Skip to content

Commit a09a2f5

Browse files
authored
Merge pull request #107424 from yuemlu/master
Merge
2 parents 99b24ee + 6b06c76 commit a09a2f5

File tree

3 files changed

+14
-5
lines changed

3 files changed

+14
-5
lines changed

articles/storage/files/storage-files-faq.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,9 @@ This article answers common questions about Azure Files features and functionali
7676
**I really want to see a specific feature added to Azure Files. Can you add it?**
7777
The Azure Files team is interested in hearing any and all feedback you have about our service. Please vote on feature requests at [Azure Files UserVoice](https://feedback.azure.com/forums/217298-storage/category/180670-files)! We're looking forward to delighting you with many new features.
7878

79+
**Does Azure Files support file locking?**
80+
Yes, Azure Files fully supports SMB/Windows-style file locking, [see details](https://docs.microsoft.com/rest/api/storageservices/managing-file-locks).
81+
7982
## Azure File Sync
8083

8184
* <a id="afs-region-availability"></a>
@@ -206,6 +209,11 @@ This article answers common questions about Azure Files features and functionali
206209

207210
Yes, you can enable Azure AD DS or AD authentication on a file share managed by Azure file sync. Changes to the directory/file NTFS ACLs on local file servers will be tiered to Azure Files and vice-versa.
208211

212+
* <a id="ad-aad-smb-files"></a>
213+
**How can I check if I have enabled AD authentication on my storage account and the AD domain information?**
214+
215+
You can refer to the instructions provided [here](https://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable#enable-ad-authentication-for-your-account) to validate if Azure Files AD Authentication is enabled on your storage account and retrieve the AD domain information.
216+
209217
* <a id="encryption-at-rest"></a>
210218
**How can I ensure that my Azure file share is encrypted at rest?**
211219

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based authentication over SMB for Azur
44
author: roygara
55
ms.service: storage
66
ms.topic: conceptual
7-
ms.date: 03/03/2020
7+
ms.date: 03/11/2020
88
ms.author: rogarana
99
---
1010

@@ -124,7 +124,8 @@ Connect-AzAccount
124124
#Select the target subscription for the current session
125125
Select-AzSubscription -SubscriptionId "<your-subscription-id-here>"
126126
127-
#Register the target storage account with your active directory environment under the target OU
127+
#Register the target storage account with your active directory environment under the target OU (for example: "OU=ComputersOU,DC=prod,DC=corp,DC=contoso,DC=com")
128+
#You can choose to create the identity that represents the storage account as either a Service Logon Account or Computer Account, depends on the AD permission you have and preference.
128129
join-AzStorageAccountForAuth -ResourceGroupName "<resource-group-name-here>" -Name "<storage-account-name-here>" -DomainAccountType "<ServiceLogonAccount|ComputerAccount>" -OrganizationalUnitName "<ou-name-here>"
129130
```
130131

@@ -147,7 +148,7 @@ Password: Kerberos key for your storage account.
147148

148149
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update AD account password](#update-ad-account-password) for details.
149150

150-
Keep the SID of the newly created account, you'll need it for the next step.
151+
Keep the SID of the newly created account, you'll need it for the next step. The AD identity you have just created that represent the storage account does not need to be synced to Azure AD.
151152

152153
##### c. Enable the feature on your storage account
153154

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ We have introduced three Azure built-in roles for granting share-level permissio
2121
- **Storage File Data SMB Share Elevated Contributor** allows read, write, delete and modify NTFS permissions in Azure Storage file shares over SMB.
2222

2323
> [!IMPORTANT]
24-
> Full administrative control of a file share, including the ability to assign a role to an identity, requires using the storage account key. Administrative control is not supported with Azure AD credentials.
24+
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Administrative control is not supported with Azure AD credentials.
2525
2626
You can use the Azure portal, PowerShell, or Azure CLI to assign the built-in roles to the Azure AD identity of a user for granting share-level permissions.
2727

@@ -120,4 +120,4 @@ Use the following command to mount the Azure file share. Remember to replace th
120120

121121
```
122122
net use <desired-drive-letter>: \\<storage-account-name>.file.core.windows.net\<share-name>
123-
```
123+
```

0 commit comments

Comments
 (0)