You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Login with an Azure AD credential that has either storage account owner or contributor Azure role assignment
63
-
# If you are logging into an Azure environment other than Public (ex. AzureUSGovernment) you will need to specify that.
62
+
# Login with an Azure AD credential that has either storage account owner or contributor Azure role
63
+
# assignment. If you are logging into an Azure environment other than Public (ex. AzureUSGovernment)
64
+
# you will need to specify that.
64
65
# See https://docs.microsoft.com/azure/azure-government/documentation-government-get-started-connect-with-ps
65
66
# for more information.
66
67
Connect-AzAccount
67
68
68
69
# Define parameters
69
70
# $StorageAccountName is the name of an existing storage account that you want to join to AD
70
-
# $SamAccountName is the name of the to-be-created AD object, which is used by AD as the logon name for the object. See https://docs.microsoft.com/en-us/windows/win32/adschema/a-samaccountname
71
-
# for more information.
71
+
# $SamAccountName is the name of the to-be-created AD object, which is used by AD as the logon name
72
+
# for the object.
73
+
# See https://docs.microsoft.com/en-us/windows/win32/adschema/a-samaccountname for more information.
# Register the target storage account with your active directory environment under the target OU (for example: specify the OU with Name as "UserAccounts" or DistinguishedName as "OU=UserAccounts,DC=CONTOSO,DC=COM").
86
-
# You can use to this PowerShell cmdlet: Get-ADOrganizationalUnit to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it with -OrganizationalUnitDistinguishedName. You can choose to provide one of the two names to specify the target OU.
87
-
# You can choose to create the identity that represents the storage account as either a Service Logon Account or Computer Account (default parameter value), depends on the AD permission you have and preference.
88
-
# Run Get-Help Join-AzStorageAccountForAuth for more details on this cmdlet.
89
+
# Register the target storage account with your active directory environment under the target OU
90
+
# (for example: specify the OU with Name as "UserAccounts" or DistinguishedName as
91
+
# "OU=UserAccounts,DC=CONTOSO,DC=COM"). You can use this PowerShell cmdlet: Get-ADOrganizationalUnit
92
+
# to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it
93
+
# with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it
94
+
# with -OrganizationalUnitDistinguishedName. You can choose to provide one of the two names to specify
95
+
# the target OU. You can choose to create the identity that represents the storage account as either a
96
+
# Service Logon Account or Computer Account (default parameter value), depending on your AD permissions
97
+
# and preference. Run Get-Help Join-AzStorageAccountForAuth for more details on this cmdlet. Note that
98
+
# Service Logon Accounts do not support AES256 encryption.
#You can run the Debug-AzStorageAccountAuth cmdlet to conduct a set of basic checks on your AD configuration with the logged on AD user. This cmdlet is supported on AzFilesHybrid v0.1.2+ version. For more details on the checks performed in this cmdlet, see Azure Files Windows troubleshooting guide.
113
+
# You can run the Debug-AzStorageAccountAuth cmdlet to conduct a set of basic checks on your AD configuration
114
+
# with the logged on AD user. This cmdlet is supported on AzFilesHybrid v0.1.2+ version. For more details on
115
+
# the checks performed in this cmdlet, see Azure Files Windows troubleshooting guide.
@@ -115,7 +129,8 @@ First, you must check the state of your environment. Specifically, you must chec
115
129
To create this account manually, first create a new Kerberos key for your storage account and get the access key using the PowerShell cmdlets below. This key is only used during setup. It can't be used for any control or data plane operations against the storage account.
116
130
117
131
```PowerShell
118
-
# Create the Kerberos key on the storage account and get the Kerb1 key as the password for the AD identity to represent the storage account
132
+
# Create the Kerberos key on the storage account and get the Kerb1 key as the password for the AD identity
0 commit comments