Skip to content

Commit 87a4674

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-metadata-domain-services
2 parents 2ff29ca + f17dab4 commit 87a4674

File tree

8 files changed

+9
-7
lines changed

8 files changed

+9
-7
lines changed

articles/sentinel/sentinel-solution.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
title: Monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
33
description: Install and learn how to use the Microsoft Sentinel Zero Trust (TIC3.0) solution for an automated visualization of Zero Trust principles, cross-walked to the Trusted Internet Connections framework.
44
ms.date: 01/09/2023
5-
ms.service: network-access
65
author: austinmccollum
76
ms.author: austinmc
87
ms.topic: how-to
Loading
Loading
Loading

articles/storage/files/storage-files-identity-auth-domain-services-enable.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,14 @@ description: Learn how to enable identity-based authentication over Server Messa
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 11/28/2023
7+
ms.date: 03/01/2024
88
ms.author: kendownie
99
ms.custom: engagement-fy23, devx-track-azurecli, devx-track-azurepowershell
1010
recommendations: false
1111
---
1212

1313
# Enable Microsoft Entra Domain Services authentication on Azure Files
14+
1415
[!INCLUDE [storage-files-aad-auth-include](../../../includes/storage-files-aad-auth-include.md)]
1516

1617
This article focuses on enabling and configuring Microsoft Entra Domain Services (formerly Azure Active Directory Domain Services) for identity-based authentication with Azure file shares. In this authentication scenario, Microsoft Entra credentials and Microsoft Entra Domain Services credentials are the same and can be used interchangeably.
@@ -25,6 +26,7 @@ If you're new to Azure Files, we recommend reading our [planning guide](storage-
2526
> Azure Files supports authentication for Microsoft Entra Domain Services with full or partial (scoped) synchronization with Microsoft Entra ID. For environments with scoped synchronization present, administrators should be aware that Azure Files only honors Azure RBAC role assignments granted to principals that are synchronized. Role assignments granted to identities not synchronized from Microsoft Entra ID to Microsoft Entra Domain Services will be ignored by the Azure Files service.
2627
2728
## Applies to
29+
2830
| File share type | SMB | NFS |
2931
|-|:-:|:-:|
3032
| Standard file shares (GPv2), LRS/ZRS | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
@@ -80,7 +82,7 @@ Follow these steps to grant access to Azure Files resources with Microsoft Entra
8082

8183
The following diagram illustrates the end-to-end workflow for enabling Microsoft Entra Domain Services authentication over SMB for Azure Files.
8284

83-
![Diagram showing Microsoft Entra ID over SMB for Azure Files workflow](media/storage-files-active-directory-enable/azure-active-directory-over-smb-workflow.png)
85+
:::image type="content" source="media/storage-files-identity-auth-domain-services-enable/files-entra-domain-services-workflow.png" alt-text="Diagram showing Microsoft Entra ID over SMB for Azure Files workflow." lightbox="media/storage-files-identity-auth-domain-services-enable/files-entra-domain-services-workflow.png" border="false":::
8486

8587
<a name='enable-azure-ad-ds-authentication-for-your-account'></a>
8688

@@ -95,14 +97,15 @@ Keep in mind that you can enable Microsoft Entra Domain Services authentication
9597
To enable Microsoft Entra Domain Services authentication over SMB with the [Azure portal](https://portal.azure.com), follow these steps:
9698

9799
1. In the Azure portal, go to your existing storage account, or [create a storage account](../common/storage-account-create.md).
98-
1. In the **File shares** section, select **Active directory: Not Configured**.
100+
1. Select **Data storage** > **File shares**.
101+
1. In the **File share settings** section, select **Identity-based access: Not configured**.
99102

100-
:::image type="content" source="media/storage-files-active-directory-enable/files-azure-ad-enable-storage-account-identity.png" alt-text="Screenshot of the File shares pane in your storage account, Active directory is highlighted." lightbox="media/storage-files-active-directory-enable/files-azure-ad-enable-storage-account-identity.png":::
103+
:::image type="content" source="media/storage-files-identity-auth-domain-services-enable/enable-entra-storage-account-identity.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access is highlighted." lightbox="media/storage-files-identity-auth-domain-services-enable/enable-entra-storage-account-identity.png":::
101104

102-
1. Select **Microsoft Entra Domain Services** then enable the feature by ticking the checkbox.
105+
1. Under **Microsoft Entra Domain Services** select **Set up**, then enable the feature by ticking the checkbox.
103106
1. Select **Save**.
104107

105-
:::image type="content" source="media/storage-files-active-directory-enable/files-azure-ad-ds-highlight.png" alt-text="Screenshot of the Active Directory pane, Microsoft Entra Domain Services is enabled." lightbox="media/storage-files-active-directory-enable/files-azure-ad-ds-highlight.png":::
108+
:::image type="content" source="media/storage-files-identity-auth-domain-services-enable/entra-domain-services-highlight.png" alt-text="Screenshot of the identity-based access configuration pane, Microsoft Entra Domain Services is enabled as the source." lightbox="media/storage-files-identity-auth-domain-services-enable/entra-domain-services-highlight.png":::
106109

107110
# [PowerShell](#tab/azure-powershell)
108111

0 commit comments

Comments
 (0)