Skip to content

Commit d39193a

Browse files
Merge pull request #300239 from khdownie/patch-5
Update storage-files-identity-ad-ds-overview.md
2 parents 12be963 + 3b20d18 commit d39193a

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

articles/storage/files/storage-files-identity-ad-ds-overview.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,8 @@ description: Learn about Active Directory Domain Services (AD DS) authentication
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 05/09/2024
7+
ms.date: 05/22/2024
88
ms.author: kendownie
9-
recommendations: false
109
---
1110

1211
# Overview: On-premises Active Directory Domain Services authentication over SMB for Azure file shares
@@ -33,7 +32,7 @@ If you're new to Azure Files, we recommend reading our [planning guide](storage-
3332

3433
## Supported scenarios and restrictions
3534

36-
- To assign share-level RBAC permissions to specific users or groups, on-premises AD DS identities must be synced to Microsoft Entra ID using Entra Connect Sync. If identities aren't synced, you must [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities), which applies to all authenticated users. Password hash synchronization isn't required.
35+
- To assign share-level RBAC permissions to specific users or groups, on-premises AD DS identities must be synced to Microsoft Entra ID using Entra Connect Sync. If identities aren't synced, you must [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities), which applies to all authenticated users. For example, a group created only in Microsoft Entra ID won't work if RBAC permissions are configured at the share level. However, if the group contains user accounts synced from on-premises, then you can use those identities. Password hash synchronization isn't required.
3736
- Client OS requirements: Windows 8 / Windows Server 2012 or later, or Linux VMs such as Ubuntu 18.04+ and equivalent RHEL/SLES distributions.
3837
- Azure file shares can be managed with Azure File Sync.
3938
- Kerberos authentication is available with Active Directory using [AES 256 encryption](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 128 Kerberos encryption isn't yet supported.

0 commit comments

Comments
 (0)