Skip to content

Commit b148309

Browse files
authored
Update storage-files-identity-auth-active-directory-enable.md
1 parent e10e543 commit b148309

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ ms.author: rogarana
2929
When you enable AD for Azure file shares over SMB, your AD domain joined machines can mount Azure file shares using your existing AD credentials. This capability can be enabled with an AD environment hosted either in on-prem machines or hosted in Azure.
3030

3131
AD identities used to access Azure file shares must be synced to Azure AD to enforce share level file permissions through the standard [role-based access control (RBAC)](../../role-based-access-control/overview.md) model. [Windows-style DACLs](https://docs.microsoft.com/previous-versions/technet-magazine/cc161041(v=msdn.10)?redirectedfrom=MSDN) on files/directories carried over from existing file servers will be preserved and enforced. This feature offers seamless integration with your enterprise AD domain infrastructure. As you replace on-prem file servers with Azure file shares, existing users can access Azure file shares from their current clients with a single sign-on experience, without any change to the credentials in use.
32+
33+
> [!NOTE]
34+
> To help you setup Azure Files AD authentication for the common use cases, we made [two videos](https://docs.microsoft.com/azure/storage/files/storage-files-introduction#videos) with the step by step guidance on replacing on-premises file servers with Azure Files and using Azure Files as the profile container for Windows Virtual Desktop.
3235
3336
## Prerequisites
3437

0 commit comments

Comments
 (0)