Skip to content

Commit a87b8b6

Browse files
author
Owen Duncan
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into azureas-nodes
2 parents afdd66e + 8275cb2 commit a87b8b6

File tree

4 files changed

+81
-29
lines changed

4 files changed

+81
-29
lines changed

articles/storage/files/storage-files-faq.md

Lines changed: 32 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -194,16 +194,6 @@ This article answers common questions about Azure Files features and functionali
194194

195195
No, authentication from Linux VMs is not supported.
196196

197-
* <a id="ad-multiple-forest"></a>
198-
**Does Azure Files AD authentication support integration with an AD environment using multiple forests?**
199-
200-
Azure Files AD authentication only integrates with the forest of the AD domain service that the storage account is registered to. To support authentication from another AD forest, your environment must have forest trust configured properly. The way Azure Files register to an AD domain service is mostly the same as a regular file server, where it creates an identity (computer or service logon account) in AD for authentication. The only difference is that the registered SPN of the storage account ends with "file.core.windows.net" which does not match with the domain suffix. Consult your domain administrator to see if any update to your DNS routing policy is required to enable multiple forest authentication due to the different domain suffix.
201-
202-
* <a id=""></a>
203-
**What regions are available for Azure Files AD authentication (preview)?**
204-
205-
Refer to [AD regional availability](storage-files-identity-auth-active-directory-enable.md#regional-availability) for details.
206-
207197
* <a id="ad-aad-smb-afs"></a>
208198
**Can I leverage Azure Files Azure AD DS authentication or Active Directory (AD) authentication (preview) on file shares managed by Azure File Sync?**
209199

@@ -213,7 +203,7 @@ This article answers common questions about Azure Files features and functionali
213203
**How can I check if I have enabled AD authentication on my storage account and the AD domain information?**
214204

215205
You can refer to the instructions provided [here](https://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable#1-enable-ad-authentication-for-your-account) to validate if Azure Files AD Authentication is enabled on your storage account and retrieve the AD domain information.
216-
206+
217207
* <a id="encryption-at-rest"></a>
218208
**How can I ensure that my Azure file share is encrypted at rest?**
219209

@@ -238,6 +228,37 @@ This article answers common questions about Azure Files features and functionali
238228
**What data compliance policies does Azure Files support?**
239229

240230
Azure Files runs on top of the same storage architecture that's used in other storage services in Azure Storage. Azure Files applies the same data compliance policies that are used in other Azure storage services. For more information about Azure Storage data compliance, you can refer to [Azure Storage compliance offerings](https://docs.microsoft.com/azure/storage/common/storage-compliance-offerings), and go to the [Microsoft Trust Center](https://microsoft.com/trustcenter/default.aspx).
231+
232+
### AD Authentication
233+
* <a id=""></a>
234+
**Does Azure Files Azure AD authentication support Linux VMs?**
235+
236+
No, authentication from Linux VMs is not supported.
237+
238+
* <a id="ad-multiple-forest"></a>
239+
**Does Azure Files AD authentication support integration with an AD environment using multiple forests?**
240+
241+
Azure Files AD authentication only integrates with the forest of the AD domain service that the storage account is registered to. To support authentication from another AD forest, your environment must have forest trust configured properly. The way Azure Files register to an AD domain service is mostly the same as a regular file server, where it creates an identity (computer or service logon account) in AD for authentication. The only difference is that the registered SPN of the storage account ends with "file.core.windows.net" which does not match with the domain suffix. Consult your domain administrator to see if any update to your DNS routing policy is required to enable multiple forest authentication due to the different domain suffix.
242+
243+
* <a id=""></a>
244+
**What regions are available for Azure Files AD authentication (preview)?**
245+
246+
Refer to [AD regional availability](storage-files-identity-auth-active-directory-enable.md#regional-availability) for details.
247+
248+
* <a id="ad-aad-smb-afs"></a>
249+
**Can I leverage Azure Files Active Directory (AD) authentication (preview) on file shares managed by Azure File Sync?**
250+
251+
Yes, you can enable AD authentication on a file share managed by Azure file sync. Changes to the directory/file NTFS ACLs on local file servers will be tiered to Azure Files and vice-versa.
252+
253+
* <a id="ad-aad-smb-files"></a>
254+
**How can I check if I have enabled AD authentication on my storage account and the AD domain information?**
255+
256+
You can refer to the instructions provided [here](https://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable#enable-ad-authentication-for-your-account) to validate if Azure Files AD Authentication is enabled on your storage account and retrieve the AD domain information.
257+
258+
* <a id="ad-aad-smb-files"></a>
259+
**Is there any difference in creating a computer account or service logon account to represent my storage account in AD?**
260+
261+
Creating either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) (default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts) has no difference on how the authentication would work with Azure Files. You can make your own choice on how to represent a storage account as an identity in your AD environment. The default DomainAccountType set in Join-AzStorageAccountForAuth cmdlet is computer account. However, the password expiration age configured in your AD environment can be different for computer or service logon account and you need to take that into consideration for [Update the password of your storage account identity in AD](https://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable#5-update-ad-account-password).
241262

