Skip to content

Commit 8ba3301

Browse files
authored
Merge pull request #109990 from yuemlu/master
Update the video
2 parents 0816b6e + c95cf67 commit 8ba3301

4 files changed

+41
-29
lines changed

articles/storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -57,16 +57,16 @@ Before you enable Azure AD DS Authentication over SMB for Azure file shares, ver
5757

5858
Next, do the following things to grant access to Azure Files resources with Azure AD credentials:
5959

60-
- Enable Azure AD DS authentication over SMB for your storage account to register the storage account with the associated Azure AD DS deployment.
61-
- Assign access permissions for a share to an Azure AD identity (a user, group, or service principal).
62-
- Configure NTFS permissions over SMB for directories and files.
63-
- Mount an Azure file share from a domain-joined VM.
60+
1. Enable Azure AD DS authentication over SMB for your storage account to register the storage account with the associated Azure AD DS deployment.
61+
2. Assign access permissions for a share to an Azure AD identity (a user, group, or service principal).
62+
3. Configure NTFS permissions over SMB for directories and files.
63+
4. Mount an Azure file share from a domain-joined VM.
6464

6565
The following diagram illustrates the end-to-end workflow for enabling Azure AD DS authentication over SMB for Azure Files.
6666

6767
![Diagram showing Azure AD over SMB for Azure Files workflow](media/storage-files-active-directory-enable/azure-active-directory-over-smb-workflow.png)
6868

69-
## Enable Azure AD DS authentication for your account
69+
## 1. Enable Azure AD DS authentication for your account
7070

7171
To enable Azure AD DS authentication over SMB for Azure Files, you can set a property on storage accounts by using the Azure portal, Azure PowerShell, or Azure CLI. Setting this property implicitly "domain joins" the storage account with the associated Azure AD DS deployment. Azure AD DS authentication over SMB is then enabled for all new and existing file shares in the storage account.
7272

@@ -131,7 +131,7 @@ az storage account update -n <storage-account-name> -g <resource-group-name> --e
131131

132132
[!INCLUDE [storage-files-aad-permissions-and-mounting](../../../includes/storage-files-aad-permissions-and-mounting.md)]
133133

134-
You have now successfully enabled Azure AD DS authentication over SMB and assigned a custom role that provides access to an Azure file share with an Azure AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB sections](#configure-ntfs-permissions-over-smb).
134+
You have now successfully enabled Azure AD DS authentication over SMB and assigned a custom role that provides access to an Azure file share with an Azure AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#2-assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB sections](#3-configure-ntfs-permissions-over-smb).
135135

136136
## Next steps
137137

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 24 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ ms.author: rogarana
2929
When you enable AD for Azure file shares over SMB, your AD domain joined machines can mount Azure file shares using your existing AD credentials. This capability can be enabled with an AD environment hosted either in on-prem machines or hosted in Azure.
3030

3131
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This feature offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
32+
33+
> [!NOTE]
34+
> To help you setup Azure Files AD authentication for the common use cases, we published [two videos](https://docs.microsoft.com/azure/storage/files/storage-files-introduction#videos) with the step by step guidance on replacing on-premises file servers with Azure Files and using Azure Files as the profile container for Windows Virtual Desktop.
3235
3336
## Prerequisites
3437

@@ -64,15 +67,17 @@ Azure Files AD authentication (preview) is available in [all regions in Public C
6467

6568
Before you enable AD Authentication over SMB for Azure file shares, we recommend that you walk through the [prerequisites](#prerequisites) and make sure you've completed all the steps. The prerequisites validate that your AD, Azure AD, and Azure Storage environments are properly configured.
6669

67-
Next, grant access to Azure Files resources with AD credentials:
70+
Next, follow the steps below to setup Azure Files for AD Authentication:
71+
72+
1. Enable Azure Files AD authentication on your storage account.
6873

69-
- Enable Azure Files AD authentication on your storage account.
74+
2. Assign access permissions for a share to the Azure AD identity (a user, group, or service principal) that is in sync with the target AD identity.
7075

71-
- Assign access permissions for a share to the Azure AD identity (a user, group, or service principal) that is in sync with the target AD identity.
76+
3. Configure ACLs over SMB for directories and files.
7277

