You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-ad-ds-enable.md
+17-8Lines changed: 17 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,18 +5,19 @@ author: khdownie
5
5
ms.service: storage
6
6
ms.subservice: files
7
7
ms.topic: how-to
8
-
ms.date: 01/14/2022
8
+
ms.date: 05/06/2022
9
9
ms.author: kendownie
10
10
ms.custom: devx-track-azurepowershell
11
11
---
12
12
13
-
# Part one: enable AD DS authentication for your Azure file shares
13
+
# Part one: enable AD DS authentication for your Azure file shares
14
14
15
-
Before you enable Active Directory Domain Services (AD DS) authentication, make sure you've read the [overview article](storage-files-identity-auth-active-directory-enable.md)to understand the supported scenarios and requirements.
15
+
This article describes the process for enabling Active Directory Domain Services (AD DS) authentication on your storage account. After enabling the feature, you must configure your storage account and your AD DS, to use AD DS credentials for authenticating to your Azure file share.
16
16
17
-
This article describes the process required for enabling Active Directory Domain Services (AD DS) authentication on your storage account. After enabling the feature, you must configure your storage account and your AD DS, to use AD DS credentials for authenticating to your Azure file share. To enable AD DS authentication over SMB for Azure file shares, you need to register your storage account with AD DS and then set the required domain properties on the storage account.
17
+
> [!IMPORTANT]
18
+
> Before you enable AD DS authentication, make sure you understand the supported scenarios and requirements in the [overview article](storage-files-identity-auth-active-directory-enable.md) and complete the necessary [prerequisites](storage-files-identity-auth-active-directory-enable.md#prerequisites).
18
19
19
-
To register your storage account with AD DS, create an account representing it in your AD DS. You can think of this process as if it were like creating an account representing an on-premises Windows file server in your AD DS. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account.
20
+
To enable AD DS authentication over SMB for Azure file shares, you need to register your storage account with AD DS and then set the required domain properties on the storage account. To register your storage account with AD DS, create an account representing it in your AD DS. You can think of this process as if it were like creating an account representing an on-premises Windows file server in your AD DS. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account.
20
21
21
22
## Applies to
22
23
| File share type | SMB | NFS |
@@ -43,6 +44,7 @@ The `Join-AzStorageAccount` cmdlet performs the equivalent of an offline domain
43
44
The AD DS account created by the cmdlet represents the storage account. If the AD DS account is created under an organizational unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update the account password before that date results in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD DS account password](storage-files-identity-ad-ds-update-password.md).
44
45
45
46
Replace the placeholder values with your own in the parameters below before executing it in PowerShell.
47
+
46
48
> [!IMPORTANT]
47
49
> The domain join cmdlet will create an AD account to represent the storage account (file share) in AD. You can choose to register as a computer account or service logon account, see [FAQ](./storage-files-faq.md#security-authentication-and-access-control) for details. For computer accounts, there is a default password expiration age set in AD at 30 days. Similarly, the service logon account may have a default password expiration age set on the AD domain or Organizational Unit (OU).
48
50
> For both account types, we recommend you check the password expiration age configured in your AD environment and plan to [update the password of your storage account identity](storage-files-identity-ad-ds-update-password.md) of the AD account before the maximum password age. You can consider [creating a new AD Organizational Unit (OU) in AD](/powershell/module/activedirectory/new-adorganizationalunit) and disabling password expiration policy on [computer accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852252(v=ws.11)) or service logon accounts accordingly.
# Define parameters, $StorageAccountName currently has a maximum limit of 15 characters
68
+
# Define parameters
69
+
# $StorageAccountName is the name of an existing storage account that you want to join to AD
70
+
# $SamAccountName is an AD object, see https://docs.microsoft.com/en-us/windows/win32/adschema/a-samaccountname
71
+
# for more information.
72
+
# If you want to use AES256 encryption (recommended), except for the trailing '$', the storage account name must be the same as the computer object's SamAccountName.
# Specify the encryption algorithm used for Kerberos authentication. AES256 is recommended. Default is configured as "'RC4','AES256'" which supports both 'RC4' and 'AES256' encryption.
80
+
# Specify the encryption algorithm used for Kerberos authentication. Using AES256 is recommended.
74
81
$EncryptionType = "<AES256|RC4|AES256,RC4>"
75
82
76
83
# Select the target subscription for the current session
To enable AES-256 encryption, follow the steps in this section. If you plan to use RC4, skip this section.
149
157
150
158
The domain object that represents your storage account must meet the following requirements:
151
-
- The storage account name cannot exceed 15 characters.
159
+
152
160
- The domain object must be created as a computer object in the on-premises AD domain.
153
161
- Except for the trailing '$', the storage account name must be the same as the computer object's SamAccountName.
154
162
@@ -206,6 +214,7 @@ DomainGuid:<yourGUIDHere>
206
214
DomainSid:<yourSIDHere>
207
215
AzureStorageID:<yourStorageSIDHere>
208
216
```
217
+
209
218
## Next steps
210
219
211
220
You've now successfully enabled the feature on your storage account. To use the feature, you must assign share-level permissions. Continue to the next section.
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-auth-active-directory-enable.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ If you are new to Azure file shares, we recommend reading our [planning guide](s
26
26
27
27
- AD DS Identities used for Azure Files on-premises AD DS authentication must be synced to Azure AD or use a default share-level permission. Password hash synchronization is optional.
28
28
- Supports Azure file shares managed by Azure File Sync.
29
-
- Supports Kerberos authentication with AD with [AES 256 encryption](./storage-troubleshoot-windows-file-connection-problems.md#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 256 encryption support is currently limited to storage accounts with names <= 15 characters in length. AES 128 Kerberos encryption is not yet supported.
29
+
- Supports Kerberos authentication with AD with [AES 256 encryption](./storage-troubleshoot-windows-file-connection-problems.md#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 128 Kerberos encryption is not yet supported.
30
30
- Supports single sign-on experience.
31
31
- Only supported on clients running on OS versions newer than Windows 7 or Windows Server 2008 R2.
32
32
- Only supported against the AD forest that the storage account is registered to. You can only access Azure file shares with the AD DS credentials from a single forest by default. If you need to access your Azure file share from a different forest, make sure that you have the proper forest trust configured, see the [FAQ](storage-files-faq.md#ad-ds--azure-ad-ds-authentication) for details.
0 commit comments