You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/change-sku.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: duongau
6
6
ms.service: azure-firewall
7
7
ms.topic: how-to
8
-
ms.date: 09/29/2025
8
+
ms.date: 02/21/2026
9
9
ms.author: duau
10
10
ms.custom:
11
11
- devx-track-azurepowershell
@@ -33,7 +33,7 @@ Before you begin, make sure you have:
33
33
- A planned maintenance window (for manual migration method)
34
34
35
35
> [!IMPORTANT]
36
-
> This article applies to Azure Firewall Standard and Premium SKUs only. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support SKU changes and must be migrated to Standard SKU first before any upgrade to Premium. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
36
+
> This article applies primarily to Azure Firewall Standard and Premium SKUs. [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) doesn't support direct change to Premium SKU and must be migrated to Standard SKU first before any upgrade to Premium. Downgrading from Azure Firewall Premium or Standard to Basic is supported only through PowerShell or Terraform. Always perform SKU change operations during scheduled maintenance times and test the process thoroughly in a nonproduction environment first.
37
37
38
38
## Easy SKU change method (recommended)
39
39
@@ -46,7 +46,7 @@ Use the easy SKU change method when:
46
46
- Your firewall is deployed in a supported region
47
47
- You want to minimize downtime (zero downtime with this method)
48
48
- You have a standard deployment without complex custom configurations
49
-
-**For downgrade**: Your Premium policy doesn't use Premium-exclusive features that are incompatible with Standard
49
+
-**For downgrade**: A firewall policy created for a higher SKU (Premium or Standard) can't be attached to a lower SKU firewall. To downgrade, you must create a new firewall policy or use an existing policy that is compatible with the target SKU.
50
50
51
51
### Policy considerations for SKU changes
52
52
@@ -74,7 +74,6 @@ When downgrading from Premium to Standard, consider the following policy require
74
74
**Policy handling options:**
75
75
-**Use existing Standard policy**: Select a preexisting Standard policy that doesn't contain Premium features
76
76
-**Create new Standard policy**: The system can create a new Standard policy, automatically removing Premium-specific features
77
-
-**Modify current policy**: Manually remove Premium features from your current policy before downgrade
78
77
79
78
### Change SKU using the Azure portal
80
79
@@ -88,7 +87,7 @@ To change your firewall SKU using the Azure portal:
88
87
1. In the SKU change dialog box, select **Premium** as the target SKU.
89
88
1. Choose your policy option:
90
89
- Select an existing Premium policy, or
91
-
-Allow the system to upgrade your current Standard policy to Premium
90
+
-Create a new Premium policy and select it.
92
91
1. Select **Save** to begin the upgrade.
93
92
94
93
#### Downgrade to Standard
@@ -110,22 +109,22 @@ The SKU change process typically completes within a few minutes with zero downti
110
109
### PowerShell and Terraform SKU change
111
110
112
111
You can also perform SKU changes using:
113
-
-**PowerShell**: Change the `sku_tier` property to "Premium"or "Standard"
112
+
-**PowerShell**: Change the `sku_tier` property to "Premium", "Standard" or "Basic"
114
113
-**Terraform**: Update the `sku_tier` attribute in your configuration to the desired SKU
115
114
116
115
### Limitations
117
116
118
117
The easy SKU change method has the following limitations:
119
118
120
119
**General limitations:**
121
-
- Doesn't support [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
120
+
- Doesn't support direct upgrades from [Azure Firewall Basic SKU](overview.md#azure-firewall-basic) - Basic SKU users must migrate to Standard first
122
121
- Not available for firewalls with certain complex configurations
123
122
- Limited availability in some regions
124
123
- Requires existing firewall policy (not available for Classic rules)
125
124
126
125
**Downgrade-specific limitations:**
127
126
- Premium features (TLS inspection, IDPS Alert and Deny mode, URL filtering, web categories) must be removed before downgrade
128
-
-If your Premium policy contains incompatible features, you must modify the policy or create a new Standard policy
127
+
-For the new Firewall SKU, you mustuse an existing compatible policy or create a new Standard policy
129
128
- Some rule configurations might need manual adjustment after downgrade
130
129
131
130
If the easy SKU change method isn't available for your scenario, use the manual migration method described in the next section.
