Skip to content

Commit fcc3f0f

Browse files
authored
Merge pull request #206693 from khdownie/kendownie080222
updating service logon account guidance
2 parents 3c9eae3 + 849480e commit fcc3f0f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,11 +76,11 @@ $ResourceGroupName = "<resource-group-name-here>"
7676
$StorageAccountName = "<storage-account-name-here>"
7777
$SamAccountName = "<sam-account-name-here>"
7878
$DomainAccountType = "<ComputerAccount|ServiceLogonAccount>" # Default is set as ComputerAccount
79-
# ServiceLogonAccount does not support AES256 encryption.
8079
# If you don't provide the OU name as an input parameter, the AD identity that represents the
8180
# storage account is created under the root directory.
8281
$OuDistinguishedName = "<ou-distinguishedname-here>"
8382
# Specify the encryption algorithm used for Kerberos authentication. Using AES256 is recommended.
83+
# Note that ServiceLogonAccount does not support AES256 encryption.
8484
$EncryptionType = "<AES256|RC4|AES256,RC4>"
8585
8686
# Select the target subscription for the current session
@@ -181,7 +181,7 @@ Set-AzStorageAccount `
181181
To enable AES-256 encryption, follow the steps in this section. If you plan to use RC4, skip this section.
182182

183183
> [!IMPORTANT]
184-
> The domain object that represents your storage account must be created as a computer object in the on-premises AD domain. If your domain object doesn't meet this requirement, delete it and create a new domain object that does.
184+
> The domain object that represents your storage account must be created as a computer object in the on-premises AD domain. If your domain object doesn't meet this requirement, delete it and create a new domain object that does. Note that Service Logon Accounts do not support AES256 encryption.
185185
186186
Replace `<domain-object-identity>` and `<domain-name>` with your values, then run the following cmdlet to configure AES-256 support:
187187

0 commit comments

Comments
 (0)