Skip to content

Commit ba7a71d

Browse files
committed
acrolinx
1 parent 6480fa3 commit ba7a71d

File tree

2 files changed

+16
-18
lines changed

2 files changed

+16
-18
lines changed

articles/azure-netapp-files/configure-kerberos-encryption.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 06/24/2024
8+
ms.date: 04/16/2025
99
ms.author: anfdocs
1010
---
1111
# Configure NFSv4.1 Kerberos encryption for Azure NetApp Files
@@ -16,10 +16,10 @@ Azure NetApp Files supports NFS client encryption in Kerberos modes (krb5, krb5i
1616

1717
The following requirements apply to NFSv4.1 client encryption:
1818

19-
* Active Directory Domain Services (AD DS) or Microsoft Entra Domain Services connection to facilitate Kerberos ticketing
19+
* Active Directory Domain Services (AD DS) or Microsoft Entra Domain Services connection to facilitate Kerberos ticketing
2020
* DNS A/PTR record creation for both the client and Azure NetApp Files NFS server IP addresses
21-
* A Linux client: This article provides guidance for RHEL and Ubuntu clients. Other clients will work with similar configuration steps.
22-
* NTP server access: You can use one of the commonly used Active Directory Domain Controller (AD DC) domain controllers.
21+
* **A Linux client:** This article provides guidance for RHEL and Ubuntu clients. Other clients also work with similar configuration steps.
22+
* **NTP server access:** You can use one of the commonly used Active Directory Domain Controller (AD DC) domain controllers.
2323
* To leverage Domain or LDAP user authentication, ensure that NFSv4.1 volumes are enabled for LDAP. See [Configure ADDS LDAP with extended groups](configure-ldap-extended-groups.md).
2424
* Ensure that User Principal Names for user accounts do *not* end with a `$` symbol (for example, user$@REALM.COM). <!-- Not using 'contoso.com' in this example; per Mark, A customers REALM namespace may be different from their AD domain name space. -->
2525
For [Group managed service accounts](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts) (gMSA), you need to remove the trailing `$` from the User Principal Name before the account can be used with the Azure NetApp Files Kerberos feature.
@@ -28,10 +28,10 @@ The following requirements apply to NFSv4.1 client encryption:
2828

2929
1. Follow steps in [Create an NFS volume for Azure NetApp Files](azure-netapp-files-create-volumes.md) to create the NFSv4.1 volume.
3030

31-
On the Create a Volume page, set the NFS version to **NFSv4.1**, and set Kerberos to **Enabled**.
31+
On the Create a volume page, set the NFS version to **NFSv4.1** and set Kerberos to **Enabled**.
3232

3333
> [!IMPORTANT]
34-
> You cannot modify the Kerberos enablement selection after the volume is created.
34+
> You can't modify the Kerberos enablement selection after the volume is created.
3535

3636
![Create NFSv4.1 Kerberos volume](./media/configure-kerberos-encryption/create-kerberos-volume.png)
3737

@@ -41,31 +41,29 @@ The following requirements apply to NFSv4.1 client encryption:
4141

4242
You can also modify the Kerberos security methods for the volume by clicking Export Policy in the Azure NetApp Files navigation pane.
4343

44-
3. Click **Review + Create** to create the NFSv4.1 volume.
44+
3. Select **Review + Create** to create the NFSv4.1 volume.
4545

4646
## Configure the Azure portal
4747

4848
1. Follow the instructions in [Create an Active Directory connection](create-active-directory-connections.md).
4949

50-
Kerberos requires that you create at least one computer account in Active Directory. The account information you provide is used for creating the accounts for both SMB *and* NFSv4.1 Kerberos volumes. This machine is account is created automatically during volume creation.
50+
Kerberos requires that you create at least one computer account in Active Directory. The account information you provide is used for creating the accounts for both SMB *and* NFSv4.1 Kerberos volumes. This machine account is created automatically during volume creation.
5151

5252
2. Under **Kerberos Realm**, enter the **AD Server Name** and the **KDC IP** address.
5353

54-
AD Server and KDC IP can be the same server. This information is used to create the SPN computer account used by Azure NetApp Files. After the computer account is created, Azure NetApp Files will use DNS Server records to locate additional KDC servers as needed.
54+
AD Server and KDC IP can be the same server. This information is used to create the SPN computer account used by Azure NetApp Files. After the computer account is created, Azure NetApp Files uses DNS Server records to locate additional KDC servers as needed.
5555

5656
![Kerberos Realm](./media/configure-kerberos-encryption/kerberos-realm.png)
5757

58-
3. Click **Join** to save the configuration.
58+
3. Select **Join** to save the configuration.
5959

6060
## Configure Active Directory connection
6161

6262
Configuration of NFSv4.1 Kerberos creates two computer accounts in Active Directory:
6363
* A computer account for SMB shares
64-
* A computer account for NFSv4.1--You can identify this account by way of the prefix `NFS-`.
64+
* A computer account for NFSv4.1--You can identify this account by using the prefix `NFS-`.
6565

66-
After creating the first NFSv4.1 Kerberos volume, set the encryption type for the computer account by using the following PowerShell command:
67-
68-
`Set-ADComputer $NFSCOMPUTERACCOUNT -KerberosEncryptionType AES256`
66+
After creating the first NFSv4.1 Kerberos volume, set the encryption type for the computer account with the PowerShell command `Set-ADComputer $NFSCOMPUTERACCOUNT -KerberosEncryptionType AES256`.
6967

7068
## Configure the NFS client
7169

@@ -100,7 +98,7 @@ Follow instructions in [Configure an NFS client for Azure NetApp Files](configur
10098

10199
## <a name="kerberos_performance"></a>Performance impact of Kerberos on NFSv4.1
102100

103-
You should understand the security options available for NFSv4.1 volumes, the tested performance vectors, and the expected performance impact of kerberos. See [Performance impact of Kerberos on NFSv4.1 volumes](performance-impact-kerberos.md) for details.
101+
You should understand the security options available for NFSv4.1 volumes, the tested performance vectors, and the expected performance impact of kerberos. For detailed information, see [Performance impact of Kerberos on NFSv4.1 volumes](performance-impact-kerberos.md).
104102

105103
## Next steps
106104

articles/azure-netapp-files/performance-impact-kerberos.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,19 +41,19 @@ There are two areas of focus: light load and upper limit. The following lists de
4141

4242
**Performance impact of krb5:**
4343

44-
* Average IOPS decreased by 53%
44+
* Average I/OPS decreased by 53%
4545
* Average throughput decreased by 53%
4646
* Average latency increased by 0.2 ms
4747

4848
**Performance impact of krb5i:**
4949

50-
* Average IOPS decreased by 55%
50+
* Average I/OPS decreased by 55%
5151
* Average throughput decreased by 55%
5252
* Average latency increased by 0.6 ms
5353

5454
**Performance impact of krb5p:**
5555

56-
* Average IOPS decreased by 77%
56+
* Average I/OPS decreased by 77%
5757
* Average throughput decreased by 77%
5858
* Average latency increased by 1.6 ms
5959

0 commit comments

Comments
 (0)