Skip to content

Commit c89fbaf

Browse files
committed
Change all intune/gpo/regkey instances to tabs
1 parent 469ac71 commit c89fbaf

File tree

1 file changed

+57
-13
lines changed

1 file changed

+57
-13
lines changed

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 57 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -201,9 +201,23 @@ Enable the Microsoft Entra Kerberos functionality on the client machine(s) you w
201201

202202
Use one of the following three methods:
203203

204-
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#cloudkerberosticketretrievalenabled), set to 1
205-
- Configure this group policy on the client(s) to "Enabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
206-
- Set the following registry value on the client(s) by running this command from an elevated command prompt: `reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 1`
204+
# [Intune](#tab/intune)
205+
206+
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#cloudkerberosticketretrievalenabled), set to 1
207+
208+
# [Group Policy](#tab/gpo)
209+
210+
Configure this group policy on the client(s) to "Enabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
211+
212+
# [Registry Key](#tab/regkey)
213+
214+
Set the following registry value on the client(s) by running this command from an elevated command prompt:
215+
216+
```console
217+
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 1
218+
```
219+
220+
---
207221

208222
Changes are not instant, and require a policy refresh or a reboot to take effect.
209223

@@ -233,11 +247,11 @@ Configure this group policy on the client(s): `Administrative Template\System\Ke
233247

234248
Run the following `ksetup` Windows command on the client(s):
235249

236-
```
250+
```console
237251
ksetup /addhosttorealmmap <hostname> <REALMNAME>
238252
```
239253

240-
For example, `ksetup /addhosttorealmmap <your storage account name>.file.core.windows.net CONTOSO.LOCAL`
254+
For example, if your realm is `CONTOSO.LOCAL`, run `ksetup /addhosttorealmmap <your storage account name>.file.core.windows.net CONTOSO.LOCAL`
241255

242256
---
243257

@@ -248,19 +262,49 @@ For example, `ksetup /addhosttorealmmap <your storage account name>.file.core.wi
248262

249263
If you no longer want to use a client machine for Microsoft Entra Kerberos authentication, you can disable the Microsoft Entra Kerberos functionality on that machine. Use one of the following three methods, depending on how you enabled the functionality:
250264

251-
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#kerberos-cloudkerberosticketretrievalenabled), set to 0
252-
- Configure this group policy on the client(s) to "Disabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
253-
- Set the following registry value on the client(s) by running this command from an elevated command prompt: `reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 0`
265+
# [Intune](#tab/intune)
266+
267+
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#kerberos-cloudkerberosticketretrievalenabled), set to 0
268+
269+
# [Group Policy](#tab/gpo)
270+
271+
Configure this group policy on the client(s) to "Disabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
272+
273+
# [Registry Key](#tab/regkey)
274+
275+
Set the following registry value on the client(s) by running this command from an elevated command prompt:
276+
277+
```console
278+
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 0
279+
```
280+
281+
---
254282

255283
Changes are not instant, and require a policy refresh or a reboot to take effect.
256284

257285
If you followed the steps in [Configure coexistence with storage accounts using on-premises AD DS](#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds), you can optionally remove all host name to Kerberos realm mappings from the client machine. Use one of the following three methods:
258286

259-
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/HostToRealm](/windows/client-management/mdm/policy-csp-admx-kerberos#hosttorealm)
260-
- Configure this group policy on the client(s): `Administrative Template\System\Kerberos\Define host name-to-Kerberos realm mappings`
261-
- Run the `ksetup` Windows command on the client(s): `ksetup /delhosttorealmmap <hostname> <realmname>`
262-
- For example, `ksetup /delhosttorealmmap <your storage account name>.file.core.windows.net contoso.local`
263-
- You can view the list of current host name to Kerberos realm mappings by inspecting the registry key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\HostToRealm`.
287+
# [Intune](#tab/intune)
288+
289+
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/HostToRealm](/windows/client-management/mdm/policy-csp-admx-kerberos#hosttorealm)
290+
291+
# [Group Policy](#tab/gpo)
292+
293+
Configure this group policy on the client(s): `Administrative Template\System\Kerberos\Define host name-to-Kerberos realm mappings`
294+
295+
# [Registry Key](#tab/regkey)
296+
297+
Run the following `ksetup` Windows command on the client(s):
298+
299+
```console
300+
ksetup /delhosttorealmmap <hostname> <realmname>
301+
```
302+
303+
For example, if your realm is `CONTOSO.LOCAL`, run `ksetup /delhosttorealmmap <your storage account name>.file.core.windows.net CONTOSO.LOCAL`
304+
305+
You can view the list of current host name to Kerberos realm mappings by inspecting the registry key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\HostToRealm`.
306+
307+
---
264308

265309
Changes aren't instant, and require a policy refresh or a reboot to take effect.
266310

0 commit comments

Comments
 (0)