Skip to content

Commit dccccfc

Browse files
committed
Removing modefromsid idsfromsid cifsacl
1 parent 82964f7 commit dccccfc

File tree

1 file changed

+6
-24
lines changed

1 file changed

+6
-24
lines changed

articles/storage/files/storage-files-identity-auth-linux-kerberos-enable.md

Lines changed: 6 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based Kerberos authentication for Linu
44
author: khdownie
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 03/10/2023
7+
ms.date: 03/14/2023
88
ms.author: kendownie
99
ms.subservice: files
1010
---
@@ -442,16 +442,6 @@ You can also run the command as a part of a script:
442442
wbinfo -K 'contososmbadmin%SUPERSECRETPASSWORD'
443443
```
444444
445-
## Choose an access control model
446-
447-
Before you mount the share, you need to choose one of the following access control models for mounting SMB Azure file shares:
448-
449-
1. **Server enforced access control using NT ACLs (default):** Uses NT access control lists (ACLs) to enforce access control. This option is recommended for most scenarios, unless your environment is predominantly Linux. Linux tools that update NT ACLs are minimal, so update ACLs through Windows. Use this access control model only with NT ACLs (no mode bits).
450-
451-
2. **Client enforced access control (modefromsid,idsfromsid)**: Use this access control model if your environment is exclusively Linux. There's no interoperability with Windows, and Windows isn't able to read the permissions that are encoded into ACLs. Recommended only for advanced Linux users.
452-
453-
3. **Client translated access control (cifsacl)**: Use this access control model if your environment is mixed Linux and Windows. Mode bits permissions and ownership information are stored in NT ACLs, so both Windows and Linux clients can use this model. However, we don't recommend using this method if Windows and Linux clients will use the same file share, as some Linux features aren't supported.
454-
455445
## Mount the file share
456446
457447
After you've enabled AD (or Azure AD) Kerberos authentication and domain-joined your Linux VM, you can mount the file share. The mount options differ somewhat depending on the [access control model](#choose-an-access-control-model) you're using. These mount options are specific to Linux clients connecting to an Azure file share. Your scenario could span multiple use cases, in which case you can merge the mount options.
@@ -460,6 +450,9 @@ For detailed mounting instructions, see [Mount the Azure file share on-demand wi
460450

461451
Use the following additional mount option with all access control models to enable Kerberos security: `sec=krb5`
462452

453+
> [!Note]
454+
> This feature only supports using server-enforced access control using NT ACLs with no mode bits. Linux tools that update NT ACLs are minimal, so update ACLs through Windows. Client-enforced access control (`modefromsid,idsfromsid`) and client-translated access control (`cifsacl`) models aren't currently supported.
455+
463456
### Other mount options
464457
465458
#### Single-user versus multi-user mount
@@ -470,24 +463,13 @@ In a multi-user mount use case, there's still a single mount point, but multiple
470463
471464
#### File permissions
472465
473-
File permissions matter, especially if both Linux and Windows clients will access the file share.
474-
475-
Choose one of the following mount options to convert file permissions to DACLs on files:
476-
477-
- Use a default (recommended), such as **file_mode=<>,dir_mode=<>**. File permissions specified as **file_mode** and **dir_mode** are only enforced within the client. The server enforces access control based on the file's or directory's security descriptor.
478-
- Specify **modefromsid,idsfromsid** so that access control is done only on the client. The server won't enforce any access control with this mount option.
479-
- Specify **cifsacl** so permissions are visible to Linux apps and can be set, and are enforced on both client and server.
480-
481-
You can also specify the **noperm** mount option if you want permission checking to only be done on the server. Otherwise, permission checking is done on both the client with the mode bits and the server with the ACL.
466+
File permissions matter, especially if both Linux and Windows clients will access the file share. To convert file permissions to DACLs on files, use a default mount option such as **file_mode=<>,dir_mode=<>**. File permissions specified as **file_mode** and **dir_mode** are only enforced within the client. The server enforces access control based on the file's or directory's security descriptor.
482467
483468
#### File ownership
484469
485-
File ownership matters, especially if both Linux and Windows clients will access the file share.
486-
487-
Choose one of the following mount options to convert file ownership UID/GID to owner/group SID on file DACL:
470+
File ownership matters, especially if both Linux and Windows clients will access the file share. Choose one of the following mount options to convert file ownership UID/GID to owner/group SID on file DACL:
488471
489472
- Use a default such as **uid=<>,gid=<>**
490-
- Specify **modefromsid,idsfromsid** so that local Linux UID/GID are encoded in the ownership field of the security descriptor. If multiple Linux clients access the same share, be careful to keep consistent mapping between users and their IDs.
491473
- Configure UID/GID mapping via RFC2307 and Active Directory (**nss_winbind** or **nss_sssd**)
492474
493475
#### File attribute cache coherency

0 commit comments

Comments
 (0)