Skip to content

Commit 7484ac2

Browse files
Merge pull request #312510 from khdownie/kendownie030226-3
fix entra connect links
2 parents 25fb2f3 + 10eead6 commit 7484ac2

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

articles/storage/files/storage-files-identity-ad-ds-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ If you're new to Azure Files, read the [planning guide](storage-files-planning.m
2323

2424
- To use identity-based authentication with Azure Files, you must assign share-level RBAC permissions. You can do this in two ways:
2525
- **[Default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities):** This option applies RBAC at the share level for all authenticated users. With this configuration, you don't need to sync your on-premises AD DS identities to Microsoft Entra ID.
26-
- **[Granular share-level permissions](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-specific-entra-users-or-groups):** If you want to assign RBAC at the share level to specific users or groups, you must synchronize the corresponding identities from your on-premises AD DS to Entra ID by using [Microsoft Entra Connect](/entra/identity/hybrid/connect/whatis-azure-ad-connect) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync). Groups created only in Entra ID won't work unless they contain synced user accounts. Password hash synchronization isn't required.
26+
- **[Granular share-level permissions](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-specific-entra-users-or-groups):** If you want to assign RBAC at the share level to specific users or groups, you must synchronize the corresponding identities from your on-premises AD DS to Entra ID by using [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync). Groups created only in Entra ID won't work unless they contain synced user accounts. Password hash synchronization isn't required.
2727
- Client OS requirements: Windows 8 / Windows Server 2012 or later, or Linux VMs such as Ubuntu 18.04+ and equivalent RHEL/SLES distributions.
2828
- Kerberos authentication is available with Active Directory by using [AES 256 encryption](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended). AES 128 Kerberos encryption isn't yet supported.
2929
- Single sign-on (SSO) is supported.
@@ -42,19 +42,19 @@ To help you set up identity-based authentication for common use cases, we publis
4242

4343
## Prerequisites
4444

45-
Before you enable AD DS authentication for Azure file shares, make sure you complete the following prerequisites:
45+
Before you enable AD DS authentication for Azure file shares, complete the following prerequisites:
4646

47-
- Select or create your [AD DS environment](/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview) and [sync it to Microsoft Entra ID](../../active-directory/hybrid/how-to-connect-install-roadmap.md) by using either the on-premises [Microsoft Entra Connect Sync](../../active-directory/hybrid/whatis-azure-ad-connect.md) application or [Microsoft Entra Connect cloud sync](../../active-directory/cloud-sync/what-is-cloud-sync.md), a lightweight agent that you can install from the Microsoft Entra Admin Center.
47+
- Select or create your [AD DS environment](/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview) and [sync it to Microsoft Entra ID](../../active-directory/hybrid/how-to-connect-install-roadmap.md) by using either the on-premises [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) application or [Microsoft Entra Cloud sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync), a lightweight agent that you can install from the Microsoft Entra Admin Center.
4848

49-
You can enable the feature on a new or existing on-premises AD DS environment. Identities used for access must be synced to Microsoft Entra ID or use a default share-level permission. The Microsoft Entra tenant and the file share that you're accessing must be associated with the same subscription.
49+
You can enable the feature on a new or existing on-premises AD DS environment. Identities used for access must be synced to Microsoft Entra ID or use a default share-level permission. The Microsoft Entra tenant that contains the synced identities must be the same tenant that manages the subscription containing the storage account and file share.
5050

51-
- Domain-join an on-premises machine or an Azure VM to on-premises AD DS. See [Join a Computer to a Domain](/windows-server/identity/ad-fs/deployment/join-a-computer-to-a-domain).
51+
- Domain-join an on-premises machine or an Azure VM to on-premises AD DS. See [Join a computer to a domain](/windows-server/identity/ad-fs/deployment/join-a-computer-to-a-domain).
5252

5353
If a machine isn't domain joined, you can still use AD DS for authentication if the machine has unimpeded network connectivity to the on-premises AD domain controller and the user provides explicit credentials. For more information, see [Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain](storage-files-identity-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm-or-a-vm-joined-to-a-different-ad-domain).
5454

5555
- Select or create an Azure storage account. For optimal performance, deploy the storage account in the same region as the client from which you plan to access the share.
5656

57-
Make sure that the storage account containing your file shares isn't already configured for identity-based authentication. If an identity source is already enabled on the storage account, you must disable it before enabling on-premises AD DS.
57+
Make sure that the storage account containing your file shares isn't already configured for identity-based authentication. If another identity source is already enabled on the storage account, you must disable it before enabling on-premises AD DS as the identity source.
5858

5959
If you experience issues in connecting to Azure Files, see [troubleshoot Azure Files mounting errors on Windows](https://azure.microsoft.com/blog/new-troubleshooting-diagnostics-for-azure-files-mounting-errors-on-windows/).
6060

@@ -64,9 +64,9 @@ Before you enable AD DS authentication for Azure file shares, make sure you comp
6464

6565
You can use Azure Files authentication with AD DS in [all Azure Public, China, and Gov regions](https://azure.microsoft.com/global-infrastructure/locations/).
6666

67-
## Overview
67+
## How it works
6868

69-
When you enable AD DS authentication for your Azure file shares, you can use your on-premises AD DS credentials to authenticate to your Azure file shares. You can also manage your permissions to allow granular access control. To set up authentication, sync identities from on-premises AD DS to Microsoft Entra ID by using either the on-premises [Microsoft Entra Connect Sync](../../active-directory/hybrid/whatis-azure-ad-connect.md) application or [Microsoft Entra Connect cloud sync](../../active-directory/cloud-sync/what-is-cloud-sync.md), a lightweight agent that you can install from the Microsoft Entra Admin Center. Assign share-level permissions to hybrid identities synced to Microsoft Entra ID, and manage file and directory-level access using Windows ACLs.
69+
When you enable AD DS authentication for your Azure file shares, you can use your on-premises AD DS credentials to authenticate to your Azure file shares. You can also manage your permissions to allow granular access control. To set up authentication, sync identities from on-premises AD DS to Microsoft Entra ID by using either the on-premises [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) application or [Microsoft Entra Cloud sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync), a lightweight agent that you can install from the Microsoft Entra Admin Center. Assign share-level permissions to hybrid identities synced to Microsoft Entra ID, and manage file and directory-level access using Windows ACLs.
7070

7171
Follow these steps to set up Azure Files for AD DS authentication:
7272

0 commit comments

Comments
 (0)