73-
- Configure ACLs over SMB for directories and files.
78+
4. Mount an Azure file share from an AD domain joined VM.
7479

75-
- Mount an Azure file share from an AD domain joined VM.
80+
5. Rotate AD account password (Optional)
7681

7782
The following diagram illustrates the end-to-end workflow for enabling Azure AD authentication over SMB for Azure file shares.
7883

@@ -81,25 +86,28 @@ The following diagram illustrates the end-to-end workflow for enabling Azure AD
8186
> [!NOTE]
8287
> AD authentication over SMB for Azure file shares is only supported on machines or VMs running on OS versions newer than Windows 7 or Windows Server 2008 R2.
8388
84-
## Enable AD authentication for your account
89+
## 1. Enable AD authentication for your account
8590

8691
To enable AD authentication over SMB for Azure file shares, you need to first register your storage account with AD and then set the required domain properties on the storage account. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account. Use `join-AzStorageAccountForAuth` to enable the feature. You can find the detailed description of the end-to-end workflow in the section below.
8792

8893
> [!IMPORTANT]
8994
> The `Join-AzStorageAccountForAuth` cmdlet will make modifications to your AD environment. Read the following explanation to better understand what it is doing to ensure you have the proper permissions to execute the command and that the applied changes align with the compliance and security policies.
9095
91-
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#update-ad-account-password).
96+
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) (default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#5-update-ad-account-password).
9297

9398
You can use the following script to perform the registration and enable the feature or, alternatively, you can manually perform the operations that the script would. Those operations are described in the section following the script. You do not need to do both.
9499

95-
### 1. Check prerequisites
100+
### 1.1 Check prerequisites
96101
- [Download and unzip the AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases)
97102
- Install and execute the module in a device that is domain joined to AD with AD credentials that have permissions to create a service logon account or a computer account in the target AD.
98103
- Run the script using an AD credential that is synced to your Azure AD. The AD credential must have either the storage account owner or the contributor RBAC role permissions.
99104
- Make sure your storage account is in a [supported region](#regional-availability).
100105

101-
### 2. Domain join your storage account
106+
### 1.2 Domain join your storage account
102107
Remember to replace the placeholder values with your own in the parameters below before executing it in PowerShell.
108+
> [!IMPORTANT]
109+
> We recommend you to provide an AD Organizational Unit (OU) that does NOT enforce password expiration. If you use an OU with password expiration configured, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#5-update-ad-account-password).
110+
103111

104112
```PowerShell
105113
#Change the execution policy to unblock importing AzFilesHybrid.psm1 module
@@ -118,19 +126,19 @@ Connect-AzAccount
118126
Select-AzSubscription -SubscriptionId "<your-subscription-id-here>"
119127
120128
# Register the target storage account with your active directory environment under the target OU (for example: specify the OU with Name as "UserAccounts" or DistinguishedName as "OU=UserAccounts,DC=CONTOSO,DC=COM").
121-
# You can use to this PowerShell cmdlet: Get-ADOrganizationalUnit to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it with -OrganizationalUnitDistinguishedName.
129+
# You can use to this PowerShell cmdlet: Get-ADOrganizationalUnit to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it with -OrganizationalUnitDistinguishedName. You can choose to provide one of the two names to specify the target OU.
122130
# You can choose to create the identity that represents the storage account as either a Service Logon Account or Computer Account, depends on the AD permission you have and preference.
123131
Join-AzStorageAccountForAuth `
124132
-ResourceGroupName "<resource-group-name-here>" `
125133
-Name "<storage-account-name-here>" `
126134
-DomainAccountType "ComputerAccount" `
127-
-OrganizationalUnitName "<ou-name-here>"
135+
-OrganizationalUnitName "<ou-name-here>" or -OrganizationalUnitDistinguishedName "<ou-distinguishedname-here>"
128136
```
129137

130138
The following description summarizes all actions performed when the `Join-AzStorageAccountForAuth` cmdlet gets executed. You may perform these steps manually, if you prefer not to use the command:
131139

