Skip to content

Commit 8596cfb

Browse files
authored
Merge pull request #181584 from b-hchen/live-update-2021.06-Encrypted-SMB-to-DC
Encrypted SMB to DC; Backup Policy Users GA; AES Encryption GA
2 parents 48bf583 + ff02c88 commit 8596cfb

File tree

4 files changed

+47
-54
lines changed

4 files changed

+47
-54
lines changed

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 16 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Several features of Azure NetApp Files require that you have an Active Directory
7474

7575
The Network Security Groups (NSGs) and firewalls must have appropriately configured rules to allow for Active Directory and DNS traffic requests.
7676

77-
* The Azure NetApp Files delegated subnet must be able to reach all Active Directory Domain Services (ADDS) domain controllers in the domain, including all local and remote domain controllers. Otherwise, service interruption can occur.
77+
* The Azure NetApp Files delegated subnet must be able to reach all Active Directory Domain Services (AD DS) domain controllers in the domain, including all local and remote domain controllers. Otherwise, service interruption can occur.
7878

7979
If you have domain controllers that are unreachable by the Azure NetApp Files delegated subnet, you can specify an Active Directory site during creation of the Active Directory connection. Azure NetApp Files needs to communicate only with domain controllers in the site where the Azure NetApp Files delegated subnet address space is.
8080

@@ -111,15 +111,15 @@ Several features of Azure NetApp Files require that you have an Active Directory
111111

112112
## Decide which Domain Services to use
113113

114-
Azure NetApp Files supports both [Active Directory Domain Services](/windows-server/identity/ad-ds/plan/understanding-active-directory-site-topology) (ADDS) and Azure Active Directory Domain Services (AADDS) for AD connections. Before you create an AD connection, you need to decide whether to use ADDS or AADDS.
114+
Azure NetApp Files supports both [Active Directory Domain Services](/windows-server/identity/ad-ds/plan/understanding-active-directory-site-topology) (AD DS) and Azure Active Directory Domain Services (AADDS) for AD connections. Before you create an AD connection, you need to decide whether to use AD DS or AADDS.
115115

116116
For more information, see [Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services](../active-directory-domain-services/compare-identity-solutions.md).
117117

118118
### Active Directory Domain Services
119119

120-
You can use your preferred [Active Directory Sites and Services](/windows-server/identity/ad-ds/plan/understanding-active-directory-site-topology) scope for Azure NetApp Files. This option enables reads and writes to Active Directory Domain Services (ADDS) domain controllers that are [accessible by Azure NetApp Files](azure-netapp-files-network-topologies.md). It also prevents the service from communicating with domain controllers that are not in the specified Active Directory Sites and Services site.
120+
You can use your preferred [Active Directory Sites and Services](/windows-server/identity/ad-ds/plan/understanding-active-directory-site-topology) scope for Azure NetApp Files. This option enables reads and writes to Active Directory Domain Services (AD DS) domain controllers that are [accessible by Azure NetApp Files](azure-netapp-files-network-topologies.md). It also prevents the service from communicating with domain controllers that are not in the specified Active Directory Sites and Services site.
121121

122-
To find your site name when you use ADDS, you can contact the administrative group in your organization that is responsible for Active Directory Domain Services. The example below shows the Active Directory Sites and Services plugin where the site name is displayed:
122+
To find your site name when you use AD DS, you can contact the administrative group in your organization that is responsible for Active Directory Domain Services. The example below shows the Active Directory Sites and Services plugin where the site name is displayed:
123123

124124
![Active Directory Sites and Services](../media/azure-netapp-files/azure-netapp-files-active-directory-sites-services.png)
125125

@@ -187,29 +187,19 @@ This setting is configured in the **Active Directory Connections** under **NetAp
187187

188188
![Join Active Directory](../media/azure-netapp-files/azure-netapp-files-join-active-directory.png)
189189

190-
* **AES Encryption**
190+
* <a name="aes-encryption"></a>**AES Encryption**
191191
Select this checkbox if you want to enable AES encryption for AD authentication or if you require [encryption for SMB volumes](azure-netapp-files-create-volumes-smb.md#add-an-smb-volume).
192192

193193
See [Requirements for Active Directory connections](#requirements-for-active-directory-connections) for requirements.
194194

195195
![Active Directory AES encryption](../media/azure-netapp-files/active-directory-aes-encryption.png)
196196

197-
The **AES Encryption** feature is currently in preview. If this is your first time using this feature, register the feature before using it:
198197

199-
```azurepowershell-interactive
200-
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFAesEncryption
201-
```
198+
* <a name="encrypted-smb-connection"></a>**Encrypted SMB connection to domain controller**
202199

203-
Check the status of the feature registration:
200+
Select this checkbox to enable SMB encryption for communication between the Azure NetApp Files service and the domain controller (DC). When you enable this functionality, SMB3 protocol will be used for encrypted DC connections, because encryption is supported only by SMB3. SMB, Kerberos, and LDAP enabled volume creation will fail if the DC doesn't support the SMB3 protocol.
204201

