Skip to content

Commit ef4c5f4

Browse files
Merge pull request #226278 from khdownie/kendownie020323-2
multiforest must use icacls
2 parents 467b16e + c211982 commit ef4c5f4

File tree

3 files changed

+12
-3
lines changed

3 files changed

+12
-3
lines changed

articles/storage/files/storage-files-faq.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Frequently asked questions (FAQ) for Azure Files
33
description: Get answers to Azure Files frequently asked questions. You can mount Azure file shares concurrently on cloud or on-premises Windows, Linux, or macOS deployments.
44
author: khdownie
55
ms.service: storage
6-
ms.date: 09/08/2022
6+
ms.date: 02/03/2023
77
ms.author: kendownie
88
ms.subservice: files
99
ms.topic: conceptual
@@ -113,7 +113,12 @@ ms.topic: conceptual
113113
* <a id="ad-multiple-forest"></a>
114114
**Does on-premises AD DS authentication for Azure file shares support integration with an AD DS environment using multiple forests?**
115115

116-
Azure Files on-premises AD DS authentication only integrates with the forest of the domain service that the storage account is registered to. To support authentication from another forest, your environment must have a forest trust configured correctly. The way Azure Files register in AD DS almost the same as a regular file server, where it creates an identity (computer or service logon account) in AD DS for authentication. The only difference is that the registered SPN of the storage account ends with "file.core.windows.net" which does not match with the domain suffix. Consult your domain administrator to see if any update to your suffix routing policy is required to enable multiple forest authentication due to the different domain suffix. We provide an example below to configure suffix routing policy.
116+
Azure Files on-premises AD DS authentication only integrates with the forest of the domain service that the storage account is registered to. To support authentication from another forest, your environment must have a forest trust configured correctly.
117+
118+
> [!Note]
119+
> In a multi-forest setup, don't use Windows Explorer to configure Windows ACLs/NTFS permissions at the root, directory, or file level. [Use icacls](storage-files-identity-ad-ds-configure-permissions.md#configure-windows-acls-with-icacls) instead.
120+
121+
The way Azure Files register in AD DS almost the same as a regular file server, where it creates an identity (computer or service logon account) in AD DS for authentication. The only difference is that the registered SPN of the storage account ends with "file.core.windows.net" which does not match with the domain suffix. Consult your domain administrator to see if any update to your suffix routing policy is required to enable multiple forest authentication due to the different domain suffix. We provide an example below to configure suffix routing policy.
117122

118123
Example: When users in forest A domain want to reach a file share with the storage account registered against a domain in forest B, this won't automatically work because the service principal of the storage account doesn't have a suffix matching the suffix of any domain in forest A. We can address this issue by manually configuring a suffix routing rule from forest A to forest B for a custom suffix of "file.core.windows.net".
119124

articles/storage/files/storage-files-identity-ad-ds-configure-permissions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,9 @@ net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /use
100100

101101
You can configure the Windows ACLs using either [icacls](#configure-windows-acls-with-icacls) or [Windows File Explorer](#configure-windows-acls-with-windows-file-explorer). You can also use the [Set-ACL](/powershell/module/microsoft.powershell.security/set-acl) PowerShell command.
102102

103+
> [!IMPORTANT]
104+
> If your environment has multiple AD DS forests, don't use Windows Explorer to configure ACLs. Use icacls instead.
105+
103106
If you have directories or files in on-premises file servers with Windows ACLs configured against the AD DS identities, you can copy them over to Azure Files persisting the ACLs with traditional file copy tools like Robocopy or [Azure AzCopy v 10.4+](https://github.com/Azure/azure-storage-azcopy/releases). If your directories and files are tiered to Azure Files through Azure File Sync, your ACLs are carried over and persisted in their native format.
104107

105108
### Configure Windows ACLs with icacls

articles/storage/files/storage-troubleshoot-windows-file-connection-problems.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -471,9 +471,10 @@ The cmdlet performs these checks below in sequence and provides guidance for fai
471471

472472
### Symptom
473473

474-
You may experience either symptoms described below when trying to configure Windows ACLs with File Explorer on a mounted file share:
474+
You may experience one of the symptoms described below when trying to configure Windows ACLs with File Explorer on a mounted file share:
475475
- After you click on **Edit permission** under the Security tab, the Permission wizard doesn't load.
476476
- When you try to select a new user or group, the domain location doesn't display the right AD DS domain.
477+
- You're using multiple AD forests and get the following error message: "The Active Directory domain controllers required to find the selected objects in the following domains are not available. Ensure the Active Directory domain controllers are available, and try to select the objects again."
477478

478479
### Solution
479480

0 commit comments

Comments
 (0)