Skip to content

Commit 0ee27de

Browse files
Merge pull request #314379 from MicrosoftDocs/ttorble-patch-1
Fix warning in publish PR
2 parents aa3af4d + 1aa5842 commit 0ee27de

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

articles/storage/files/storage-files-identity-ad-ds-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ If you're new to Azure Files, read the [planning guide](storage-files-planning.m
2323

2424
- To use identity-based authentication with Azure Files, you must assign share-level RBAC permissions. You can do this in two ways:
2525
- **[Default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities):** This option applies RBAC at the share level for all authenticated users. With this configuration, you don't need to sync your on-premises AD DS identities to Microsoft Entra ID.
26-
- **[Granular share-level permissions](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-specific-entra-users-or-groups):** If you want to assign RBAC at the share level to specific users or groups, you must synchronize the corresponding identities from your on-premises AD DS to Entra ID by using [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync). Groups created only in Entra ID won't work unless they contain synced user accounts. Password hash synchronization isn't required.
26+
- **[Granular share-level permissions](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-specific-azure-ad-users-or-groups):** If you want to assign RBAC at the share level to specific users or groups, you must synchronize the corresponding identities from your on-premises AD DS to Entra ID by using [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync). Groups created only in Entra ID won't work unless they contain synced user accounts. Password hash synchronization isn't required.
2727
- Client OS requirements: Windows 8 / Windows Server 2012 or later, or Linux VMs such as Ubuntu 18.04+ and equivalent RHEL/SLES distributions.
2828
- Kerberos authentication is available with Active Directory by using [AES 256 encryption](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended). AES 128 Kerberos encryption isn't yet supported.
2929
- Single sign-on (SSO) is supported.

0 commit comments

Comments
 (0)