Skip to content

Commit 93b73f7

Browse files
Merge pull request #302181 from khdownie/kendownie070225-2
adjust secure transfer section
2 parents 7b8a26d + ad98c9a commit 93b73f7

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/storage/files/storage-files-networking-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: An overview of networking considerations and options for Azure File
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: overview
7-
ms.date: 05/10/2024
7+
ms.date: 07/02/2025
88
ms.author: kendownie
99
# Customer intent: As a network administrator, I want to configure secure access to Azure Files, so that I can manage file share access in accordance with my organization’s networking and security policies.
1010
---
@@ -42,18 +42,18 @@ Configuring public and private endpoints for Azure Files is done on the top-leve
4242

4343
## Secure transfer
4444

45-
By default, Azure storage accounts require secure transfer, regardless of whether data is accessed over the public or private endpoint. For Azure Files, the **require secure transfer** setting is enforced for all protocol access to the data stored on Azure file shares, including SMB, NFS, and FileREST. You can disable the **require secure transfer** setting to allow unencrypted traffic. In the Azure portal, you might also see this setting labeled as **require secure transfer for REST API operations**.
45+
By default, Azure storage accounts require secure transfer, regardless of whether data is accessed over the public or private endpoint. For Azure Files, the **Secure transfer required** setting is enforced for all protocol access to the data stored on Azure file shares, including SMB, NFS, and FileREST. You can disable the **Secure transfer required** setting to allow unencrypted traffic.
4646

47-
The SMB, NFS, and FileREST protocols have slightly different behavior with respect to the **require secure transfer** setting:
47+
The SMB, NFS, and FileREST protocols have slightly different behavior with respect to the **Secure transfer required** setting:
4848

49-
- When **require secure transfer** is enabled on a storage account, all SMB file shares in that storage account will require the SMB 3.x protocol with AES-128-CCM, AES-128-GCM, or AES-256-GCM encryption algorithms, depending on the available/required encryption negotiation between the SMB client and Azure Files. You can toggle which SMB encryption algorithms are allowed via the [SMB security settings](files-smb-protocol.md#smb-security-settings). Disabling the **require secure transfer** setting enables SMB 2.1 and SMB 3.x mounts without encryption.
49+
- When **Secure transfer required** is enabled on a storage account, all SMB file shares in that storage account will require the SMB 3.x protocol with AES-128-CCM, AES-128-GCM, or AES-256-GCM encryption algorithms, depending on the available/required encryption negotiation between the SMB client and Azure Files. You can toggle which SMB encryption algorithms are allowed via the [SMB security settings](files-smb-protocol.md#smb-security-settings). Disabling the **Secure transfer required** setting enables SMB 2.1 and SMB 3.x mounts without encryption.
5050

51-
- NFS file shares don't support an encryption mechanism, so in order to use the NFS protocol to access an Azure file share, you must disable **require secure transfer** for the storage account.
51+
- NFS Azure file shares use the AZNFS utility package to simplify encrypted mounts by installing and setting up Stunnel (an open-source TLS wrapper) on the client. See [Encryption in transit for NFS Azure file shares](encryption-in-transit-for-nfs-shares.md).
5252

53-
- When secure transfer is required, the FileREST protocol may only be used with HTTPS. FileREST is only supported on SMB file shares today.
53+
- When secure transfer is required, the FileREST protocol may only be used with HTTPS.
5454

5555
> [!NOTE]
56-
> Communication between a client and an Azure storage account is encrypted using Transport Layer Security (TLS). Azure Files relies on a Windows implementation of SSL that isn't based on OpenSSL and therefore isn't exposed to OpenSSL related vulnerabilities.
56+
> Communication between a client and an Azure storage account is encrypted using Transport Layer Security (TLS). Azure Files relies on a Windows implementation of SSL that isn't based on OpenSSL and therefore isn't exposed to OpenSSL related vulnerabilities. Users who prefer to maintain flexibility between TLS and non-TLS connections on the same storage account should disable **Secure transfer required**.
5757
5858
## Public endpoint
5959

@@ -62,7 +62,7 @@ The public endpoint for the Azure file shares within a storage account is an int
6262
The SMB, NFS, and FileREST protocols can all use the public endpoint. However, each has slightly different rules for access:
6363

6464
- SMB file shares are accessible from anywhere in the world via the storage account's public endpoint with SMB 3.x with encryption. This means that authenticated requests, such as requests authorized by a user's logon identity, can originate securely from inside or outside of the Azure region. If SMB 2.1 or SMB 3.x without encryption is desired, two conditions must be met:
65-
1. The storage account's **require secure transfer** setting must be disabled.
65+
1. The storage account's **Secure transfer required** setting must be disabled.
6666
2. The request must originate from inside of the Azure region. As previously mentioned, encrypted SMB requests are allowed from anywhere, inside or outside of the Azure region.
6767

6868
- NFS file shares are accessible from the storage account's public endpoint if and only if the storage account's public endpoint is restricted to specific virtual networks using *service endpoints*. See [public endpoint firewall settings](#public-endpoint-firewall-settings) for additional information on *service endpoints*.

0 commit comments

Comments
 (0)