Skip to content

Commit 492c87d

Browse files
committed
Fix formatting
1 parent 916f80f commit 492c87d

1 file changed

Lines changed: 14 additions & 14 deletions

File tree

articles/storage/files/storage-files-identity-auth-hybrid-cloud-trust.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -77,13 +77,13 @@ To enable Microsoft Entra Kerberos authentication by using the [Azure portal](ht
7777

7878
# [Azure PowerShell](#tab/azure-powershell)
7979

80-
To enable Microsoft Entra Kerberos by using Azure PowerShell, run the following command. Remember to replace placeholder values, including brackets, with your values.
80+
To enable Microsoft Entra Kerberos by using Azure PowerShell, run the following command. Replace the placeholder values, including brackets, with your values.
8181

8282
```azurepowershell
8383
Set-AzStorageAccount -ResourceGroupName <resourceGroupName> -StorageAccountName <storageAccountName> -EnableAzureActiveDirectoryKerberosForFile $true
8484
```
8585

86-
**Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, you also need to specify the domain name and domain GUID for your Active Directory. If you'd prefer to configure directory and file-level permissions by using icacls, you can skip this step. However, if you want to use icacls, the client needs line-of-sight to the Active Directory.
86+
**Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, you also need to specify the domain name and domain GUID for your Active Directory. If you'd prefer to configure directory and file-level permissions by using icacls, you can skip this step. However, if you want to use icacls, the client needs line-of-sight to the on-premises Active Directory.
8787

8888
You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlets from an on-premises Active Directory-joined client:
8989

@@ -325,24 +325,24 @@ Identify your [Microsoft Entra tenant ID](/azure/active-directory/fundamentals/h
325325

326326
Set this Group Policy on the clients to "Enabled": `Administrative Templates\System\Kerberos\Specify KDC proxy servers for Kerberos clients`
327327

328-
1. Deploy the following Group Policy setting to client machines by using the incoming trust-based flow:
328+
Deploy the Group Policy setting to client machines by using the incoming trust-based flow:
329329

330-
1. Edit the **Administrative Templates\System\Kerberos\Specify KDC proxy servers for Kerberos clients** policy setting.
331-
1. Select **Enabled**.
332-
1. Under **Options**, select **Show...**. This selection opens the Show Contents dialog box.
330+
1. Edit the **Administrative Templates\System\Kerberos\Specify KDC proxy servers for Kerberos clients** policy setting.
331+
1. Select **Enabled**.
332+
1. Under **Options**, select **Show...**. This selection opens the Show Contents dialog box.
333333

334-
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png" alt-text="Screenshot of dialog box to enable 'Specify KDC proxy servers for Kerberos clients'. The 'Show Contents' dialog allows input of a value name and the related value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png":::
334+
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png" alt-text="Screenshot of dialog box to enable 'Specify KDC proxy servers for Kerberos clients'. The 'Show Contents' dialog allows input of a value name and the related value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png":::
335335

336-
1. Define the KDC proxy servers settings using mappings as follows. Substitute your Entra tenant ID for the `your_Azure_AD_tenant_id` placeholder. Note the space following `https` and before the closing `/` in the value mapping.
336+
1. Define the KDC proxy servers settings using mappings as follows. Substitute your Entra tenant ID for the `your_Entra_ID_tenant_id` placeholder. Note the space following `https` and before the closing `/` in the value mapping.
337337

338-
| Value name | Value |
339-
| --- | --- |
340-
| KERBEROS.MICROSOFTONLINE.COM | <https login.microsoftonline.com:443:`your_Azure_AD_tenant_id`/kerberos /> |
338+
| Value name | Value |
339+
| --- | --- |
340+
| KERBEROS.MICROSOFTONLINE.COM | <https login.microsoftonline.com:443:`your_Entra_ID_tenant_id`/kerberos /> |
341341

342-
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png" alt-text="Screenshot of the 'Define KDC proxy server settings' dialog box. A table allows input of multiple rows. Each row consists of a value name and a value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png":::
342+
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png" alt-text="Screenshot of the 'Define KDC proxy server settings' dialog box. A table allows input of multiple rows. Each row consists of a value name and a value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png":::
343343

344-
1. Select **OK** to close the 'Show Contents' dialog box.
345-
1. Select **Apply** on the 'Specify KDC proxy servers for Kerberos clients' dialog box.
344+
1. Select **OK** to close the 'Show Contents' dialog box.
345+
1. Select **Apply** on the 'Specify KDC proxy servers for Kerberos clients' dialog box.
346346

347347
## Rotate the Kerberos key
348348

0 commit comments

Comments
 (0)