Skip to content

Commit c595ab3

Browse files
Merge pull request #209968 from khdownie/kendownie090122-2
adjusting client methods
2 parents 98e704d + 4ed6cd0 commit c595ab3

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/storage/files/storage-files-identity-auth-azure-active-directory-enable.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -124,11 +124,15 @@ To configure directory and file level permissions through Windows File explorer,
124124

125125
To configure directory and file-level permissions, follow the instructions in [Configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md).
126126

127-
## Configure the clients by setting group policy
127+
## Configure the clients
128128

129-
Enable the Azure AD Kerberos functionality on the client machine(s) you want to mount/use Azure File shares from by configuring this group policy on every client on which Azure Files will be used.
129+
Enable the Azure AD Kerberos functionality on the client machine(s) you want to mount/use Azure File shares from. You must do this on every client on which Azure Files will be used.
130130

131-
`Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
131+
Use one of the following three methods:
132+
133+
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the session host: [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#kerberos-cloudkerberosticketretrievalenabled)
134+
- Configure this Group policy on the session host: `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
135+
- Create the following registry value on the session host: `reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 1`
132136

133137
## Disable Azure AD authentication on your storage account
134138

0 commit comments

Comments
 (0)