You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-faq.md
+32-11Lines changed: 32 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -194,16 +194,6 @@ This article answers common questions about Azure Files features and functionali
194
194
195
195
No, authentication from Linux VMs is not supported.
196
196
197
-
* <aid="ad-multiple-forest"></a>
198
-
**Does Azure Files AD authentication support integration with an AD environment using multiple forests?**
199
-
200
-
Azure Files AD authentication only integrates with the forest of the AD domain service that the storage account is registered to. To support authentication from another AD forest, your environment must have forest trust configured properly. The way Azure Files register to an AD domain service is mostly the same as a regular file server, where it creates an identity (computer or service logon account) in AD for authentication. The only difference is that the registered SPN of the storage account ends with "file.core.windows.net" which does not match with the domain suffix. Consult your domain administrator to see if any update to your DNS routing policy is required to enable multiple forest authentication due to the different domain suffix.
201
-
202
-
* <aid=""></a>
203
-
**What regions are available for Azure Files AD authentication (preview)?**
204
-
205
-
Refer to [AD regional availability](storage-files-identity-auth-active-directory-enable.md#regional-availability) for details.
206
-
207
197
* <aid="ad-aad-smb-afs"></a>
208
198
**Can I leverage Azure Files Azure AD DS authentication or Active Directory (AD) authentication (preview) on file shares managed by Azure File Sync?**
209
199
@@ -213,7 +203,7 @@ This article answers common questions about Azure Files features and functionali
213
203
**How can I check if I have enabled AD authentication on my storage account and the AD domain information?**
214
204
215
205
You can refer to the instructions provided [here](https://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable#1-enable-ad-authentication-for-your-account) to validate if Azure Files AD Authentication is enabled on your storage account and retrieve the AD domain information.
216
-
206
+
217
207
* <aid="encryption-at-rest"></a>
218
208
**How can I ensure that my Azure file share is encrypted at rest?**
219
209
@@ -238,6 +228,37 @@ This article answers common questions about Azure Files features and functionali
238
228
**What data compliance policies does Azure Files support?**
239
229
240
230
Azure Files runs on top of the same storage architecture that's used in other storage services in Azure Storage. Azure Files applies the same data compliance policies that are used in other Azure storage services. For more information about Azure Storage data compliance, you can refer to [Azure Storage compliance offerings](https://docs.microsoft.com/azure/storage/common/storage-compliance-offerings), and go to the [Microsoft Trust Center](https://microsoft.com/trustcenter/default.aspx).
231
+
232
+
### AD Authentication
233
+
* <aid=""></a>
234
+
**Does Azure Files Azure AD authentication support Linux VMs?**
235
+
236
+
No, authentication from Linux VMs is not supported.
237
+
238
+
* <aid="ad-multiple-forest"></a>
239
+
**Does Azure Files AD authentication support integration with an AD environment using multiple forests?**
240
+
241
+
Azure Files AD authentication only integrates with the forest of the AD domain service that the storage account is registered to. To support authentication from another AD forest, your environment must have forest trust configured properly. The way Azure Files register to an AD domain service is mostly the same as a regular file server, where it creates an identity (computer or service logon account) in AD for authentication. The only difference is that the registered SPN of the storage account ends with "file.core.windows.net" which does not match with the domain suffix. Consult your domain administrator to see if any update to your DNS routing policy is required to enable multiple forest authentication due to the different domain suffix.
242
+
243
+
* <aid=""></a>
244
+
**What regions are available for Azure Files AD authentication (preview)?**
245
+
246
+
Refer to [AD regional availability](storage-files-identity-auth-active-directory-enable.md#regional-availability) for details.
247
+
248
+
* <aid="ad-aad-smb-afs"></a>
249
+
**Can I leverage Azure Files Active Directory (AD) authentication (preview) on file shares managed by Azure File Sync?**
250
+
251
+
Yes, you can enable AD authentication on a file share managed by Azure file sync. Changes to the directory/file NTFS ACLs on local file servers will be tiered to Azure Files and vice-versa.
