Skip to content

Commit 90b6e64

Browse files
Merge pull request #288907 from khdownie/kendownie102124
Rename ad ds files that now apply to more than just ad ds
2 parents a02ce10 + d4041f8 commit 90b6e64

17 files changed

+63
-44
lines changed

articles/storage/.openpublishing.redirection.storage.json

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1247,8 +1247,8 @@
12471247
},
12481248
{
12491249
"source_path_from_root": "/articles/storage/files/storage-files-active-directory-domain-services-enable.md",
1250-
"redirect_url": "/azure/storage/files/storage-files-identity-auth-active-directory-enable",
1251-
"redirect_document_id": true
1250+
"redirect_url": "/azure/storage/files/storage-files-identity-ad-ds-overview",
1251+
"redirect_document_id": false
12521252
},
12531253
{
12541254
"source_path_from_root": "/articles/storage/files/storage-files-active-directory-enable.md",
@@ -1405,6 +1405,26 @@
14051405
"redirect_url": "/azure/storage/files/storage-troubleshoot-windows-file-connection-problems#unable-to-modify-moverename-or-delete-a-file-or-directory",
14061406
"redirect_document_id": false
14071407
},
1408+
{
1409+
"source_path_from_root": "/articles/storage/files/storage-files-identity-ad-ds-assign-permissions.md",
1410+
"redirect_url": "/azure/storage/files/storage-files-identity-assign-share-level-permissions",
1411+
"redirect_document_id": true
1412+
},
1413+
{
1414+
"source_path_from_root": "/articles/storage/files/storage-files-identity-ad-ds-configure-permissions.md",
1415+
"redirect_url": "/azure/storage/files/storage-files-identity-configure-file-level-permissions",
1416+
"redirect_document_id": true
1417+
},
1418+
{
1419+
"source_path_from_root": "/articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md",
1420+
"redirect_url": "/azure/storage/files/storage-files-identity-mount-file-share",
1421+
"redirect_document_id": true
1422+
},
1423+
{
1424+
"source_path_from_root": "/articles/storage/files/storage-files-identity-auth-active-directory-enable.md",
1425+
"redirect_url": "/azure/storage/files/storage-files-identity-ad-ds-overview",
1426+
"redirect_document_id": true
1427+
},
14081428
{
14091429
"source_path_from_root": "/articles/storage/queues/authorize-active-directory-powershell.md",
14101430
"redirect_url": "/azure/storage/queues/authorize-data-operations-powershell",

articles/storage/files/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@
8888
- name: On-premises AD DS authentication
8989
items:
9090
- name: AD DS overview
91-
href: storage-files-identity-auth-active-directory-enable.md
91+
href: storage-files-identity-ad-ds-overview.md
9292
- name: Enable AD DS authentication
9393
href: storage-files-identity-ad-ds-enable.md
9494
- name: Use Azure Files with multiple AD DS forests
@@ -108,11 +108,11 @@
108108
- name: Assign and manage permissions
109109
items:
110110
- name: Assign share-level permissions
111-
href: storage-files-identity-ad-ds-assign-permissions.md
112-
- name: Assign directory/file-level permissions
113-
href: storage-files-identity-ad-ds-configure-permissions.md
111+
href: storage-files-identity-assign-share-level-permissions.md
112+
- name: Configure directory/file-level permissions
113+
href: storage-files-identity-configure-file-level-permissions.md
114114
- name: Mount file share
115-
href: storage-files-identity-ad-ds-mount-file-share.md
115+
href: storage-files-identity-mount-file-share.md
116116
- name: Linux identity-based authentication
117117
href: storage-files-identity-auth-linux-kerberos-enable.md
118118
- name: Authorize access to file data

articles/storage/files/storage-files-active-directory-overview.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Azure Files supports identity-based authentication over SMB through the followin
5555

