Skip to content

Commit 8a5ad5f

Browse files
authored
Update AD DS overview with client OS requirements
incorporating Maxime's suggestions
1 parent 6766ea6 commit 8a5ad5f

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

articles/storage/files/storage-files-identity-ad-ds-overview.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,12 @@ If you're new to Azure Files, we recommend reading our [planning guide](storage-
3434
## Supported scenarios and restrictions
3535

3636
- To assign share-level RBAC permissions to specific users or groups, on-premises AD DS identities must be synced to Microsoft Entra ID using Entra Connect Sync. If identities aren't synced, you must [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities), which applies to all authenticated users. Password hash synchronization isn't required.
37+
- Client OS requirements: Windows 8 / Windows Server 2012 or later, or Linux VMs such as Ubuntu 18.04+ and equivalent RHEL/SLES distributions.
3738
- Azure file shares can be managed with Azure File Sync.
3839
- Kerberos authentication is available with Active Directory using [AES 256 encryption](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 128 Kerberos encryption isn't yet supported.
3940
- Single sign-on (SSO) is supported.
40-
- Client OS requirements: Windows 8 / Windows Server 2012 or later, or Linux VMs such as Ubuntu 18.04+ and equivalent RHEL/SLES distributions.
4141
- Access is limited to the Active Directory forest where the storage account is registered. Users in other domains within the same forest can access the file share if they have appropriate permissions.
42-
- By default, only one AD DS forest is supported. To enable access from additional forests, you must configure a forest trust. For details, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
43-
- Share-level RBAC permissions can't be assigned to computer accounts. Use a default share-level permission or a service logon account instead.
42+
- By default access is limited to the Active Directory forest where the storage account is registered. Users from any domain in that forest can access the file share contents, provided they have the appropriate permissions. To enable access from additional forests, you must configure a forest trust. For details, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
4443
- Identity-based authentication isn't currently supported for NFS file shares.
4544

4645
When you enable AD DS for Azure file shares over SMB, your AD DS-joined machines can mount Azure file shares using your existing AD DS credentials. The AD DS environment can be hosted either on-premises or on a virtual machine (VM) in Azure.

0 commit comments

Comments
 (0)