You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following requirements apply to NFSv4.1 client encryption:
18
18
19
-
* Active Directory Domain Services (AD DS) or Microsoft Entra Domain Services connection to facilitate Kerberos ticketing
19
+
* Active Directory Domain Services (AD DS) or Microsoft Entra Domain Services connection to facilitate Kerberos ticketing
20
20
* DNS A/PTR record creation for both the client and Azure NetApp Files NFS server IP addresses
21
-
* A Linux client: This article provides guidance for RHEL and Ubuntu clients. Other clients will work with similar configuration steps.
22
-
* NTP server access: You can use one of the commonly used Active Directory Domain Controller (AD DC) domain controllers.
21
+
***A Linux client:** This article provides guidance for RHEL and Ubuntu clients. Other clients also work with similar configuration steps.
22
+
***NTP server access:** You can use one of the commonly used Active Directory Domain Controller (AD DC) domain controllers.
23
23
* To leverage Domain or LDAP user authentication, ensure that NFSv4.1 volumes are enabled for LDAP. See [Configure ADDS LDAP with extended groups](configure-ldap-extended-groups.md).
24
24
* Ensure that User Principal Names for user accounts do *not* end with a `$` symbol (for example, user$@REALM.COM). <!-- Not using 'contoso.com' in this example; per Mark, A customers REALM namespace may be different from their AD domain name space. -->
25
25
For [Group managed service accounts](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts) (gMSA), you need to remove the trailing `$` from the User Principal Name before the account can be used with the Azure NetApp Files Kerberos feature.
@@ -28,10 +28,10 @@ The following requirements apply to NFSv4.1 client encryption:
28
28
29
29
1. Follow steps in [Create an NFS volume for Azure NetApp Files](azure-netapp-files-create-volumes.md) to create the NFSv4.1 volume.
30
30
31
-
On the Create a Volume page, set the NFS version to **NFSv4.1**, and set Kerberos to **Enabled**.
31
+
On the Create a volume page, set the NFS version to **NFSv4.1** and set Kerberos to **Enabled**.
32
32
33
33
> [!IMPORTANT]
34
-
> You cannot modify the Kerberos enablement selection after the volume is created.
34
+
> You can't modify the Kerberos enablement selection after the volume is created.
@@ -41,31 +41,29 @@ The following requirements apply to NFSv4.1 client encryption:
41
41
42
42
You can also modify the Kerberos security methods for the volume by clicking Export Policy in the Azure NetApp Files navigation pane.
43
43
44
-
3. Click**Review + Create** to create the NFSv4.1 volume.
44
+
3. Select**Review + Create** to create the NFSv4.1 volume.
45
45
46
46
## Configure the Azure portal
47
47
48
48
1. Follow the instructions in [Create an Active Directory connection](create-active-directory-connections.md).
49
49
50
-
Kerberos requires that you create at least one computer account in Active Directory. The account information you provide is used for creating the accounts for both SMB *and* NFSv4.1 Kerberos volumes. This machine is account is created automatically during volume creation.
50
+
Kerberos requires that you create at least one computer account in Active Directory. The account information you provide is used for creating the accounts for both SMB *and* NFSv4.1 Kerberos volumes. This machine account is created automatically during volume creation.
51
51
52
52
2. Under **Kerberos Realm**, enter the **AD Server Name** and the **KDC IP** address.
53
53
54
-
AD Server and KDC IP can be the same server. This information is used to create the SPN computer account used by Azure NetApp Files. After the computer account is created, Azure NetApp Files will use DNS Server records to locate additional KDC servers as needed.
54
+
AD Server and KDC IP can be the same server. This information is used to create the SPN computer account used by Azure NetApp Files. After the computer account is created, Azure NetApp Files uses DNS Server records to locate additional KDC servers as needed.
After creating the first NFSv4.1 Kerberos volume, set the encryption type for the computer account with the PowerShell command `Set-ADComputer $NFSCOMPUTERACCOUNT -KerberosEncryptionType AES256`.
69
67
70
68
## Configure the NFS client
71
69
@@ -100,7 +98,7 @@ Follow instructions in [Configure an NFS client for Azure NetApp Files](configur
100
98
101
99
## <aname="kerberos_performance"></a>Performance impact of Kerberos on NFSv4.1
102
100
103
-
You should understand the security options available for NFSv4.1 volumes, the tested performance vectors, and the expected performance impact of kerberos. See [Performance impact of Kerberos on NFSv4.1 volumes](performance-impact-kerberos.md) for details.
101
+
You should understand the security options available for NFSv4.1 volumes, the tested performance vectors, and the expected performance impact of kerberos. For detailed information, see [Performance impact of Kerberos on NFSv4.1 volumes](performance-impact-kerberos.md).
0 commit comments