Skip to content

Commit bbf6fb0

Browse files
committed
Clarifying line of sight reqs
1 parent 8b29e55 commit bbf6fb0

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

articles/storage/files/storage-files-identity-auth-azure-active-directory-enable.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,15 @@ description: Learn how to enable identity-based Kerberos authentication for hybr
44
author: khdownie
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 11/10/2022
7+
ms.date: 11/11/2022
88
ms.author: kendownie
99
ms.subservice: files
10+
ms.custom: engagement-fy23
1011
---
1112

1213
# Enable Azure Active Directory Kerberos authentication for hybrid identities on Azure Files
1314

14-
This article focuses on enabling and configuring Azure Active Directory (Azure AD) for authenticating [hybrid user identities](../../active-directory/hybrid/whatis-hybrid-identity.md), which are on-premises AD DS identities that are synced to Azure AD. This allows Azure AD users to access Azure file shares using Kerberos authentication. This configuration uses Azure AD to issue the necessary Kerberos tickets to access the file share with the SMB protocol. This means your end users can access Azure file shares over the internet without requiring a line-of-sight to domain controllers from hybrid Azure AD-joined and Azure AD-joined VMs. However, configuring Windows access control lists (ACLs) and permissions for a user or group might require line-of-sight to the domain controller.
15+
This article focuses on enabling and configuring Azure Active Directory (Azure AD) for authenticating [hybrid user identities](../../active-directory/hybrid/whatis-hybrid-identity.md), which are on-premises AD DS identities that are synced to Azure AD. This allows Azure AD users to access Azure file shares using Kerberos authentication. This configuration uses Azure AD to issue the necessary Kerberos tickets to access the file share with the SMB protocol. This means your end users can access Azure file shares over the internet without requiring a line-of-sight to domain controllers from hybrid Azure AD-joined and Azure AD-joined VMs. However, configuring Windows access control lists (ACLs)/directory and file-level permissions for a user or group requires line-of-sight to the on-premises domain controller.
1516

1617
For more information on supported options and considerations, see [Overview of Azure Files identity-based authentication options for SMB access](storage-files-active-directory-overview.md). For more information about Azure AD Kerberos, see [Deep dive: How Azure AD Kerberos works](https://techcommunity.microsoft.com/t5/itops-talk-blog/deep-dive-how-azure-ad-kerberos-works/ba-p/3070889).
1718

@@ -164,12 +165,14 @@ To set share-level permissions, follow the instructions in [Assign share-level p
164165

165166
## Configure directory and file-level permissions
166167

167-
Once your share-level permissions are in place, there are two options for configuring directory and file-level permissions with Azure AD Kerberos authentication:
168+
Once your share-level permissions are in place, you must assign directory/file-level permissions to the user or group. **This requires using a device with line-of-sight to an on-premises AD**. To use Windows File Explorer, the device also needs to be domain-joined.
168169

169-
- **Windows Explorer experience:** If you choose this option, then the client must be domain-joined to the on-premises AD.
170-
- **icacls utility:** If you choose this option, then the client needs line-of-sight to the on-premises AD.
170+
There are two options for configuring directory and file-level permissions with Azure AD Kerberos authentication:
171171

172-
To configure directory and file-level permissions through Windows File explorer, you also need to specify domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or from an on-premises AD-joined client. If you prefer to configure using icacls, this step is not required.
172+
- **Windows File Explorer:** If you choose this option, then the client must be domain-joined to the on-premises AD.
173+
- **icacls utility:** If you choose this option, then the client doesn't need to be domain-joined, but needs line-of-sight to the on-premises AD.
174+
175+
To configure directory and file-level permissions through Windows File Explorer, you also need to specify domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or from an on-premises AD-joined client. If you prefer to configure using icacls, this step is not required.
173176

174177
To configure directory and file-level permissions, follow the instructions in [Configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md).
175178

0 commit comments

Comments
 (0)