5656
## Restrictions
5757

58-
- None of the authentication methods support assigning share-level permissions to computer accounts (machine accounts) using Azure RBAC, because computer accounts can't be synced to an identity in Microsoft Entra ID. If you want to allow a computer account to access Azure file shares using identity-based authentication, [use a default share-level permission](storage-files-identity-ad-ds-assign-permissions.md#share-level-permissions-for-all-authenticated-identities) or consider using a service logon account instead.
58+
- None of the authentication methods support assigning share-level permissions to computer accounts (machine accounts) using Azure RBAC, because computer accounts can't be synced to an identity in Microsoft Entra ID. If you want to allow a computer account to access Azure file shares using identity-based authentication, [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities) or consider using a service logon account instead.
5959
- Identity-based authentication isn't supported with Network File System (NFS) shares.
6060

6161
## Common use cases
@@ -101,7 +101,7 @@ The following diagram depicts on-premises AD DS authentication to Azure file sha
101101

102102
:::image type="content" source="media/storage-files-active-directory-overview/files-ad-ds-auth-diagram.png" alt-text="Diagram that depicts on-premises AD DS authentication to Azure file shares over SMB.":::
103103

104-
To learn how to enable AD DS authentication, first read [Overview - on-premises Active Directory Domain Services authentication over SMB for Azure file shares](storage-files-identity-auth-active-directory-enable.md) and then see [Enable AD DS authentication for Azure file shares](storage-files-identity-ad-ds-enable.md).
104+
To learn how to enable AD DS authentication, first read [Overview - on-premises Active Directory Domain Services authentication over SMB for Azure file shares](storage-files-identity-ad-ds-overview.md) and then see [Enable AD DS authentication for Azure file shares](storage-files-identity-ad-ds-enable.md).
105105

106106
<a name='azure-ad-ds'></a>
107107

@@ -171,8 +171,7 @@ There's no additional service charge to enable identity-based authentication ove
171171

172172
For more information about Azure Files and identity-based authentication over SMB, see these resources:
173173

174-
- [Planning for an Azure Files deployment](storage-files-planning.md)
175-
- [Overview - on-premises Active Directory Domain Services authentication over SMB for Azure file shares](storage-files-identity-auth-active-directory-enable.md)
174+
- [Overview - on-premises Active Directory Domain Services authentication over SMB for Azure file shares](storage-files-identity-ad-ds-overview.md)
176175
- [Enable Microsoft Entra Domain Services authentication on Azure Files](storage-files-identity-auth-domain-services-enable.md)
177176
- [Enable Microsoft Entra Kerberos authentication for hybrid identities on Azure Files](storage-files-identity-auth-hybrid-identities-enable.md)
178177
- [Enable AD Kerberos authentication for Linux clients](storage-files-identity-auth-linux-kerberos-enable.md)

articles/storage/files/storage-files-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ ms.topic: faq
131131
* <a id="ad-file-mount-cname"></a>
132132
**Can I use the canonical name (CNAME) to mount an Azure file share while using identity-based authentication?**
133133

134-
Yes, this scenario is now supported in both [single-forest](storage-files-identity-ad-ds-mount-file-share.md#mount-file-shares-using-custom-domain-names) and [multi-forest](storage-files-identity-multiple-forests.md) environments for SMB Azure file shares. However, Azure Files only supports configuring CNAMEs using the storage account name as a domain prefix. If you don't want to use the storage account name as a prefix, consider using [DFS Namespaces](files-manage-namespaces.md) instead.
134+
Yes, this scenario is now supported in both [single-forest](storage-files-identity-mount-file-share.md#mount-file-shares-using-custom-domain-names) and [multi-forest](storage-files-identity-multiple-forests.md) environments for SMB Azure file shares. However, Azure Files only supports configuring CNAMEs using the storage account name as a domain prefix. If you don't want to use the storage account name as a prefix, consider using [DFS Namespaces](files-manage-namespaces.md) instead.
135135

136136
* <a id="ad-vm-subscription"></a>
137137
**Can I access Azure file shares with Microsoft Entra credentials from a VM under a different subscription?**
@@ -149,7 +149,7 @@ ms.topic: faq
149149
Azure Files on-premises AD DS authentication only integrates with the forest of the domain service that the storage account is registered to. To support authentication from another forest, your environment must have a forest trust configured correctly. For detailed instructions, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
150150

