Skip to content

Commit d5fda40

Browse files
committed
outline password character statement
1 parent dec8265 commit d5fda40

File tree

2 files changed

+7
-4
lines changed

2 files changed

+7
-4
lines changed

articles/azure-netapp-files/create-active-directory-connections.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: how-to
15-
ms.date: 11/23/2022
15+
ms.date: 11/28/2022
1616
ms.author: anfdocs
1717
---
1818
# Create and manage Active Directory connections for Azure NetApp Files
@@ -50,7 +50,7 @@ Several features of Azure NetApp Files require that you have an Active Directory
5050
* Alternatively, an AD domain user account with `msDS-SupportedEncryptionTypes` write permission on the AD connection admin account can also be used to set the Kerberos encryption type property on the AD connection admin account.
5151

5252
>[!NOTE]
53-
>It's _not_ recommended or required to add the Azure NetApp Files AD admin account to the AD domain groups listed above. Nor is it recommended or required to grant `msDS-SupportedEncryptionTypes` write permission to the Azure NetApp Files AD admin account.
53+
>It's _not_ recommended nor required to add the Azure NetApp Files AD admin account to the AD domain groups listed above. Nor is it recommended or required to grant `msDS-SupportedEncryptionTypes` write permission to the Azure NetApp Files AD admin account.
5454
5555
If you set both AES-128 and AES-256 Kerberos encryption on the admin account of the AD connection, the highest level of encryption supported by your AD DS will be used.
5656

@@ -245,6 +245,9 @@ Several features of Azure NetApp Files require that you have an Active Directory
245245
246246
![Screenshot that shows Active Directory credentials fields showing username, password and confirm password fields.](../media/azure-netapp-files/active-directory-credentials.png)
247247
248+
>[!IMPORTANT]
249+
>Active Directory passwords with Azure NetApp Files cannot exceed 64 characters.
250+
248251
3. Select **Join**.
249252
250253
The Active Directory connection you created appears.

articles/azure-netapp-files/modify-active-directory-connections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: b-hchen
55
ms.service: azure-netapp-files
66
ms.workload: storage
77
ms.topic: how-to
8-
ms.date: 11/02/2022
8+
ms.date: 11/28/2022
99
ms.author: anfdocs
1010
---
1111

@@ -38,7 +38,7 @@ Once you have [created an Active Directory connection](create-active-directory-c
3838
| Backup policy users | You can include additional accounts that require elevated privileges to the computer account created for use with Azure NetApp Files. See [Create and manage Active Directory connections](create-active-directory-connections.md#create-an-active-directory-connection) for more information. | Yes | None* | The specified accounts will be allowed to change the NTFS permissions at the file or folder level. |
3939
| Administrators | Specify users or groups that will be given administrator privileges on the volume | Yes | None | User account will receive administrator privileges |
4040
| Username | Username of the Active Directory domain administrator | Yes | None* | Credential change to contact DC |
41-
| Password | Password of the Active Directory domain administrator | Yes | None* | Credential change to contact DC |
41+
| Password | Password of the Active Directory domain administrator | Yes | None* <br></br> Password cannot exceed 64 characters. | Credential change to contact DC |
4242
| Kerberos Realm: AD Server Name | The name of the Active Directory machine. This option is only used when creating a Kerberos volume. | Yes | None* | |
4343
| Kerberos Realm: KDC IP | Specifies the IP address of the Kerberos Distribution Center (KDC) server. KDC in Azure NetApp Files is an Active Directory server | Yes | None | A new KDC IP address will be used |
4444
| Region | The region where the Active Directory credentials are associated | No | None | N/A |

0 commit comments

Comments
 (0)