You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-auth-hybrid-cloud-trust.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,13 +77,13 @@ To enable Microsoft Entra Kerberos authentication by using the [Azure portal](ht
77
77
78
78
# [Azure PowerShell](#tab/azure-powershell)
79
79
80
-
To enable Microsoft Entra Kerberos by using Azure PowerShell, run the following command. Remember to replace placeholder values, including brackets, with your values.
80
+
To enable Microsoft Entra Kerberos by using Azure PowerShell, run the following command. Replace the placeholder values, including brackets, with your values.
**Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, you also need to specify the domain name and domain GUID for your Active Directory. If you'd prefer to configure directory and file-level permissions by using icacls, you can skip this step. However, if you want to use icacls, the client needs line-of-sight to the Active Directory.
86
+
**Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, you also need to specify the domain name and domain GUID for your Active Directory. If you'd prefer to configure directory and file-level permissions by using icacls, you can skip this step. However, if you want to use icacls, the client needs line-of-sight to the on-premises Active Directory.
87
87
88
88
You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlets from an on-premises Active Directory-joined client:
89
89
@@ -325,24 +325,24 @@ Identify your [Microsoft Entra tenant ID](/azure/active-directory/fundamentals/h
325
325
326
326
Set this Group Policy on the clients to "Enabled": `Administrative Templates\System\Kerberos\Specify KDC proxy servers for Kerberos clients`
327
327
328
-
1.Deploy the following Group Policy setting to client machines by using the incoming trust-based flow:
328
+
Deploy the Group Policy setting to client machines by using the incoming trust-based flow:
329
329
330
-
1. Edit the **Administrative Templates\System\Kerberos\Specify KDC proxy servers for Kerberos clients** policy setting.
331
-
1. Select **Enabled**.
332
-
1. Under **Options**, select **Show...**. This selection opens the Show Contents dialog box.
330
+
1. Edit the **Administrative Templates\System\Kerberos\Specify KDC proxy servers for Kerberos clients** policy setting.
331
+
1. Select **Enabled**.
332
+
1. Under **Options**, select **Show...**. This selection opens the Show Contents dialog box.
333
333
334
-
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png" alt-text="Screenshot of dialog box to enable 'Specify KDC proxy servers for Kerberos clients'. The 'Show Contents' dialog allows input of a value name and the related value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png":::
334
+
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png" alt-text="Screenshot of dialog box to enable 'Specify KDC proxy servers for Kerberos clients'. The 'Show Contents' dialog allows input of a value name and the related value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy.png":::
335
335
336
-
1. Define the KDC proxy servers settings using mappings as follows. Substitute your Entra tenant ID for the `your_Azure_AD_tenant_id` placeholder. Note the space following `https` and before the closing `/` in the value mapping.
336
+
1. Define the KDC proxy servers settings using mappings as follows. Substitute your Entra tenant ID for the `your_Entra_ID_tenant_id` placeholder. Note the space following `https` and before the closing `/` in the value mapping.
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png" alt-text="Screenshot of the 'Define KDC proxy server settings' dialog box. A table allows input of multiple rows. Each row consists of a value name and a value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png":::
342
+
:::image type="content" source="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png" alt-text="Screenshot of the 'Define KDC proxy server settings' dialog box. A table allows input of multiple rows. Each row consists of a value name and a value." lightbox="media/storage-files-identity-auth-hybrid-cloud-trust/configure-policy-kdc-proxy-server-settings-detail.png":::
343
343
344
-
1. Select **OK** to close the 'Show Contents' dialog box.
345
-
1. Select **Apply** on the 'Specify KDC proxy servers for Kerberos clients' dialog box.
344
+
1. Select **OK** to close the 'Show Contents' dialog box.
345
+
1. Select **Apply** on the 'Specify KDC proxy servers for Kerberos clients' dialog box.
0 commit comments