151151
> [!Note]
152-
> In a multi-forest setup, don't use File Explorer to configure Windows ACLs/NTFS permissions at the root, directory, or file level. [Use icacls](storage-files-identity-ad-ds-configure-permissions.md#configure-windows-acls-with-icacls) instead.
152+
> In a multi-forest setup, don't use File Explorer to configure Windows ACLs/NTFS permissions at the root, directory, or file level. [Use icacls](storage-files-identity-configure-file-level-permissions.md#configure-windows-acls-with-icacls) instead.
153153
154154

155155
* <a id="ad-aad-smb-files"></a>

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ recommendations: false
1515
This article describes the process for enabling Active Directory Domain Services (AD DS) authentication on your storage account in order to use on-premises Active Directory (AD) credentials for authenticating to Azure file shares.
1616

1717
> [!IMPORTANT]
18-
> Before you enable AD DS authentication, make sure you understand the supported scenarios and requirements in the [overview article](storage-files-identity-auth-active-directory-enable.md) and complete the necessary [prerequisites](storage-files-identity-auth-active-directory-enable.md#prerequisites). If your Active Directory environment spans multiple forests, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
18+
> Before you enable AD DS authentication, make sure you understand the supported scenarios and requirements in the [overview article](storage-files-identity-ad-ds-overview.md) and complete the necessary [prerequisites](storage-files-identity-auth-active-directory-enable.md#prerequisites). If your Active Directory environment spans multiple forests, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
1919
2020
To enable AD DS authentication over SMB for Azure file shares, you need to register your Azure storage account with your on-premises AD DS and then set the required domain properties on the storage account. To register your storage account with AD DS, you create a computer account (or service logon account) representing it in your AD DS. Think of this process as if it were like creating an account representing an on-premises Windows file server in your AD DS. When the feature is enabled on the storage account, it applies to all new and existing file shares in the account.
2121

@@ -271,4 +271,4 @@ AzureStorageID:<yourStorageSIDHere>
271271

272272
## Next step
273273

274-
You've now successfully enabled AD DS on your storage account. To use the feature, you must [assign share-level permissions](storage-files-identity-ad-ds-assign-permissions.md).
274+
You've now successfully enabled AD DS on your storage account. To use the feature, you must [assign share-level permissions](storage-files-identity-assign-share-level-permissions.md).

articles/storage/files/storage-files-identity-auth-active-directory-enable.md renamed to articles/storage/files/storage-files-identity-ad-ds-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,14 +27,14 @@ If you're new to Azure Files, we recommend reading our [planning guide](storage-
2727

2828
## Supported scenarios and restrictions
2929

30-
- AD DS identities used for Azure Files on-premises AD DS authentication must be synced to Microsoft Entra ID or [use a default share-level permission](storage-files-identity-ad-ds-assign-permissions.md#share-level-permissions-for-all-authenticated-identities). Password hash synchronization is optional.
30+
- AD DS identities used for Azure Files on-premises AD DS authentication must be synced to Microsoft Entra ID or [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities). Password hash synchronization is optional.
3131
- Supports Azure file shares managed by Azure File Sync.
3232
- Supports Kerberos authentication with AD with [AES 256 encryption](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 128 Kerberos encryption isn't yet supported.
3333
- Supports single sign-on experience.
3434
- Only supported on Windows clients running OS versions Windows 8/Windows Server 2012 or newer, or Linux VMs (Ubuntu 18.04+ or an equivalent RHEL or SLES VM).
3535
- Only supported against the AD forest that the storage account is registered to. Users belonging to different domains within the same forest should be able to access the file share and underlying directories/files as long as they have the appropriate permissions.
3636
- You can only access Azure file shares with the AD DS credentials from a single forest by default. If you need to access your Azure file share from a different forest, make sure that you have the proper forest trust configured. For details, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
37-
- Doesn't support assigning share-level permissions to computer accounts (machine accounts) using Azure RBAC. You can either [use a default share-level permission](storage-files-identity-ad-ds-assign-permissions.md#share-level-permissions-for-all-authenticated-identities) to allow computer accounts to access the share, or consider using a service logon account instead.
37+
- Doesn't support assigning share-level permissions to computer accounts (machine accounts) using Azure RBAC. You can either [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities) to allow computer accounts to access the share, or consider using a service logon account instead.
3838
- Doesn't support authentication against Network File System (NFS) file shares.
3939

