Skip to content

Commit 74b58d6

Browse files
authored
Merge pull request #197103 from khdownie/kendownie050422
Removing 15 char limit for AES256
2 parents 02ab7ac + 1620402 commit 74b58d6

File tree

2 files changed

+18
-9
lines changed

2 files changed

+18
-9
lines changed

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,19 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 01/14/2022
8+
ms.date: 05/06/2022
99
ms.author: kendownie
1010
ms.custom: devx-track-azurepowershell
1111
---
1212

13-
# Part one: enable AD DS authentication for your Azure file shares
13+
# Part one: enable AD DS authentication for your Azure file shares
1414

15-
Before you enable Active Directory Domain Services (AD DS) authentication, make sure you've read the [overview article](storage-files-identity-auth-active-directory-enable.md) to understand the supported scenarios and requirements.
15+
This article describes the process for enabling Active Directory Domain Services (AD DS) authentication on your storage account. After enabling the feature, you must configure your storage account and your AD DS, to use AD DS credentials for authenticating to your Azure file share.
1616

17-
This article describes the process required for enabling Active Directory Domain Services (AD DS) authentication on your storage account. After enabling the feature, you must configure your storage account and your AD DS, to use AD DS credentials for authenticating to your Azure file share. To enable AD DS authentication over SMB for Azure file shares, you need to register your storage account with AD DS and then set the required domain properties on the storage account.
17+
> [!IMPORTANT]
18+
> Before you enable AD DS authentication, make sure you understand the supported scenarios and requirements in the [overview article](storage-files-identity-auth-active-directory-enable.md) and complete the necessary [prerequisites](storage-files-identity-auth-active-directory-enable.md#prerequisites).
1819
19-
To register your storage account with AD DS, create an account representing it in your AD DS. You can think of this process as if it were like creating an account representing an on-premises Windows file server in your AD DS. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account.
20+
To enable AD DS authentication over SMB for Azure file shares, you need to register your storage account with AD DS and then set the required domain properties on the storage account. To register your storage account with AD DS, create an account representing it in your AD DS. You can think of this process as if it were like creating an account representing an on-premises Windows file server in your AD DS. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account.
2021

2122
## Applies to
2223
| File share type | SMB | NFS |
@@ -43,6 +44,7 @@ The `Join-AzStorageAccount` cmdlet performs the equivalent of an offline domain
4344
The AD DS account created by the cmdlet represents the storage account. If the AD DS account is created under an organizational unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update the account password before that date results in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD DS account password](storage-files-identity-ad-ds-update-password.md).
4445

4546
Replace the placeholder values with your own in the parameters below before executing it in PowerShell.
47+
4648
> [!IMPORTANT]
4749
> The domain join cmdlet will create an AD account to represent the storage account (file share) in AD. You can choose to register as a computer account or service logon account, see [FAQ](./storage-files-faq.md#security-authentication-and-access-control) for details. For computer accounts, there is a default password expiration age set in AD at 30 days. Similarly, the service logon account may have a default password expiration age set on the AD domain or Organizational Unit (OU).
4850
> For both account types, we recommend you check the password expiration age configured in your AD environment and plan to [update the password of your storage account identity](storage-files-identity-ad-ds-update-password.md) of the AD account before the maximum password age. You can consider [creating a new AD Organizational Unit (OU) in AD](/powershell/module/activedirectory/new-adorganizationalunit) and disabling password expiration policy on [computer accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852252(v=ws.11)) or service logon accounts accordingly.
@@ -63,14 +65,19 @@ Import-Module -Name AzFilesHybrid
6365
# for more information.
6466
Connect-AzAccount
6567
66-
# Define parameters, $StorageAccountName currently has a maximum limit of 15 characters
68+
# Define parameters
69+
# $StorageAccountName is the name of an existing storage account that you want to join to AD
70+
# $SamAccountName is an AD object, see https://docs.microsoft.com/en-us/windows/win32/adschema/a-samaccountname
71+
# for more information.
72+
# If you want to use AES256 encryption (recommended), except for the trailing '$', the storage account name must be the same as the computer object's SamAccountName.
6773
$SubscriptionId = "<your-subscription-id-here>"
6874
$ResourceGroupName = "<resource-group-name-here>"
6975
$StorageAccountName = "<storage-account-name-here>"
76+
$SamAccountName = "<sam-account-name-here>"
7077
$DomainAccountType = "<ComputerAccount|ServiceLogonAccount>" # Default is set as ComputerAccount
7178
# If you don't provide the OU name as an input parameter, the AD identity that represents the storage account is created under the root directory.
7279
$OuDistinguishedName = "<ou-distinguishedname-here>"
73-
# Specify the encryption algorithm used for Kerberos authentication. AES256 is recommended. Default is configured as "'RC4','AES256'" which supports both 'RC4' and 'AES256' encryption.
80+
# Specify the encryption algorithm used for Kerberos authentication. Using AES256 is recommended.
7481
$EncryptionType = "<AES256|RC4|AES256,RC4>"
7582
7683
# Select the target subscription for the current session
@@ -84,6 +91,7 @@ Select-AzSubscription -SubscriptionId $SubscriptionId
8491
Join-AzStorageAccount `
8592
-ResourceGroupName $ResourceGroupName `
8693
-StorageAccountName $StorageAccountName `
94+
-SamAccountName $SamAccountName `
8795
-DomainAccountType $DomainAccountType `
8896
-OrganizationalUnitDistinguishedName $OuDistinguishedName `
8997
-EncryptionType $EncryptionType
@@ -148,7 +156,7 @@ Set-AzStorageAccount `
148156
To enable AES-256 encryption, follow the steps in this section. If you plan to use RC4, skip this section.
149157

150158
The domain object that represents your storage account must meet the following requirements:
151-
- The storage account name cannot exceed 15 characters.
159+
152160
- The domain object must be created as a computer object in the on-premises AD domain.
153161
- Except for the trailing '$', the storage account name must be the same as the computer object's SamAccountName.
154162

@@ -206,6 +214,7 @@ DomainGuid:<yourGUIDHere>
206214
DomainSid:<yourSIDHere>
207215
AzureStorageID:<yourStorageSIDHere>
208216
```
217+
209218
## Next steps
210219

211220
You've now successfully enabled the feature on your storage account. To use the feature, you must assign share-level permissions. Continue to the next section.

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ If you are new to Azure file shares, we recommend reading our [planning guide](s
2626

2727
- AD DS Identities used for Azure Files on-premises AD DS authentication must be synced to Azure AD or use a default share-level permission. Password hash synchronization is optional.
2828
- Supports Azure file shares managed by Azure File Sync.
29-
- Supports Kerberos authentication with AD with [AES 256 encryption](./storage-troubleshoot-windows-file-connection-problems.md#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 256 encryption support is currently limited to storage accounts with names <= 15 characters in length. AES 128 Kerberos encryption is not yet supported.
29+
- Supports Kerberos authentication with AD with [AES 256 encryption](./storage-troubleshoot-windows-file-connection-problems.md#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 128 Kerberos encryption is not yet supported.
3030
- Supports single sign-on experience.
3131
- Only supported on clients running on OS versions newer than Windows 7 or Windows Server 2008 R2.
3232
- Only supported against the AD forest that the storage account is registered to. You can only access Azure file shares with the AD DS credentials from a single forest by default. If you need to access your Azure file share from a different forest, make sure that you have the proper forest trust configured, see the [FAQ](storage-files-faq.md#ad-ds--azure-ad-ds-authentication) for details.

0 commit comments

Comments
 (0)