You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,16 +57,16 @@ Before you enable Azure AD DS Authentication over SMB for Azure file shares, ver
57
57
58
58
Next, do the following things to grant access to Azure Files resources with Azure AD credentials:
59
59
60
-
- Enable Azure AD DS authentication over SMB for your storage account to register the storage account with the associated Azure AD DS deployment.
61
-
- Assign access permissions for a share to an Azure AD identity (a user, group, or service principal).
62
-
- Configure NTFS permissions over SMB for directories and files.
63
-
- Mount an Azure file share from a domain-joined VM.
60
+
1. Enable Azure AD DS authentication over SMB for your storage account to register the storage account with the associated Azure AD DS deployment.
61
+
2. Assign access permissions for a share to an Azure AD identity (a user, group, or service principal).
62
+
3. Configure NTFS permissions over SMB for directories and files.
63
+
4. Mount an Azure file share from a domain-joined VM.
64
64
65
65
The following diagram illustrates the end-to-end workflow for enabling Azure AD DS authentication over SMB for Azure Files.
66
66
67
67

68
68
69
-
## Enable Azure AD DS authentication for your account
69
+
## 1. Enable Azure AD DS authentication for your account
70
70
71
71
To enable Azure AD DS authentication over SMB for Azure Files, you can set a property on storage accounts by using the Azure portal, Azure PowerShell, or Azure CLI. Setting this property implicitly "domain joins" the storage account with the associated Azure AD DS deployment. Azure AD DS authentication over SMB is then enabled for all new and existing file shares in the storage account.
You have now successfully enabled Azure AD DS authentication over SMB and assigned a custom role that provides access to an Azure file share with an Azure AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB sections](#configure-ntfs-permissions-over-smb).
134
+
You have now successfully enabled Azure AD DS authentication over SMB and assigned a custom role that provides access to an Azure file share with an Azure AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#2-assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB sections](#3-configure-ntfs-permissions-over-smb).
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-auth-active-directory-enable.md
+24-16Lines changed: 24 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,9 @@ ms.author: rogarana
29
29
When you enable AD for Azure file shares over SMB, your AD domain joined machines can mount Azure file shares using your existing AD credentials. This capability can be enabled with an AD environment hosted either in on-prem machines or hosted in Azure.
30
30
31
31
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This feature offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
32
+
33
+
> [!NOTE]
34
+
> To help you setup Azure Files AD authentication for the common use cases, we published [two videos](https://docs.microsoft.com/azure/storage/files/storage-files-introduction#videos) with the step by step guidance on replacing on-premises file servers with Azure Files and using Azure Files as the profile container for Windows Virtual Desktop.
32
35
33
36
## Prerequisites
34
37
@@ -64,15 +67,17 @@ Azure Files AD authentication (preview) is available in [all regions in Public C
64
67
65
68
Before you enable AD Authentication over SMB for Azure file shares, we recommend that you walk through the [prerequisites](#prerequisites) and make sure you've completed all the steps. The prerequisites validate that your AD, Azure AD, and Azure Storage environments are properly configured.
66
69
67
-
Next, grant access to Azure Files resources with AD credentials:
70
+
Next, follow the steps below to setup Azure Files for AD Authentication:
71
+
72
+
1. Enable Azure Files AD authentication on your storage account.
68
73
69
-
- Enable Azure Files AD authentication on your storage account.
74
+
2. Assign access permissions for a share to the Azure AD identity (a user, group, or service principal) that is in sync with the target AD identity.
70
75
71
-
- Assign access permissions for a share to the Azure AD identity (a user, group, or service principal) that is in sync with the target AD identity.
76
+
3. Configure ACLs over SMB for directories and files.
72
77
73
-
- Configure ACLs over SMB for directories and files.
78
+
4. Mount an Azure file share from an AD domain joined VM.
74
79
75
-
- Mount an Azure file share from an AD domain joined VM.
80
+
5. Rotate AD account password (Optional)
76
81
77
82
The following diagram illustrates the end-to-end workflow for enabling Azure AD authentication over SMB for Azure file shares.
78
83
@@ -81,25 +86,28 @@ The following diagram illustrates the end-to-end workflow for enabling Azure AD
81
86
> [!NOTE]
82
87
> AD authentication over SMB for Azure file shares is only supported on machines or VMs running on OS versions newer than Windows 7 or Windows Server 2008 R2.
83
88
84
-
## Enable AD authentication for your account
89
+
## 1. Enable AD authentication for your account
85
90
86
91
To enable AD authentication over SMB for Azure file shares, you need to first register your storage account with AD and then set the required domain properties on the storage account. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account. Use `join-AzStorageAccountForAuth` to enable the feature. You can find the detailed description of the end-to-end workflow in the section below.
87
92
88
93
> [!IMPORTANT]
89
94
> The `Join-AzStorageAccountForAuth` cmdlet will make modifications to your AD environment. Read the following explanation to better understand what it is doing to ensure you have the proper permissions to execute the command and that the applied changes align with the compliance and security policies.
90
95
91
-
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#update-ad-account-password).
96
+
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory)(default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#5-update-ad-account-password).
92
97
93
98
You can use the following script to perform the registration and enable the feature or, alternatively, you can manually perform the operations that the script would. Those operations are described in the section following the script. You do not need to do both.
