Skip to content

Commit ac24c9f

Browse files
Merge pull request #219188 from b-ahibbard/jira-23032-ad-aes
Jira 23032 - clarify through formatting
2 parents 4e2dcae + 94d84b1 commit ac24c9f

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: how-to
15-
ms.date: 11/02/2022
15+
ms.date: 11/21/2022
1616
ms.author: anfdocs
1717
---
1818
# Create and manage Active Directory connections for Azure NetApp Files
@@ -47,11 +47,10 @@ Several features of Azure NetApp Files require that you have an Active Directory
4747
* Administrators
4848
* Account Operators
4949
* Azure AD DC Administrators _(Azure AD DS Only)_
50-
51-
Alternatively, an AD domain user account with `msDS-SupportedEncryptionTypes` write permission on the AD connection admin account can also be used to set the Kerberos encryption type property on the AD connection admin account.
50+
* Alternatively, an AD domain user account with `msDS-SupportedEncryptionTypes` write permission on the AD connection admin account can also be used to set the Kerberos encryption type property on the AD connection admin account.
5251

5352
>[!NOTE]
54-
>It's not recommended or required to add the Azure NetApp Files AD admin account to the AD domain groups listed above. Nor is it recommended or required to grant `msDS-SupportedEncryptionTypes` write permission to the AD admin account.
53+
>It's _not_ recommended nor required to add the Azure NetApp Files AD admin account to the AD domain groups listed above. Nor is it recommended or required to grant `msDS-SupportedEncryptionTypes` write permission to the AD admin account.
5554
5655
If you set both AES-128 and AES-256 Kerberos encryption on the admin account of the AD connection, the highest level of encryption supported by your AD DS will be used.
5756

0 commit comments

Comments
 (0)