApp accounts to share an AD connection created by one of the NetApp accounts that belong to the same subscription and the same region. For example, using this feature, all NetApp accounts in the same subscription and region can use the common AD configuration to create an [SMB volume](azure-netapp-files-create-volumes-smb.md), a [NFSv4.1 Kerberos volume](configure-kerberos-encryption.md), or a [dual-protocol volume](create-volumes-dual-protocol.md). When you use this feature, the AD connection is visible in all NetApp accounts that are under the same subscription and same region.
318318
319-
With the introduction of the feature to [create an AD connection per NetApp account](#multi-ad), new feature registration for the Shared AD feature are not accepted.
319+
With the introduction of the feature to [create an AD connection per NetApp account](#multi-ad), new feature registration for the Shared AD feature aren't accepted.
320320
321321
>[!NOTE]
322322
>You can register to use one AD connection per NetApp account if you're already enrolled in the preview for Shared AD. If you currently meet the maximum of 10 NetApp accounts per Azure region per subscription, you must initiate a [support request](azure-netapp-files-resource-limits.md#request-limit-increase) to increase the limit. You can confirm your configuration in your account overview page in the [AD type](#netapp-accounts-and-active-directory-type) field.

articles/azure-netapp-files/kerberos.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ This section defines key terminology that is used when describing Kerberos proce
5858

5959
| Term | Definition |
6060
| -- | ------ |
61-
| Key distribution center (KDC) | The KDC is the authentication server that includes the ticket-granting service (TGS) and the authentication service (AS). The terms KDC, AS, and TGS are used interchangeably. In Microsoft environments, an Active Directory domain controller is a KDC. |
61+
| Key distribution center (KDC) | The KDC is the authentication server that includes the ticket-granting service (TGS) and the authentication service (AS). The terms KDC, AS, and TGS are used interchangeably. In Microsoft environments, an Active Directory (AD) domain controller is a KDC. As such, modifying KDC values can be done by [modifying AD settings](modify-active-directory-connections.md). |
6262
| Realm (or Kerberos realm) | A realm (or Kerberos realm) can use any ASCII string. The standard is to use the domain name in uppercase; for example, contoso.com becomes the realm CONTOSO.COM. Kerberos realms usually are configured in krb5.conf files on clients and servers. <br></br> Administratively, each principal@REALM must be unique. To avoid a single point of failure, each realm can have multiple KDCs that share the same database (principals and their passwords) and have the same KDC master keys. Microsoft Windows Active Directory does this natively by way of Active Directory replication, which takes place every 15 minutes by default.
6363
| Principal | The term principal refers to every entity within a Kerberos database. Users, computers, and services are all assigned principals for Kerberos authentication. Every principal must be unique within the Kerberos database and is defined by its distinguished name. A principal can be a user principal name (UPN) or a service principal name (SPN). <br></br> A principal name has three parts: <ul><li>**Primary** - The primary part can be a user or a service such as the NFS service. It can also be the special service "host," which signifies that this service principal is set up to provide multiple various network services.</li><li>**Instance** - This part is optional in the case of a user. A user can have more than one principal, but each principal must be unique in the KDC. For example, Fred might have a principal that is for everyday use ([email protected]) and a principal that allows privileged use such as a sysadmin account ([email protected]). The instance is required for service principals and designates the fully qualified domain name (FQDN) of the host that provides the service.</li><li>**Realm** - A Kerberos realm is the set of Kerberos principals that are registered within a Kerberos server. By convention, the realm name is usually the same as the DNS name, but it's converted to uppercase letters. Uppercase letters aren't obligatory, but the convention provides easy distinction between the DNS name and the realm name.</li></ul> <!-- image --> |
6464
| Tickets | A ticket is a temporary set of credentials that verifies the identity of a principal for a service and contains the session key. A ticket can be a service, an application ticket, or a ticket-granting ticket (TGT). Tickets are exchanged between client, server, and KDC for Kerberos authentication. |
@@ -148,7 +148,7 @@ SMB services in Azure NetApp Files are initially configured by setting up an [Ac
148148
- Active Directory DNS name*
149149
- Active Directory site name (for DC discovery) (required)
150150
- SMB server prefix name
151-
- Organizational unit (where where SMB server computer accounts are created)
151+
- Organizational unit (where SMB server computer accounts are created)
152152
- AES encryption enable/disable
153153
- LDAP signing enable/disable
154154
- LDAP configuration
@@ -438,7 +438,7 @@ When the NFS Kerberos realm is configured, a local hosts entry is added in the s
438438

439439
:::image type="content" source="media/kerberos/nfs-kerberos-configuration.png" alt-text="Diagram of Kerberos realm configuration." lightbox="media/kerberos/nfs-kerberos-configuration.png":::
440440

441-
This local host entry acts as a "last resort" if a KDC outage occurs on the KDC specified in the realm configuration and failure to query redundant KDCs via DNS.
441+
This local host entry acts as a last resort if a KDC outage occurs on the KDC specified in the realm configuration and failure to query redundant KDCs via DNS.
442442

443443
>[!NOTE]
444444
>If the KDC in the Kerberos realm needs to be brought down for maintenance (such as for upgrades or decommissioning of a server), it's recommended to configure the realm to use a KDC that isn't undergoing maintenance to avoid outages.

articles/azure-netapp-files/modify-active-directory-connections.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Modify an Active Directory Connection for Azure NetApp Files | Microsoft Docs
2+
title: Modify an Active Directory Connection for Azure NetApp Files
33
description: This article shows you how to modify Active Directory connections for Azure NetApp Files.
44
author: b-hchen
55
ms.service: azure-netapp-files
66
ms.topic: how-to
7-
ms.date: 02/21/2023
7+
ms.date: 05/06/2025
88
ms.author: anfdocs
99
---
1010

@@ -43,7 +43,7 @@ For more information, see [Understand guidelines for Active Directory Domain Ser
4343
| Username | Username of the Active Directory domain administrator | Yes | None* | Credential change to contact DC |
4444
| Password | Password of the Active Directory domain administrator | Yes | None* <br></br> Password can't exceed 64 characters. | Credential change to contact DC |
4545
| Kerberos Realm: AD Server Name | The name of the Active Directory machine. This option is only used when creating a Kerberos volume. | Yes | None* | |
46-
| Kerberos Realm: KDC IP | Specifies the IP address of the Kerberos Distribution Center (KDC) server. KDC in Azure NetApp Files is an Active Directory server | Yes | None | A new KDC IP address will be used |
46+
| Kerberos Realm: KDC IP | Specifies the IP address of the Kerberos Distribution Center (KDC) server. KDC in Azure NetApp Files is an Active Directory server. The only way to modify a KDC is by editing the AD setting. | Yes | None | A new KDC IP address will be used |
4747
| Region | The region where the Active Directory credentials are associated | No | None | N/A |
4848
| User DN | User domain name, which overrides the base DN for user lookups Nested userDN can be specified in `OU=subdirectory, OU=directory, DC=domain, DC=com` format.​ | Yes | None* | User search scope gets limited to User DN instead of base DN. |
4949
| Group DN | Group domain name. groupDN overrides the base DN for group lookups. Nested groupDN can be specified in `OU=subdirectory, OU=directory, DC=domain, DC=com` format.​ | Yes | None* | Group search scope gets limited to Group DN instead of base DN. |

0 commit comments

Comments
 (0)