Skip to content

Commit 7e7d7e0

Browse files
committed
clarifying cloud shell steps
1 parent e5f8768 commit 7e7d7e0

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

articles/storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based authentication over Server Messa
44
author: khdownie
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 04/08/2022
7+
ms.date: 08/16/2022
88
ms.author: kendownie
99
ms.subservice: files
1010
ms.custom: contperf-fy21q1, devx-track-azurecli, devx-track-azurepowershell
@@ -148,9 +148,7 @@ az storage account update -n <storage-account-name> -g <resource-group-name> --e
148148

149149
By default, Azure AD DS authentication uses Kerberos RC4 encryption. We recommend configuring it to use Kerberos AES-256 encryption instead by following these steps:
150150

151-
As an Azure AD DS user with the required permissions (typically, members of the **AAD DC Administrators** group will have the necessary permissions), open the Azure Cloud Shell.
152-
153-
Execute the following commands:
151+
As an Azure AD DS user with the required permissions (typically, members of the **AAD DC Administrators** group will have the necessary permissions), execute the following Azure PowerShell commands. If using Azure Cloud Shell, be sure to run the `Connect-AzureAD` cmdlet first.
154152

155153
```azurepowershell
156154
# 1. Find the service account in your managed domain that represents the storage account.

0 commit comments

Comments
 (0)