Skip to content

Commit dcf2a16

Browse files
committed
NDVALPHA-ABSOLUTELINK
1 parent bb55413 commit dcf2a16

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The AD DS account created by the cmdlet represents the storage account. If the A
4646
> The `Join-AzStorageAccount` cmdlet will create an AD account to represent the storage account (file share) in AD. You can choose to register as a computer account or service logon account, see [FAQ](./storage-files-faq.md#security-authentication-and-access-control) for details. Service logon account passwords can expire in AD if they have a default password expiration age set on the AD domain or OU. Because computer account password changes are driven by the client machine and not AD, they don't expire in AD, although client computers change their passwords by default every 30 days.
4747
> For both account types, we recommend you check the password expiration age configured and plan to [update the password of your storage account identity](storage-files-identity-ad-ds-update-password.md) of the AD account before the maximum password age. You can consider [creating a new AD Organizational Unit in AD](/powershell/module/activedirectory/new-adorganizationalunit) and disabling password expiration policy on [computer accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj852252(v=ws.11)) or service logon accounts accordingly.
4848
49-
You must run the script below in PowerShell 5.1 on a device that's domain joined to your on-premises AD DS, using an on-premises AD DS credential that's synced to your Azure AD. To follow the [Least privilege principle](https://learn.microsoft.com/azure/active-directory/develop/secure-least-privileged-access), the on-premises AD DS credential must have the following Azure roles:
49+
You must run the script below in PowerShell 5.1 on a device that's domain joined to your on-premises AD DS, using an on-premises AD DS credential that's synced to your Azure AD. To follow the [Least privilege principle](/articles/role-based-access-control/best-practices.md), the on-premises AD DS credential must have the following Azure roles:
5050

5151
- **Reader** on the `Resource group` where the target storage account is located.
5252
- **Contributor** on the `Storage account` to be joined to AD DS.

0 commit comments

Comments
 (0)