205-
> [!NOTE]
206-
> The **RegistrationState** may be in the `Registering` state for up to 60 minutes before changing to`Registered`. Wait until the status is `Registered` before continuing.
207-
208-
```azurepowershell-interactive
209-
Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFAesEncryption
210-
```
211-
212-
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
202+
![Snapshot that shows the option for encrypted SMB connection to domain controller.](../media/azure-netapp-files/encrypted-smb-domain-controller.png)
213203

214204
* **LDAP Signing**
215205
Select this checkbox to enable LDAP signing. This functionality enables secure LDAP lookups between the Azure NetApp Files service and the user-specified [Active Directory Domain Services domain controllers](/windows/win32/ad/active-directory-domain-services). For more information, see [ADV190023 | Microsoft Guidance for Enabling LDAP Channel Binding and LDAP Signing](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV190023).
@@ -233,11 +223,13 @@ This setting is configured in the **Active Directory Connections** under **NetAp
233223
234224
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
235225
226+
227+
236228
* **LDAP over TLS**
237-
See [Enable Active Directory Domain Services (ADDS) LDAP authentication for NFS volumes](configure-ldap-over-tls.md) for information about this option.
229+
See [Enable Active Directory Domain Services (AD DS) LDAP authentication for NFS volumes](configure-ldap-over-tls.md) for information about this option.
238230
239231
* **LDAP Search Scope**, **User DN**, **Group DN**, and **Group Membership Filter**
240-
See [Configure ADDS LDAP with extended groups for NFS volume access](configure-ldap-extended-groups.md#ldap-search-scope) for information about these options.
232+
See [Configure AD DS LDAP with extended groups for NFS volume access](configure-ldap-extended-groups.md#ldap-search-scope) for information about these options.
241233
242234
* **Security privilege users** <!-- SMB CA share feature -->
243235
You can grant security privilege (`SeSecurityPrivilege`) to AD users or groups that require elevated privilege to access the Azure NetApp Files volumes. The specified AD users or groups will be allowed to perform certain actions on Azure NetApp Files SMB shares that require security privilege not assigned by default to domain users.
@@ -259,7 +251,7 @@ This setting is configured in the **Active Directory Connections** under **NetAp
259251
260252
![Screenshot showing the Security privilege users box of Active Directory connections window.](../media/azure-netapp-files/security-privilege-users.png)
261253
262-
* **Backup policy users**
254+
* <a name="backup-policy-users"></a>**Backup policy users**
263255
You can grant additional security privileges to AD users or groups that require elevated backup privileges to access the Azure NetApp Files volumes. The specified AD user accounts or groups will have elevated NTFS permissions at the file or folder level. For example, you can specify a non-privileged service account used for backing up, restoring, or migrating data to an SMB file share in Azure NetApp Files.
264256
265257
The following privileges apply when you use the **Backup policy users** setting:
@@ -270,24 +262,7 @@ This setting is configured in the **Active Directory Connections** under **NetAp
270262
| `SeRestorePrivilege` | Restore files and directories, overriding any ACLs. <br> Set any valid user or group SID as the file owner. |
271263
| `SeChangeNotifyPrivilege` | Bypass traverse checking. <br> Users with this privilege are not required to have traverse (`x`) permissions to traverse folders or symlinks. |
272264
273-
![Active Directory backup policy users](../media/azure-netapp-files/active-directory-backup-policy-users.png)
274-
275-
The **Backup policy users** feature is currently in preview. If this is your first time using this feature, register the feature before using it:
276-
277-
```azurepowershell-interactive
278-
Register-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFBackupOperator
279-
```
280-
281-
Check the status of the feature registration:
282-
283-
> [!NOTE]
284-
> The **RegistrationState** may be in the `Registering` state for up to 60 minutes before changing to`Registered`. Wait until the status is `Registered` before continuing.
285-
286-
```azurepowershell-interactive
287-
Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFBackupOperator
288-
```
289-
290-
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
265+
![Active Directory backup policy users](../media/azure-netapp-files/active-directory-backup-policy-users.png)
291266
292267
* **Administrators privilege users**
293268
@@ -362,5 +337,5 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
362337
* [Create a dual-protocol volume](create-volumes-dual-protocol.md)
363338
* [Configure NFSv4.1 Kerberos encryption](configure-kerberos-encryption.md)
364339
* [Install a new Active Directory forest using Azure CLI](/windows-server/identity/ad-ds/deploy/virtual-dc/adds-on-azure-vm)
365-
* [Enable Active Directory Domain Services (ADDS) LDAP authentication for NFS volumes](configure-ldap-over-tls.md)
366-
* [ADDS LDAP with extended groups for NFS volume access](configure-ldap-extended-groups.md)
340+
* [Enable Active Directory Domain Services (AD DS) LDAP authentication for NFS volumes](configure-ldap-over-tls.md)
341+
* [AD DS LDAP with extended groups for NFS volume access](configure-ldap-extended-groups.md)

0 commit comments

Comments
 (0)