4040
When you enable AD DS for Azure file shares over SMB, your AD DS-joined machines can mount Azure file shares using your existing AD DS credentials. This capability can be enabled with an AD DS environment hosted either in on-premises machines or hosted on a virtual machine (VM) in Azure.
@@ -45,7 +45,7 @@ To help you set up identity-based authentication for some common use cases, we p
4545

4646
| Replacing on-premises file servers with Azure Files (including setup on private link for files and AD authentication) | Using Azure Files as the profile container for Azure Virtual Desktop (including setup on AD authentication and FSLogix configuration) |
4747
|-|-|
48-
| [![Screencast of the replacing on-premises file servers video - click to play.](./media/storage-files-identity-auth-active-directory-enable/replace-on-prem-server-thumbnail.png)](https://www.youtube.com/watch?v=jd49W33DxkQ) | [![Screencast of the Using Azure Files as the profile container video - click to play.](./media/storage-files-identity-auth-active-directory-enable/files-ad-ds-fslogix-thumbnail.png)](https://www.youtube.com/watch?v=9S5A1IJqfOQ) |
48+
| [![Screencast of the replacing on-premises file servers video - click to play.](./media/storage-files-identity-ad-ds-overview/replace-on-premises-server-thumbnail.png)](https://www.youtube.com/watch?v=jd49W33DxkQ) | [![Screencast of the Using Azure Files as the profile container video - click to play.](./media/storage-files-identity-ad-ds-overview/files-ad-ds-fslogix-thumbnail.png)](https://www.youtube.com/watch?v=9S5A1IJqfOQ) |
4949

5050
## Prerequisites
5151

@@ -57,7 +57,7 @@ Before you enable AD DS authentication for Azure file shares, make sure you've c
5757

5858
- Domain-join an on-premises machine or an Azure VM to on-premises AD DS. For information about how to domain-join, refer to [Join a Computer to a Domain](/windows-server/identity/ad-fs/deployment/join-a-computer-to-a-domain).
5959

60-
If a machine isn't domain joined, you can still use AD DS for authentication if the machine has unimpeded network connectivity to the on-premises AD domain controller and the user provides explicit credentials. For more information, see [Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain](storage-files-identity-ad-ds-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm-or-a-vm-joined-to-a-different-ad-domain).
60+
If a machine isn't domain joined, you can still use AD DS for authentication if the machine has unimpeded network connectivity to the on-premises AD domain controller and the user provides explicit credentials. For more information, see [Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain](storage-files-identity-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm-or-a-vm-joined-to-a-different-ad-domain).
6161

6262
- Select or create an Azure storage account. For optimal performance, we recommend that you deploy the storage account in the same region as the client from which you plan to access the share. Then, [mount the Azure file share](storage-how-to-use-files-windows.md) with your storage account key. Mounting with the storage account key verifies connectivity.
6363

@@ -81,11 +81,11 @@ Follow these steps to set up Azure Files for AD DS authentication:
8181

8282
1. [Enable AD DS authentication on your storage account](storage-files-identity-ad-ds-enable.md)
8383

84-
1. [Assign share-level permissions to the Microsoft Entra identity (a user, group, or service principal) that is in sync with the target AD identity](storage-files-identity-ad-ds-assign-permissions.md)
84+
1. [Assign share-level permissions to the Microsoft Entra identity (a user, group, or service principal) that is in sync with the target AD identity](storage-files-identity-assign-share-level-permissions.md)
8585

86-
1. [Configure Windows ACLs over SMB for directories and files](storage-files-identity-ad-ds-configure-permissions.md)
86+
1. [Configure Windows ACLs over SMB for directories and files](storage-files-identity-configure-file-level-permissions.md)
8787

88-
1. [Mount an Azure file share to a VM joined to your AD DS](storage-files-identity-ad-ds-mount-file-share.md)
88+
1. [Mount an Azure file share to a VM joined to your AD DS](storage-files-identity-mount-file-share.md)
8989

9090
1. [Update the password of your storage account identity in AD DS](storage-files-identity-ad-ds-update-password.md)
9191

0 commit comments

Comments
 (0)