Skip to content

Commit cfe3574

Browse files
Merge pull request #286118 from MaximeKjaer/patch-4
Add details to GPO instructions in Azure Files + Entra Kerb doc
2 parents dad1d16 + c89fbaf commit cfe3574

File tree

1 file changed

+79
-15
lines changed

1 file changed

+79
-15
lines changed

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 79 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -201,9 +201,23 @@ Enable the Microsoft Entra Kerberos functionality on the client machine(s) you w
201201

202202
Use one of the following three methods:
203203

204-
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#cloudkerberosticketretrievalenabled), set to 1
205-
- Configure this group policy on the client(s) to "Enabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
206-
- Set the following registry value on the client(s) by running this command from an elevated command prompt: `reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 1`
204+
# [Intune](#tab/intune)
205+
206+
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#cloudkerberosticketretrievalenabled), set to 1
207+
208+
# [Group Policy](#tab/gpo)
209+
210+
Configure this group policy on the client(s) to "Enabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
211+
212+
# [Registry Key](#tab/regkey)
213+
214+
Set the following registry value on the client(s) by running this command from an elevated command prompt:
215+
216+
```console
217+
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 1
218+
```
219+
220+
---
207221

208222
Changes are not instant, and require a policy refresh or a reboot to take effect.
209223

@@ -216,10 +230,30 @@ If you want to enable client machines to connect to storage accounts that are co
216230

217231
Add an entry for each storage account that uses on-premises AD DS integration. Use one of the following three methods to configure Kerberos realm mappings. Changes aren't instant, and require a policy refresh or a reboot to take effect.
218232

219-
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/HostToRealm](/windows/client-management/mdm/policy-csp-admx-kerberos#hosttorealm)
220-
- Configure this group policy on the client(s): `Administrative Template\System\Kerberos\Define host name-to-Kerberos realm mappings`
221-
- Run the `ksetup` Windows command on the client(s): `ksetup /addhosttorealmmap <hostname> <REALMNAME>`
222-
- For example, `ksetup /addhosttorealmmap <your storage account name>.file.core.windows.net CONTOSO.LOCAL`
233+
# [Intune](#tab/intune)
234+
235+
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/HostToRealm](/windows/client-management/mdm/policy-csp-admx-kerberos#hosttorealm)
236+
237+
# [Group Policy](#tab/gpo)
238+
239+
Configure this group policy on the client(s): `Administrative Template\System\Kerberos\Define host name-to-Kerberos realm mappings`
240+
241+
- Set the policy to `Enabled`
242+
- Then, click on the `Show...` button to define the list of host name-to-realm mappings. For each storage account configured for AD DS, add an entry where:
243+
- `Value` is the AD DS-enabled storage account's host name, i.e. `<your storage account name>.file.core.windows.net`
244+
- `Value name` is the AD DS realm name
245+
246+
# [Registry Key](#tab/regkey)
247+
248+
Run the following `ksetup` Windows command on the client(s):
249+
250+
```console
251+
ksetup /addhosttorealmmap <hostname> <REALMNAME>
252+
```
253+
254+
For example, if your realm is `CONTOSO.LOCAL`, run `ksetup /addhosttorealmmap <your storage account name>.file.core.windows.net CONTOSO.LOCAL`
255+
256+
---
223257

224258
> [!IMPORTANT]
225259
> In Kerberos, realm names are case sensitive and upper case. Your Kerberos realm name is usually the same as your domain name, in upper-case letters.
@@ -228,19 +262,49 @@ Add an entry for each storage account that uses on-premises AD DS integration. U
228262

229263
If you no longer want to use a client machine for Microsoft Entra Kerberos authentication, you can disable the Microsoft Entra Kerberos functionality on that machine. Use one of the following three methods, depending on how you enabled the functionality:
230264

231-
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#kerberos-cloudkerberosticketretrievalenabled), set to 0
232-
- Configure this group policy on the client(s) to "Disabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
233-
- Set the following registry value on the client(s) by running this command from an elevated command prompt: `reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 0`
265+
# [Intune](#tab/intune)
266+
267+
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#kerberos-cloudkerberosticketretrievalenabled), set to 0
268+
269+
# [Group Policy](#tab/gpo)
270+
271+
Configure this group policy on the client(s) to "Disabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
272+
273+
# [Registry Key](#tab/regkey)
274+
275+
Set the following registry value on the client(s) by running this command from an elevated command prompt:
276+
277+
```console
278+
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKerberosTicketRetrievalEnabled /t REG_DWORD /d 0
279+
```
280+
281+
---
234282

235283
Changes are not instant, and require a policy refresh or a reboot to take effect.
236284

237285
If you followed the steps in [Configure coexistence with storage accounts using on-premises AD DS](#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds), you can optionally remove all host name to Kerberos realm mappings from the client machine. Use one of the following three methods:
238286

239-
- Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/HostToRealm](/windows/client-management/mdm/policy-csp-admx-kerberos#hosttorealm)
240-
- Configure this group policy on the client(s): `Administrative Template\System\Kerberos\Define host name-to-Kerberos realm mappings`
241-
- Run the `ksetup` Windows command on the client(s): `ksetup /delhosttorealmmap <hostname> <realmname>`
242-
- For example, `ksetup /delhosttorealmmap <your storage account name>.file.core.windows.net contoso.local`
243-
- You can view the list of current host name to Kerberos realm mappings by inspecting the registry key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\HostToRealm`.
287+
# [Intune](#tab/intune)
288+
289+
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/HostToRealm](/windows/client-management/mdm/policy-csp-admx-kerberos#hosttorealm)
290+
291+
# [Group Policy](#tab/gpo)
292+
293+
Configure this group policy on the client(s): `Administrative Template\System\Kerberos\Define host name-to-Kerberos realm mappings`
294+
295+
# [Registry Key](#tab/regkey)
296+
297+
Run the following `ksetup` Windows command on the client(s):
298+
299+
```console
300+
ksetup /delhosttorealmmap <hostname> <realmname>
301+
```
302+
303+
For example, if your realm is `CONTOSO.LOCAL`, run `ksetup /delhosttorealmmap <your storage account name>.file.core.windows.net CONTOSO.LOCAL`
304+
305+
You can view the list of current host name to Kerberos realm mappings by inspecting the registry key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\HostToRealm`.
306+
307+
---
244308

245309
Changes aren't instant, and require a policy refresh or a reboot to take effect.
246310

0 commit comments

Comments
 (0)