Skip to content

Commit dfbc094

Browse files
committed
removed outdated Azure AD screenshot
1 parent abf1e7b commit dfbc094

File tree

2 files changed

+7
-10
lines changed

2 files changed

+7
-10
lines changed

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable identity-based Kerberos authentication for hybr
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 05/09/2024
7+
ms.date: 08/19/2024
88
ms.author: kendownie
99
ms.custom: engagement-fy23
1010
recommendations: false
@@ -144,15 +144,12 @@ After enabling Microsoft Entra Kerberos authentication, you'll need to explicitl
144144
You can configure the API permissions from the [Azure portal](https://portal.azure.com) by following these steps:
145145

146146
1. Open **Microsoft Entra ID**.
147-
2. Select **App registrations** on the left pane.
148-
3. Select **All Applications**.
149-
150-
:::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/azure-portal-azuread-app-registrations.png" alt-text="Screenshot of the Azure portal. Microsoft Entra ID is open. App registrations is selected in the left pane. All applications is highlighted in the right pane." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/azure-portal-azuread-app-registrations.png":::
151-
152-
4. Select the application with the name matching **[Storage Account] `<your-storage-account-name>`.file.core.windows.net**.
153-
5. Select **API permissions** in the left pane.
154-
6. Select **Grant admin consent for [Directory Name]** to grant consent for the three requested API permissions (openid, profile, and User.Read) for all accounts in the directory.
155-
7. Select **Yes** to confirm.
147+
1. In the service menu, under **Manage**, select **App registrations**.
148+
1. Select **All Applications**.
149+
1. Select the application with the name matching **[Storage Account] `<your-storage-account-name>`.file.core.windows.net**.
150+
1. In the service menu, under **Manage**, select **API permissions**.
151+
1. Select **Grant admin consent for [Directory Name]** to grant consent for the three requested API permissions (openid, profile, and User.Read) for all accounts in the directory.
152+
1. Select **Yes** to confirm.
156153

157154
> [!IMPORTANT]
158155
> If you're connecting to a storage account via a private endpoint/private link using Microsoft Entra Kerberos authentication, you'll also need to add the private link FQDN to the storage account's Microsoft Entra application. For instructions, see the entry in our [troubleshooting guide](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#error-1326---the-username-or-password-is-incorrect-when-using-private-link).

0 commit comments

Comments
 (0)