242263
## On-premises access
243264

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 22 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: roygara
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: conceptual
8-
ms.date: 04/01/2020
8+
ms.date: 04/10/2020
99
ms.author: rogarana
1010
---
1111

@@ -67,7 +67,7 @@ Azure Files AD authentication (preview) is available in [all regions in Public C
6767

6868
## Workflow overview
6969

70-
Before you enable AD Authentication over SMB for Azure file shares, we recommend that you walk through the [prerequisites](#prerequisites) and make sure you've completed all the steps. The prerequisites validate that your AD, Azure AD, and Azure Storage environments are properly configured.
70+
Before you enable AD Authentication over SMB for Azure file shares, we recommend that you walk through the [prerequisites](#prerequisites) and make sure you've completed all the steps. The prerequisites validate that your AD, Azure AD, and Azure Storage environments are properly configured. If you plan to enable any networking configurations on your file share, we recommend you to evaluate the [networking consideration](https://docs.microsoft.com/azure/storage/files/storage-files-networking-overview) and complete the related configuration first before enabling AD Authentication.
7171

7272
Next, follow the steps below to setup Azure Files for AD Authentication:
7373

@@ -79,7 +79,7 @@ Next, follow the steps below to setup Azure Files for AD Authentication:
7979

8080
4. Mount an Azure file share from an AD domain joined VM.
8181

82-
5. Rotate AD account password (Optional)
82+
5. Update the password of your storage account identity in AD
8383

8484
The following diagram illustrates the end-to-end workflow for enabling Azure AD authentication over SMB for Azure file shares.
8585

@@ -95,7 +95,7 @@ To enable AD authentication over SMB for Azure file shares, you need to first re
9595
> [!IMPORTANT]
9696
> The `Join-AzStorageAccountForAuth` cmdlet will make modifications to your AD environment. Read the following explanation to better understand what it is doing to ensure you have the proper permissions to execute the command and that the applied changes align with the compliance and security policies.
9797
98-
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) (default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update AD account password](#5-update-ad-account-password).
98+
The `Join-AzStorageAccountForAuth` cmdlet will perform the equivalent of an offline domain join on behalf of the indicated storage account. It will create an account in your AD domain, either a [computer account](https://docs.microsoft.com/windows/security/identity-protection/access-control/active-directory-accounts#manage-default-local-accounts-in-active-directory) (default) or a [service logon account](https://docs.microsoft.com/windows/win32/ad/about-service-logon-accounts). The created AD account represents the storage account in the AD domain. If the AD account is created under an AD Organizational Unit (OU) that enforces password expiration, you must update the password before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. To learn how to update the password, see [Update the password of your storage account identity in AD](#5-update-the-password-of-your-storage-account-identity-in-ad).
9999

100100
You can use the following script to perform the registration and enable the feature or, alternatively, you can manually perform the operations that the script would. Those operations are described in the section following the script. You do not need to do both.
101101