94
99
95
-
### 1. Check prerequisites
100
+
### 1.1 Check prerequisites
96
101
-[Download and unzip the AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases)
97
102
- Install and execute the module in a device that is domain joined to AD with AD credentials that have permissions to create a service logon account or a computer account in the target AD.
98
103
- Run the script using an AD credential that is synced to your Azure AD. The AD credential must have either the storage account owner or the contributor RBAC role permissions.
99
104
- Make sure your storage account is in a [supported region](#regional-availability).
100
105
101
-
### 2. Domain join your storage account
106
+
### 1.2 Domain join your storage account
102
107
Remember to replace the placeholder values with your own in the parameters below before executing it in PowerShell.
108
+
> [!IMPORTANT]
109
+
> We recommend you to provide an AD Organizational Unit (OU) that does NOT enforce password expiration. If you use an OU with password expiration configured, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#5-update-ad-account-password).
110
+
103
111
104
112
```PowerShell
105
113
#Change the execution policy to unblock importing AzFilesHybrid.psm1 module
# Register the target storage account with your active directory environment under the target OU (for example: specify the OU with Name as "UserAccounts" or DistinguishedName as "OU=UserAccounts,DC=CONTOSO,DC=COM").
121
-
# You can use to this PowerShell cmdlet: Get-ADOrganizationalUnit to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it with -OrganizationalUnitDistinguishedName.
129
+
# You can use to this PowerShell cmdlet: Get-ADOrganizationalUnit to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it with -OrganizationalUnitDistinguishedName. You can choose to provide one of the two names to specify the target OU.
122
130
# You can choose to create the identity that represents the storage account as either a Service Logon Account or Computer Account, depends on the AD permission you have and preference.
123
131
Join-AzStorageAccountForAuth `
124
132
-ResourceGroupName "<resource-group-name-here>" `
125
133
-Name "<storage-account-name-here>" `
126
134
-DomainAccountType "ComputerAccount" `
127
-
-OrganizationalUnitName "<ou-name-here>"
135
+
-OrganizationalUnitName "<ou-name-here>" or -OrganizationalUnitDistinguishedName "<ou-distinguishedname-here>"
128
136
```
129
137
130
138
The following description summarizes all actions performed when the `Join-AzStorageAccountForAuth` cmdlet gets executed. You may perform these steps manually, if you prefer not to use the command:
131
139
132
140
> [!NOTE]
133
-
> If you have already executed the `Join-AzStorageAccountForAuth` script above successfully, go to the next section "3. Confirm that the feature is enabled". You do not need to perform the operations below again.
141
+
> If you have already executed the `Join-AzStorageAccountForAuth` script above successfully, go to the next section "1.3 Confirm that the feature is enabled". You do not need to perform the operations below again.
134
142
135
143
#### a. Checking environment
136
144
@@ -144,7 +152,7 @@ Once you have that key, create either a service or computer account under your O
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update AD account password](#update-ad-account-password) for details.
155
+
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update AD account password](#5-update-ad-account-password) for details.
148
156
149
157
Keep the SID of the newly created account, you'll need it for the next step. The AD identity you have just created that represent the storage account does not need to be synced to Azure AD.
150
158
@@ -167,7 +175,7 @@ Set-AzStorageAccount `
167
175
```
168
176
169
177
170
-
### 3. Confirm that the feature is enabled
178
+
### 1.3 Confirm that the feature is enabled
171
179
172
180
You can check to confirm whether the feature is enabled on your storage account, you can use the following script:
173
181
@@ -188,9 +196,9 @@ You've now successfully enabled the feature on your storage account. Even though
You have now successfully enabled AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB](#configure-ntfs-permissions-over-smb) sections.
199
+
You have now successfully enabled AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#2-assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB](#3-configure-ntfs-permissions-over-smb) sections.
192
200
193
-
## Update AD account password
201
+
## 5. Update AD account password
194
202
195
203
If you registered the AD identity/account representing your storage account under an OU that enforces password expiration time, you must rotate the password before the maximum password age. Failing to update the password of the AD account will result in authentication failures to access Azure file shares.
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-introduction.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,13 @@ ms.subservice: files
14
14
Azure Files offers fully managed file shares in the cloud that are accessible via the industry standard [Server Message Block (SMB) protocol](https://msdn.microsoft.com/library/windows/desktop/aa365233.aspx). Azure file shares can be mounted concurrently by cloud or on-premises deployments of Windows, Linux, and macOS. Additionally, Azure file shares can be cached on Windows Servers with Azure File Sync for fast access near where the data is being used.
15
15
16
16
## Videos
17
-
| Introducing Azure File Sync (2 m) | Azure Files with Sync (Ignite 2017) (85 m) |
|[](https://www.youtube.com/watch?v=Zm2w8-TRn-o)|[](https://www.youtube.com/watch?v=GMzh2M66E9o)|
19
+
|[](https://www.youtube.com/watch?v=Zm2w8-TRn-o)|[](https://www.youtube.com/embed/6E2p28XwovU)|
20
+
21
+
Here are some videos on the common use cases of Azure Files:
22
+
*[Replace your file server with a serverless Azure File Share](https://sec.ch9.ms/ch9/3358/0addac01-3606-4e30-ad7b-f195f3ab3358/ITOpsTalkAzureFiles_high.mp4)
23
+
*[Getting started with FSLogix profile containers on Azure Files in Windows Virtual Desktop leveraging AD authentication](https://www.youtube.com/embed/9S5A1IJqfOQ)
0 commit comments