|
1 | 1 | --- |
2 | 2 | title: Configure cloud trust between AD DS and Microsoft Entra ID |
3 | | -description: Learn how to enable Microsoft Entra Kerberos authentication for hybrid user identities over Server Message Block (SMB) for Azure Files and establish a cloud trust between on-premises Active Directory Domain Services (AD DS) and Microsoft Entra ID. Your users can then access Azure file shares by using their on-premises credentials. |
| 3 | +description: Learn how to enable Microsoft Entra Kerberos authentication over SMB for Azure Files and establish a cloud trust between on-premises Active Directory Domain Services (AD DS) and Microsoft Entra ID. Your users can then access Azure file shares by using their on-premises credentials. |
4 | 4 | author: khdownie |
5 | 5 | ms.service: azure-file-storage |
6 | 6 | ms.topic: how-to |
7 | | -ms.date: 01/24/2025 |
| 7 | +ms.date: 10/08/2025 |
8 | 8 | ms.author: kendownie |
9 | 9 | recommendations: false |
10 | 10 | ms.custom: sfi-ga-nochange |
@@ -75,14 +75,14 @@ To enable Microsoft Entra Kerberos authentication using the [Azure portal](https |
75 | 75 |
|
76 | 76 | 1. Sign in to the Azure portal and select the storage account you want to enable Microsoft Entra Kerberos authentication for. |
77 | 77 | 1. Under **Data storage**, select **File shares**. |
78 | | -1. Next to **Active Directory**, select the configuration status (for example, **Not configured**). |
| 78 | +1. Next to **Identity-based access**, select the configuration status (for example, **Not configured**). |
79 | 79 |
|
80 | | - :::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/configure-active-directory.png" alt-text="Screenshot of the Azure portal showing file share settings for a storage account. Active Directory configuration settings are selected." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/configure-active-directory.png" border="true"::: |
| 80 | + :::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/configure-identity-based-access.png" alt-text="Screenshot of the Azure portal showing file share settings for a storage account." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/configure-identity-based-access.png" border="true"::: |
81 | 81 |
|
82 | 82 | 1. Under **Microsoft Entra Kerberos**, select **Set up**. |
83 | 83 | 1. Select the **Microsoft Entra Kerberos** checkbox. |
84 | 84 |
|
85 | | - :::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/enable-azure-ad-kerberos.png" alt-text="Screenshot of the Azure portal showing Active Directory configuration settings for a storage account. Microsoft Entra Kerberos is selected." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/enable-azure-ad-kerberos.png" border="true"::: |
| 85 | + :::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/enable-entra-kerberos.png" alt-text="Screenshot of the Azure portal showing identity-based access configuration settings for a storage account. Microsoft Entra Kerberos is selected." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/enable-entra-kerberos.png" border="true"::: |
86 | 86 |
|
87 | 87 | 1. **Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, then you must specify the domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlet from an on-premises AD-joined client: `Get-ADDomain`. Your domain name should be listed in the output under `DNSRoot` and your domain GUID should be listed under `ObjectGUID`. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need unimpeded network connectivity to the on-premises AD. |
88 | 88 |
|
|
0 commit comments