252
+
253
+
* <aid="ad-aad-smb-files"></a>
254
+
**How can I check if I have enabled AD authentication on my storage account and the AD domain information?**
255
+
256
+
You can refer to the instructions provided [here](https://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable#enable-ad-authentication-for-your-account) to validate if Azure Files AD Authentication is enabled on your storage account and retrieve the AD domain information.
257
+
258
+
* <aid="ad-aad-smb-files"></a>
259
+
**Is there any difference in creating a computer account or service logon account to represent my storage account in AD?**
260
+
261
+
Creating either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) (default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts) has no difference on how the authentication would work with Azure Files. You can make your own choice on how to represent a storage account as an identity in your AD environment. The default DomainAccountType set in Join-AzStorageAccountForAuth cmdlet is computer account. However, the password expiration age configured in your AD environment can be different for computer or service logon account and you need to take that into consideration for [Update the password of your storage account identity in AD](https://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable#5-update-ad-account-password).
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-auth-active-directory-enable.md
+22-15Lines changed: 22 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: roygara
5
5
ms.service: storage
6
6
ms.subservice: files
7
7
ms.topic: conceptual
8
-
ms.date: 04/01/2020
8
+
ms.date: 04/10/2020
9
9
ms.author: rogarana
10
10
---
11
11
@@ -67,7 +67,7 @@ Azure Files AD authentication (preview) is available in [all regions in Public C
67
67
68
68
## Workflow overview
69
69
70
-
Before you enable AD Authentication over SMB for Azure file shares, we recommend that you walk through the [prerequisites](#prerequisites) and make sure you've completed all the steps. The prerequisites validate that your AD, Azure AD, and Azure Storage environments are properly configured.
70
+
Before you enable AD Authentication over SMB for Azure file shares, we recommend that you walk through the [prerequisites](#prerequisites) and make sure you've completed all the steps. The prerequisites validate that your AD, Azure AD, and Azure Storage environments are properly configured. If you plan to enable any networking configurations on your file share, we recommend you to evaluate the [networking consideration](https://docs.microsoft.com/azure/storage/files/storage-files-networking-overview) and complete the related configuration first before enabling AD Authentication.
71
71
72
72
Next, follow the steps below to setup Azure Files for AD Authentication:
73
73
@@ -79,7 +79,7 @@ Next, follow the steps below to setup Azure Files for AD Authentication:
79
79
80
80
4. Mount an Azure file share from an AD domain joined VM.
81
81
82
-
5.Rotate AD account password (Optional)
82
+
5.Update the password of your storage account identity in AD
83
83
84
84
The following diagram illustrates the end-to-end workflow for enabling Azure AD authentication over SMB for Azure file shares.
85
85
@@ -95,7 +95,7 @@ To enable AD authentication over SMB for Azure file shares, you need to first re
95
95
> [!IMPORTANT]
96
96
> The `Join-AzStorageAccountForAuth` cmdlet will make modifications to your AD environment. Read the following explanation to better understand what it is doing to ensure you have the proper permissions to execute the command and that the applied changes align with the compliance and security policies.
97
97
98
-
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) (default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#5-update-ad-account-password).
98
+
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) (default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update the password of your storage account identity in AD](#5-update-the-password-of-your-storage-account-identity-in-ad).
99
99
100
100
You can use the following script to perform the registration and enable the feature or, alternatively, you can manually perform the operations that the script would. Those operations are described in the section following the script. You do not need to do both.
101
101
@@ -108,7 +108,8 @@ You can use the following script to perform the registration and enable the feat
108
108
### 1.2 Domain join your storage account
109
109
Remember to replace the placeholder values with your own in the parameters below before executing it in PowerShell.
110
110
> [!IMPORTANT]
111
-
> The domain join cmdlet below will create an AD account to represent the storage account (file share) in AD. You can choose to register as a computer account or service logon account. For computer accounts, there is a default password expiration age set in AD at 30 days. Similarly, the service logon account may have a default password expiration age set on the AD domain or Organizational Unit (OU). We strongly recommend you to check what is the password expiration age configurated in your AD environment and plan to [update AD account password](#5-update-ad-account-password) of the AD account below before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. You can consider to [create a new AD Organizational Unit (OU) in AD](https://docs.microsoft.com/powershell/module/addsadministration/new-adorganizationalunit?view=win10-ps) and disable password expiration policy on [computer accounts](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852252(v=ws.11)?redirectedfrom=MSDN) or service logon accounts accordingly.
