Skip to content

Commit 99e8808

Browse files
committed
Updates
1 parent d0f2ccf commit 99e8808

7 files changed

+46
-47
lines changed

articles/storage/common/storage-auth.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,9 @@ Each authorization option is briefly described below:
3131

3232
- **Azure Active Directory (Azure AD) integration** for blobs, and queues. Azure AD provides role-based access control (RBAC) for fine-grained control over a client's access to resources in a storage account. For more information regarding Azure AD integration for blobs and queues, see [Authorize access to Azure blobs and queues using Azure Active Directory](storage-auth-aad.md).
3333

34-
- **Azure Active Directory Domain Services (AD DS) integration** for files. Azure Files supports identity-based authorization over Server Message Block (SMB) through Azure AD DS. You can use RBAC for fine-grained control over a client's access to Azure Files resources in a storage account. For more information regarding Azure AD integration for files using domain services, see [Overview of Azure Files identity-based authentication support for SMB access](../files/storage-files-active-directory-overview.md).
34+
- **Azure Active Directory Domain Services (Azure AD DS) authentication** for files. Azure Files supports identity-based authorization over Server Message Block (SMB) through Azure AD DS. You can use RBAC for fine-grained control over a client's access to Azure Files resources in a storage account. For more information regarding Azure Files authentication using domain services, refer to our [overview](../files/storage-files-active-directory-overview.md).
3535

36-
- **Active Directory (AD) Authentication (preview)** for files. Azure Files supports identity-based authorization over SMB through AD. Your AD domain service can be hosted on on-premises machines or in Azure VMs. SMB access to Files is supported using AD credentials from domain joined machines, either on-premises or in Azure. You can use RBAC for share level access control and NTFS DACLs for directory/file level permission enforcement. For more information regarding Azure Files authentication using domain services, refer to our [overview](../files/storage-files-active-directory-overview.md).
36+
- **Active Directory (AD) authentication (preview)** for files. Azure Files supports identity-based authorization over SMB through AD. Your AD domain service can be hosted on on-premises machines or in Azure VMs. SMB access to Files is supported using AD credentials from domain joined machines, either on-premises or in Azure. You can use RBAC for share level access control and NTFS DACLs for directory/file level permission enforcement. For more information regarding Azure Files authentication using domain services, refer to our [overview](../files/storage-files-active-directory-overview.md).
3737

3838
- **Shared Key authorization** for blobs, files, queues, and tables. A client using Shared Key passes a header with every request that is signed using the storage account access key. For more information, see [Authorize with Shared Key](/rest/api/storageservices/authorize-with-shared-key/).
3939
- **Shared access signatures** for blobs, files, queues, and tables. Shared access signatures (SAS) provide limited delegated access to resources in a storage account. Adding constraints on the time interval for which the signature is valid or on permissions it grants provides flexibility in managing access. For more information, see [Using shared access signatures (SAS)](storage-sas-overview.md).

articles/storage/files/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@
4343
href: ../common/storage-auth.md?toc=%2fazure%2fstorage%2ffiles%2ftoc.json
4444
- name: Azure Storage encryption
4545
href: ../common/storage-service-encryption.md?toc=%2fazure%2fstorage%2ffiles%2ftoc.json
46-
- name: Azure AD authentication over SMB
46+
- name: Identity-based authentication and authorization
4747
href: storage-files-active-directory-overview.md
4848
- name: Use Azure Private Endpoints
4949
href: ../common/storage-private-endpoints.md?toc=%2fazure%2fstorage%2ffiles%2ftoc.json
@@ -173,10 +173,10 @@
173173
href: ../common/storage-network-security.md?toc=%2fazure%2fstorage%2ffiles%2ftoc.json
174174
- name: Require secure transfer
175175
href: ../common/storage-require-secure-transfer.md?toc=%2fazure%2fstorage%2ffiles%2ftoc.json
176-
- name: Enable Azure AD DS authentication over SMB
177-
href: storage-files-active-directory-enable.md
178-
- name: Enable AD authentication over SMB
176+
- name: Enable AD authentication and authorization
179177
href: storage-files-active-directory-domain-services-enable.md
178+
- name: Enable Azure AD DS authentication and authorization
179+
href: storage-files-active-directory-enable.md
180180
- name: Enable secure TLS for Azure Storage client
181181
href: ../common/storage-security-tls.md
182182
- name: Troubleshoot

articles/storage/files/storage-files-active-directory-domain-services-enable.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,11 @@ ms.author: rogarana
2121
>
2222
> AD authentication can only be supported against one AD forest where the storage account is registered to. You can only access Azure file shares with the AD credentials from a single AD forest by default. If you need to access your Azure file share from a different forest, make sure that you have the proper forest trust configured.
2323
>
24-
> AD authentication for SMB access and NTFS DACL persistence is supported for Azure file shares managed by Azure File Sync.
24+
> AD authentication for SMB access and ACL persistence is supported for Azure file shares managed by Azure File Sync.
2525
2626
When you enable AD for Azure file shares over SMB, your AD domain joined machines can mount Azure file shares using your existing AD credentials. This capability can be enabled with an AD environment hosted either in on-prem machines or hosted in Azure.
2727