@@ -108,7 +108,8 @@ You can use the following script to perform the registration and enable the feat
108108
### 1.2 Domain join your storage account
109109
Remember to replace the placeholder values with your own in the parameters below before executing it in PowerShell.
110110
> [!IMPORTANT]
111-
> The domain join cmdlet below will create an AD account to represent the storage account (file share) in AD. You can choose to register as a computer account or service logon account. For computer accounts, there is a default password expiration age set in AD at 30 days. Similarly, the service logon account may have a default password expiration age set on the AD domain or Organizational Unit (OU). We strongly recommend you to check what is the password expiration age configurated in your AD environment and plan to [update AD account password](#5-update-ad-account-password) of the AD account below before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. You can consider to [create a new AD Organizational Unit (OU) in AD](https://docs.microsoft.com/powershell/module/addsadministration/new-adorganizationalunit?view=win10-ps) and disable password expiration policy on [computer accounts](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852252(v=ws.11)?redirectedfrom=MSDN) or service logon accounts accordingly.
111+
> The domain join cmdlet below will create an AD account to represent the storage account (file share) in AD. You can choose to register as a computer account or service logon account, see [FAQ](https://docs.microsoft.com/azure/storage/files/storage-files-faq#security-authentication-and-access-control) for details. For computer accounts, there is a default password expiration age set in AD at 30 days. Similarly, the service logon account may have a default password expiration age set on the AD domain or Organizational Unit (OU).
112+
> For both account types, we strongly recommend you to check what is the password expiration age configurated in your AD environment and plan to [Update the password of your storage account identity in AD](#5-update-the-password-of-your-storage-account-identity-in-ad) of the AD account below before the maximum password age. Failing to update AD account password will result in authentication failures when accessing Azure file shares. You can consider to [create a new AD Organizational Unit (OU) in AD](https://docs.microsoft.com/powershell/module/addsadministration/new-adorganizationalunit?view=win10-ps) and disable password expiration policy on [computer accounts](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852252(v=ws.11)?redirectedfrom=MSDN) or service logon accounts accordingly.
112113
113114
```PowerShell
114115
#Change the execution policy to unblock importing AzFilesHybrid.psm1 module
@@ -123,21 +124,27 @@ Import-Module -Name AzFilesHybrid
123124
#Login with an Azure AD credential that has either storage account owner or contributer RBAC assignment
124125
Connect-AzAccount
125126
127+
#Define parameters
128+
$SubscriptionId = "<your-subscription-id-here>"
129+
$ResourceGroupName = "<resource-group-name-here>"
130+
$StorageAccountName = "<storage-account-name-here>"
131+
126132
#Select the target subscription for the current session
127-
Select-AzSubscription -SubscriptionId "<your-subscription-id-here>"
133+
Select-AzSubscription -SubscriptionId $SubscriptionId
128134
129135
# Register the target storage account with your active directory environment under the target OU (for example: specify the OU with Name as "UserAccounts" or DistinguishedName as "OU=UserAccounts,DC=CONTOSO,DC=COM").
130136
# You can use to this PowerShell cmdlet: Get-ADOrganizationalUnit to find the Name and DistinguishedName of your target OU. If you are using the OU Name, specify it with -OrganizationalUnitName as shown below. If you are using the OU DistinguishedName, you can set it with -OrganizationalUnitDistinguishedName. You can choose to provide one of the two names to specify the target OU.
131137
# You can choose to create the identity that represents the storage account as either a Service Logon Account or Computer Account, depends on the AD permission you have and preference.
132-
Join-AzStorageAccountForAuth `
133-
-ResourceGroupName "<resource-group-name-here>" `
134-
-Name "<storage-account-name-here>" `
135-
-DomainAccountType "ComputerAccount" `
136-
-OrganizationalUnitName "<ou-name-here>" or -OrganizationalUnitDistinguishedName "<ou-distinguishedname-here>"
138+
#You can run Get-Help Join-AzStorageAccountForAuth to find more details on this cmdlet.
137139
138-
#If you don't provide the OU name as an input parameter, the AD identity that represents the storage account will be created under the root directory.
140+
Join-AzStorageAccountForAuth `
141+
-ResourceGroupName $ResourceGroupName `
142+
-Name $StorageAccountName `
143+
-DomainAccountType "<ComputerAccount|ServiceLogonAccount>" ` #Default set to "ComputerAccount"
144+
-OrganizationalUnitName "<ou-name-here>" #You can also use -OrganizationalUnitDistinguishedName "<ou-distinguishedname-here>" instead. If you don't provide the OU name as an input parameter, the AD identity that represents the storage account will be created under the root directory.
139145
140-
#
146+
#You can run the Debug-AzStorageAccountAuth cmdlet to conduct a set of basic checks on your AD configuration with the logged on AD user. This cmdlet is supported on AzFilesHybrid v0.1.2+ version. For more details on the checks performed in this cmdlet, go to Azure Files FAQ.
147+
Debug-AzStorageAccountAuth -StorageAccountName $StorageAccountName -ResourceGroupName $ResourceGroupName -Verbose
141148
142149
```
143150

@@ -158,7 +165,7 @@ Once you have that key, create either a service or computer account under your O
158165
SPN: "cifs/your-storage-account-name-here.file.core.windows.net"
159166
Password: Kerberos key for your storage account.
160167

161-
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update AD account password](#5-update-ad-account-password) for details.
168+
If your OU enforces password expiration, you must update the password before the maximum password age to prevent authentication failures when accessing Azure file shares. See [Update password of your storage account identity in AD](#5-update-the-password-of-your-storage-account-identity-in-ad) for details.
162169

163170
Keep the SID of the newly created account, you'll need it for the next step. The AD identity you have just created that represent the storage account does not need to be synced to Azure AD.
164171

@@ -204,7 +211,7 @@ You've now successfully enabled the feature on your storage account. Even though
204211

205212
You have now successfully enabled AD authentication over SMB and assigned a custom role that provides access to an Azure file share with an AD identity. To grant additional users access to your file share, follow the instructions in the [Assign access permissions](#2-assign-access-permissions-to-an-identity) to use an identity and [Configure NTFS permissions over SMB](#3-configure-ntfs-permissions-over-smb) sections.
206213

207-
## 5. Update AD account password
214+
## 5. Update the password of your storage account identity in AD
208215

209216
If you registered the AD identity/account representing your storage account under an OU that enforces password expiration time, you must rotate the password before the maximum password age. Failing to update the password of the AD account will result in authentication failures to access Azure file shares.
210217

0 commit comments

Comments
 (0)