111
+
> The domain join cmdlet below will create an AD account to represent the storage account (file share) in AD. You can choose to register as a computer account or service logon account, see [FAQ](https://docs.microsoft.com/azure/storage/files/storage-files-faq#security-authentication-and-access-control) for details. For computer accounts, there is a default password expiration age set in AD at 30 days. Similarly, the service logon account may have a default password expiration age set on the AD domain or Organizational Unit (OU).
112
+
> For both account types, we strongly recommend you to check what is the password expiration age configurated in your AD environment and plan to [Update the password of your storage account identity in AD](#5-update-the-password-of-your-storage-account-identity-in-ad) of the AD account below before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. You can consider to [create a new AD Organizational Unit (OU) in AD](https://docs.microsoft.com/powershell/module/addsadministration/new-adorganizationalunit?view=win10-ps) and disable password expiration policy on [computer accounts](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852252(v=ws.11)?redirectedfrom=MSDN) or service logon accounts accordingly.
112
113
113
114
```PowerShell
114
115
#Change the execution policy to unblock importing AzFilesHybrid.psm1 module
# Register the target storage account with your active directory environment under the target OU (for example: specify the OU with Name as "UserAccounts" or DistinguishedName as "OU=UserAccounts,DC=CONTOSO,DC=COM").
130
136
# You can use to this PowerShell cmdlet: Get-ADOrganizationalUnit to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it with -OrganizationalUnitDistinguishedName. You can choose to provide one of the two names to specify the target OU.
131
137
# You can choose to create the identity that represents the storage account as either a Service Logon Account or Computer Account, depends on the AD permission you have and preference.
132
-
Join-AzStorageAccountForAuth `
133
-
-ResourceGroupName "<resource-group-name-here>" `
134
-
-Name "<storage-account-name-here>" `
135
-
-DomainAccountType "ComputerAccount" `
136
-
-OrganizationalUnitName "<ou-name-here>" or -OrganizationalUnitDistinguishedName "<ou-distinguishedname-here>"
138
+
#You can run Get-Help Join-AzStorageAccountForAuth to find more details on this cmdlet.
137
139
138
-
#If you don't provide the OU name as an input parameter, the AD identity that represents the storage account will be created under the root directory.
140
+
Join-AzStorageAccountForAuth `
141
+
-ResourceGroupName $ResourceGroupName `
142
+
-Name $StorageAccountName `
143
+
-DomainAccountType "<ComputerAccount|ServiceLogonAccount>" ` #Default set to "ComputerAccount"
144
+
-OrganizationalUnitName "<ou-name-here>" #You can also use -OrganizationalUnitDistinguishedName "<ou-distinguishedname-here>" instead. If you don't provide the OU name as an input parameter, the AD identity that represents the storage account will be created under the root directory.
139
145
140
-
#
146
+
#You can run the Debug-AzStorageAccountAuth cmdlet to conduct a set of basic checks on your AD configuration with the logged on AD user. This cmdlet is supported on AzFilesHybrid v0.1.2+ version. For more details on the checks performed in this cmdlet, go to Azure Files FAQ.
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update AD account password](#5-update-ad-account-password) for details.
168
+
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update password of your storage account identity in AD](#5-update-the-password-of-your-storage-account-identity-in-ad) for details.
162
169
163
170
Keep the SID of the newly created account, you'll need it for the next step. The AD identity you have just created that represent the storage account does not need to be synced to Azure AD.
164
171
@@ -204,7 +211,7 @@ You've now successfully enabled the feature on your storage account. Even though
204
211
205
212
You have now successfully enabled AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#2-assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB](#3-configure-ntfs-permissions-over-smb) sections.
206
213
207
-
## 5. Update AD account password
214
+
## 5. Update the password of your storage account identity in AD
208
215
209
216
If you registered the AD identity/account representing your storage account under an OU that enforces password expiration time, you must rotate the password before the maximum password age. Failing to update the password of the AD account will result in authentication failures to access Azure file shares.
0 commit comments