132140
> [!NOTE]
133-
> If you have already executed the `Join-AzStorageAccountForAuth` script above successfully, go to the next section "3. Confirm that the feature is enabled". You do not need to perform the operations below again.
141+
> If you have already executed the `Join-AzStorageAccountForAuth` script above successfully, go to the next section "1.3 Confirm that the feature is enabled". You do not need to perform the operations below again.
134142
135143
#### a. Checking environment
136144

@@ -144,7 +152,7 @@ Once you have that key, create either a service or computer account under your O
144152
SPN: "cifs/your-storage-account-name-here.file.core.windows.net"
145153
Password: Kerberos key for your storage account.
146154

147-
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update AD account password](#update-ad-account-password) for details.
155+
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update AD account password](#5-update-ad-account-password) for details.
148156

149157
Keep the SID of the newly created account, you'll need it for the next step. The AD identity you have just created that represent the storage account does not need to be synced to Azure AD.
150158

@@ -167,7 +175,7 @@ Set-AzStorageAccount `
167175
```
168176

169177

170-
### 3. Confirm that the feature is enabled
178+
### 1.3 Confirm that the feature is enabled
171179

172180
You can check to confirm whether the feature is enabled on your storage account, you can use the following script:
173181

@@ -188,9 +196,9 @@ You've now successfully enabled the feature on your storage account. Even though
188196

189197
[!INCLUDE [storage-files-aad-permissions-and-mounting](../../../includes/storage-files-aad-permissions-and-mounting.md)]
190198

191-
You have now successfully enabled AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB](#configure-ntfs-permissions-over-smb) sections.
199+
You have now successfully enabled AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#2-assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB](#3-configure-ntfs-permissions-over-smb) sections.
192200

193-
## Update AD account password
201+
## 5. Update AD account password
194202

195203
If you registered the AD identity/account representing your storage account under an OU that enforces password expiration time, you must rotate the password before the maximum password age. Failing to update the password of the AD account will result in authentication failures to access Azure file shares.
196204

articles/storage/files/storage-files-introduction.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,13 @@ ms.subservice: files
1414
Azure Files offers fully managed file shares in the cloud that are accessible via the industry standard [Server Message Block (SMB) protocol](https://msdn.microsoft.com/library/windows/desktop/aa365233.aspx). Azure file shares can be mounted concurrently by cloud or on-premises deployments of Windows, Linux, and macOS. Additionally, Azure file shares can be cached on Windows Servers with Azure File Sync for fast access near where the data is being used.
1515

1616
## Videos
17-
| Introducing Azure File Sync (2 m) | Azure Files with Sync (Ignite 2017) (85 m) |
17+
| Introducing Azure File Sync | Azure Files with Sync (Ignite 2019) |
1818
|-|-|
19-
| [![Screencast of the Introducing Azure File Sync video - click to play!](./media/storage-files-introduction/azure-file-sync-video-snapshot.png)](https://www.youtube.com/watch?v=Zm2w8-TRn-o) | [![Screencast of the Azure Files with Sync presentation - click to play!](./media/storage-files-introduction/ignite-2018-video.png)](https://www.youtube.com/watch?v=GMzh2M66E9o) |
19+
| [![Screencast of the Introducing Azure File Sync video - click to play!](./media/storage-files-introduction/azure-file-sync-video-snapshot.png)](https://www.youtube.com/watch?v=Zm2w8-TRn-o) | [![Screencast of the Azure Files with Sync presentation - click to play!](./media/storage-files-introduction/ignite-2018-video.png)](https://www.youtube.com/embed/6E2p28XwovU) |
20+
21+
Here are some videos on the common use cases of Azure Files:
22+
* [Replace your file server with a serverless Azure File Share](https://sec.ch9.ms/ch9/3358/0addac01-3606-4e30-ad7b-f195f3ab3358/ITOpsTalkAzureFiles_high.mp4)
23+
* [Getting started with FSLogix profile containers on Azure Files in Windows Virtual Desktop leveraging AD authentication](https://www.youtube.com/embed/9S5A1IJqfOQ)
2024

2125
## Why Azure Files is useful
2226
Azure file shares can be used to:

0 commit comments

Comments
 (0)