You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/create-active-directory-connections.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: b-hchen
6
6
ms.service: azure-netapp-files
7
7
ms.custom: devx-track-azurepowershell
8
8
ms.topic: how-to
9
-
ms.date: 05/09/2025
9
+
ms.date: 07/10/2025
10
10
ms.author: anfdocs
11
11
# Customer intent: As an Azure NetApp Files administrator, I want to create and manage Active Directory connections, so that I can enable proper authentication and access control for my SMB and NFS volumes.
12
12
---
@@ -32,6 +32,19 @@ Several features of Azure NetApp Files require that you have an Active Directory
32
32
33
33
* The AD connection admin account supports Kerberos AES-128 and Kerberos AES-256 encryption types for authentication with AD DS for Azure NetApp Files computer account creation (for example, AD domain join operations).
34
34
35
+
* To enable AES encryption, you should first enable AES-128, AES-256, RC4, and DES encryption types on Active Directory (AD) then enable AES on the control plane. You must enable encryption in Active Directory first.
36
+
37
+
* To enable AES encryption support for the admin account in the AD connection, run the following Active Directory PowerShell commands:
38
+
39
+
```powershell
40
+
Get-ADUser -Identity <ANF AD connection account username>
`KerberosEncryptionType` is a multivalued parameter that supports the values DES, RC4, AES-128, and AES-256.
45
+
46
+
For more information, refer to the [Set-ADUser documentation](/powershell/module/activedirectory/set-aduser).
47
+
35
48
* To enable the AES encryption on the Azure NetApp Files AD connection admin account, you must use an AD domain user account that is a member of one of the following AD DS groups:
36
49
37
50
* Domain Admins
@@ -46,17 +59,6 @@ Several features of Azure NetApp Files require that you have an Active Directory
46
59
47
60
If you set both AES-128 and AES-256 Kerberos encryption on the admin account of the AD connection, the Windows client negotiates the highest level of encryption supported by your AD DS. For example, if both AES-128 and AES-256 are supported, and the client supports AES-256, then AES-256 will be used.
48
61
49
-
* To enable AES encryption support for the admin account in the AD connection, run the following Active Directory PowerShell commands:
50
-
51
-
```powershell
52
-
Get-ADUser -Identity <ANF AD connection account username>
`KerberosEncryptionType` is a multivalued parameter that supports AES-128 and AES-256 values.
57
-
58
-
For more information, refer to the [Set-ADUser documentation](/powershell/module/activedirectory/set-aduser).
59
-
60
62
* If you have a requirement to enable and disable certain Kerberos encryption types for Active Directory computer accounts for domain-joined Windows hosts used with Azure NetApp Files, you must use the Group Policy `Network Security: Configure Encryption types allowed for Kerberos`.
61
63
62
64
Do not set the registry key `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\SupportedEncryptionTypes`. Doing this will break Kerberos authentication with Azure NetApp Files for the Windows host where this registry key was manually set.
0 commit comments