You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/create-profile-container-azure-ad.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Create an Azure file share with Azure Active Directory (preview)
2
+
title: Create a profile container with Azure Files and Azure Active Directory (preview)
3
3
description: Set up an FSLogix profile container on an Azure file share in an existing Azure Virtual Desktop host pool with your Azure Active Directory domain (preview).
4
4
services: virtual-desktop
5
5
author: Heidilohr
@@ -22,7 +22,7 @@ This feature is currently supported in the Azure Public, Azure Government, and A
22
22
23
23
## Configure your Azure storage account and file share
24
24
25
-
To store your FSLogix profiles on an Azure Files share:
25
+
To store your FSLogix profiles on an Azure file share:
26
26
27
27
1.[Create an Azure Storage account](../storage/files/storage-how-to-create-file-share.md#create-a-storage-account) if you don't already have one.
28
28
@@ -33,14 +33,14 @@ To store your FSLogix profiles on an Azure Files share:
33
33
34
34
3.[Enable Azure Active Directory Kerberos authentication on Azure Files](../storage/files/storage-files-identity-auth-azure-active-directory-enable.md) to enable access from Azure AD-joined VMs.
35
35
36
-
- When configuring the directory and filelevel permissions, review the recommended list of permissions for FSLogix profiles at [Configure the storage permissions for profile containers](/fslogix/fslogix-storage-config-ht).
37
-
- Without proper directorylevel permissions in place, a user can delete the user profile or access the personal information of a different user. It's important to make sure users have proper permissions to prevent accidental deletion from happening.
36
+
- When configuring the directory and file-level permissions, review the recommended list of permissions for FSLogix profiles at [Configure the storage permissions for profile containers](/fslogix/fslogix-storage-config-ht).
37
+
- Without proper directory-level permissions in place, a user can delete the user profile or access the personal information of a different user. It's important to make sure users have proper permissions to prevent accidental deletion from happening.
38
38
39
39
## Configure the session hosts
40
40
41
41
To access Azure file shares from an Azure AD-joined VM for FSLogix profiles, you must configure the session hosts. To configure session hosts:
42
42
43
-
1. Enable the Azure AD Kerberos functionality using one of the following methods:
43
+
1. Enable the Azure AD Kerberos functionality using one of the following methods.
44
44
45
45
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the session host: [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#kerberos-cloudkerberosticketretrievalenabled)
46
46
- Configure this Group policy on the session host: `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
0 commit comments