28-
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [NTFS DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
28+
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
2929

3030
## Prerequisites
3131

@@ -74,7 +74,7 @@ Next, grant access to Azure Files resources with AD credentials:
7474

7575
- Assign access permissions for a share to the Azure AD identity (a user, group, or service principal) that is in sync with the target AD identity.
7676

77-
- Configure NTFS permissions over SMB for directories and files.
77+
- Configure ACLs over SMB for directories and files.
7878

7979
- Mount an Azure file share from an AD domain joined VM.
8080

@@ -92,26 +92,29 @@ To enable AD authentication over SMB for Azure file shares, you need to first re
9292
> [!IMPORTANT]
9393
> The `join-AzStorageAccountForAuth` cmdlet will make modifications to your AD environment. Read the following explanation to better understand what it is doing to ensure you have the proper permissions to execute the command and that the applied changes align with the compliance and security policies.
9494
95-
The `join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#update-ad-account-password)
95+
The `join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#update-ad-account-password).
9696

9797
You can use the following script to perform the registration and enable the feature or, alternatively, you can manually perform the operations that the script would. Those operations are described in the section following the script. You do not need to do both.
9898

9999
### Script prerequisites
100100

101-
- [Download the AzFilesHybrid.psm1 module](https://github.com/Azure-Samples/azure-files-samples)
101+
- [Download and unzip the AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases)
102102
- Install and execute the module in a device that is domain joined to AD with AD credentials that have permissions to create a service logon account or a computer account in the target AD.
103103
- Run the script using an AD credential that is synced to your Azure AD. The AD credential must have either the storage account owner or the contributor RBAC role permissions.
104104
- Make sure your storage account is in a [supported region](#regional-availability).
105105

106-
```PowerShell
106+
```PowerShell
107107
#Change the execution policy to unblock importing AzFilesHybrid.psm1 module
108108
Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope Currentuser
109109
110-
#Import AzureFilesActiveDirectoryUtilities module, it includes Az.Storage 1.8.2-preview version
111-
Import-module -name .\AzFilesHybrid.psm1 -ArgumentList Verbose
110+
# Navigate to where AzFilesHybrid is unzipped and stored and run to copy the files into your path
111+
.\CopyToPSPath.ps1
112+
113+
#Import AzFilesHybrid module
114+
Import-Module -name AzFilesHybrid
112115
113116
#Login with an Azure AD credential that has either storage account owner or contributer RBAC assignment
114-
connect-AzAccount
117+
Connect-AzAccount
115118
116119
#Select the target subscription for the current session
117120
Select-AzureSubscription -SubscriptionId "<yourSubscriptionIdHere>"
@@ -169,13 +172,13 @@ You've now successfully enabled the feature on your storage account. Even though
169172

170173
[!INCLUDE [storage-files-aad-permissions-and-mounting](../../../includes/storage-files-aad-permissions-and-mounting.md)]
171174

172-
You have now successfully enabled Azure AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB sections](#configure-ntfs-permissions-over-smb)
175+
You have now successfully enabled Azure AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB](#configure-ntfs-permissions-over-smb) sections.
173176

174177
## Update AD account password
175178

176179
If you registered the AD account representing your storage account under an OU that enforces password expiration time, you must rotate the password before the maximum password age. Failing to update the password of the AD account will result in authentication failures to access Azure file shares.
177180

178-
To trigger password rotation, you can run the `Update-AzStorageAccountADObjectPassword` command from the AzFilesHybrid.psm1. The cmdlet performs actions similar to storage account key rotation. It gets the second kerberos key of the storage account and uses it to update the password of the registered account in AD. Then it regenerates the target kerberos key of the storage account and updates the password of the registered account in AD. You must run this cmdlet in an AD domain joined environment.
181+
To trigger password rotation, you can run the `Update-AzStorageAccountADObjectPassword` command from the [AzFilesHybrid module](#script-prerequisites). The cmdlet performs actions similar to storage account key rotation. It gets the second Kerberos key of the storage account and uses it to update the password of the registered account in AD. Then it regenerates the target Kerberos key of the storage account and updates the password of the registered account in AD. You must run this cmdlet in an AD domain joined environment.
179182

180183
```PowerShell
181184
#Update the password of the AD account registered for the storage account

articles/storage/files/storage-files-active-directory-enable.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,5 @@ You have now successfully enabled Azure AD DS authentication over SMB and assign
136136

137137
For more information about Azure Files and how to use Azure AD over SMB, see these resources:
138138

139-
- [Introduction to Azure Files](storage-files-introduction.md)
140-
- [Overview of Azure Active Directory authentication over SMB for Azure Files](storage-files-active-directory-overview.md)
139+
- [ Overview of Azure Files identity-based authentication support for SMB access](storage-files-active-directory-overview.md)
141140
- [FAQ](storage-files-faq.md)

0 commit comments

Comments
 (0)