Skip to content

Commit 8fbcef7

Browse files
Merge pull request #253017 from b-ahibbard/sme-feedback
sme feedback
2 parents 7635e56 + a2dc01c commit 8fbcef7

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/azure-netapp-files/access-smb-volume-from-windows-client.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,12 @@ author: b-ahibbard
88
ms.author: anfdocs
99
ms.date: 09/21/2023
1010
---
11-
# Access SMB volumes from Azure Active Directory joined Windows virtual machines
11+
# Access SMB volumes from Azure Active Directory-joined Windows virtual machines
1212

1313
You can use Azure Active Directory (Azure AD) with the Hybrid Authentication Management module to authenticate credentials in your hybrid cloud. This solution enables Azure AD to become the trusted source for both cloud and on-premises authentication, circumventing the need for clients connecting to Azure NetApp Files to join the on-premises AD domain.
1414

1515
>[!NOTE]
16-
>This process does not eliminate the need for Active Directory Domain Services (AD DS) as Azure NetApp Files requires connectivity to AD DS. For more information, see [Understand guidelines for Active Directory Domain Services site design and planning](understand-guidelines-active-directory-domain-service-site.md).
16+
>Using Azure AD for authenticating [hybrid user identities](../active-directory/hybrid/whatis-hybrid-identity.md) allows Azure AD users to access Azure NetApp Files SMB shares. This means your end users can access Azure NetApp Files SMB shares without requiring a line-of-sight to domain controllers from hybrid Azure AD-joined and Azure AD-joined VMs. Cloud-only identities aren't currently supported. For more information, see [Understand guidelines for Active Directory Domain Services site design and planning](understand-guidelines-active-directory-domain-service-site.md).
1717
1818
:::image type="content" source="../media/azure-netapp-files/diagram-windows-joined-active-directory.png" alt-text="Diagram of SMB volume joined to Azure Active Directory." lightbox="../media/azure-netapp-files/diagram-windows-joined-active-directory.png":::
1919

@@ -38,7 +38,7 @@ The configuration process takes you through five process:
3838
* Add the CIFS SPN to the computer account
3939
* Register a new Azure AD application
4040
* Sync CIFS password from AD DS to the Azure AD application registration
41-
* Configure the Azure AD joined VM to use Kerberos authentication
41+
* Configure the Azure AD-joined VM to use Kerberos authentication
4242
* Mount the Azure NetApp Files SMB volumes
4343

4444
### Add the CIFS SPN to the computer account
@@ -88,7 +88,7 @@ The configuration process takes you through five process:
8888
* `$servicePrincipalName`: The SPN details from mounting the Azure NetApp Files volume. Use the CIFS/FQDN format. For example: `CIFS/NETBIOS-1234.CONTOSO.COM`
8989
* `$targetApplicationID`: Application (client) ID of the Azure AD application.
9090
* `$domainCred`: use `Get-Credential` (should be an AD DS domain administrator)
91-
* `$cloudCred`: use `Get-Credential` (should be an AD DS domain administrator)
91+
* `$cloudCred`: use `Get-Credential` (should be an Azure AD global administrator)
9292
9393
```powershell
9494
$servicePrincipalName = CIFS/NETBIOS-1234.CONTOSO.COM
@@ -105,9 +105,9 @@ The configuration process takes you through five process:
105105
Import-AzureADKerberosOnPremServicePrincipal -Domain $domain -DomainCredential $domainCred -CloudCredential $cloudCred -ServicePrincipalName $servicePrincipalName -ApplicationId $targetApplicationId
106106
```
107107
108-
### Configure the Azure AD joined VM to use Kerberos authentication
108+
### Configure the Azure AD-joined VM to use Kerberos authentication
109109
110-
1. Log in to the Azure AD joined VM using hybrid credentials with administrative rights (for example: [email protected]).
110+
1. Log in to the Azure AD-joined VM using hybrid credentials with administrative rights (for example: [email protected]).
111111
1. Configure the VM:
112112
1. Navigate to **Edit group policy** > **Computer Configuration** > **Administrative Templates** > **System** > **Kerberos**.
113113
1. Enable **Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon**.
@@ -119,7 +119,7 @@ The configuration process takes you through five process:
119119
120120
### Mount the Azure NetApp Files SMB volumes
121121
122-
1. Log into to the Azure AD joined VM using a hybrid identity account synced from AD DS.
122+
1. Log into to the Azure AD-joined VM using a hybrid identity account synced from AD DS.
123123
2. Mount the Azure NetApp Files SMB volume using the info provided in the Azure portal. For more information, see [Mount SMB volumes for Windows VMs](mount-volumes-vms-smb.md).
124124
3. Confirm the mounted volume is using Kerberos authentication and not NTLM authentication. Open a command prompt, issue the `klist` command; observe the output in the cloud TGT (krbtgt) and CIFS server ticket information.
125125

0 commit comments

Comments
 (0)