@@ -426,7 +425,6 @@ If you're unable to downgrade from Premium to Standard:
426
425
427
426
2.**Policy modification options**:
428
427
- Create a new Standard policy without Premium features
429
-
- Modify your existing policy to remove Premium features
430
428
- Use Azure PowerShell to identify and remove incompatible rules
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-ad-ds-update-password.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,27 +4,28 @@ description: Learn how to update the password of the Active Directory Domain Ser
4
4
author: khdownie
5
5
ms.service: azure-file-storage
6
6
ms.topic: how-to
7
-
ms.date: 11/26/2025
7
+
ms.date: 02/25/2026
8
8
ms.author: kendownie
9
9
# Customer intent: As a storage administrator, I want to update the password of the Active Directory Domain Services identity that represents my storage account, so that I can maintain Kerberos authentication and ensure uninterrupted access to Azure file shares.
10
10
---
11
11
12
-
# Update the password of your storage account identity in AD DS
12
+
# Update the password for your storage account identity in AD DS
When you domain join your storage account in your Active Directory Domain Services (AD DS), you create an AD principal, either a computer account or service account, with a password. The password of the AD principal is one of the Kerberos keys of the storage account. Depending on the password policy of the organization unit of the AD principal, you must periodically rotate the password of the AD principal to avoid authentication issues. Failing to change the password before it expires could result in losing Kerberos authentication to your Azure file shares. Some AD environments may also delete AD principals with expired passwords using an automated cleanup script.
16
+
When you domain join your storage account in your Active Directory Domain Services (AD DS), you create an AD principal, either a computer account or service account, with a password. The password for the AD principal is one of the Kerberos keys for the storage account. Depending on the password policy of the organizational unit for the AD principal, you must periodically rotate the password to avoid authentication problems. If you don't change the password before it expires, you lose Kerberos authentication to your Azure file shares. Some AD environments also delete AD principals with expired passwords by using an automated cleanup script.
17
17
18
18
Instead of periodically rotating the password, you can also place the AD principal that represents the storage account into an organizational unit that doesn't require password rotation.
19
19
20
-
There are two options for triggering password rotation. You can use the `AzFilesHybrid` module or Active Directory PowerShell. Use one method, not both.
20
+
Two options exist for triggering password rotation. You can use the `AzFilesHybrid` module or Active Directory PowerShell. Use one method, not both.
21
21
22
22
## Option 1: Use AzFilesHybrid module
23
-
To regenerate and rotate the password of the AD principal that represents the storage account, use the `Update-AzStorageAccountADObjectPassword` cmdlet from the [AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases). To execute `Update-AzStorageAccountADObjectPassword`, you must:
23
+
24
+
To regenerate and rotate the password for the AD principal that represents the storage account, use the `Update-AzStorageAccountADObjectPassword` cmdlet from the [AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases). To run `Update-AzStorageAccountADObjectPassword`, you must:
24
25
25
26
- Run the cmdlet from a domain-joined client.
26
-
- Have the owner permission on the storage account.
27
-
- Have AD DS permissions to change the password of the AD principal that represents the storage account.
27
+
- Have the owner permission on the storage account.
28
+
- Have AD DS permissions to change the password for the AD principal that represents the storage account.
28
29
29
30
```PowerShell
30
31
# Update the password of the AD DS account registered for the storage account
After you rotate to kerb2, we recommend waiting several hours and using `Update-AzStorageAccountADObjectPassword` cmdlet again regenerate and rotate back to kerb1, such that both Kerberos keys are regenerated.
39
+
After you rotate to kerb2, wait several hours and use the `Update-AzStorageAccountADObjectPassword` cmdlet again to regenerate and rotate back to kerb1, so both Kerberos keys are regenerated.
39
40
40
41
## Option 2: Use Active Directory PowerShell
41
42
42
43
If you don't want to download the `AzFilesHybrid` module, you can use [Active Directory PowerShell](/powershell/module/activedirectory).
43
44
44
45
> [!IMPORTANT]
45
-
> The Windows Server Active Directory PowerShell cmdlets in this section must be run in Windows PowerShell 5.1 with elevated privileges.
46
+
> You must run the Windows Server Active Directory PowerShell cmdlets in this section in PowerShell 5.1 with elevated privileges.
46
47
47
48
Replace `<domain-object-identity>` in the following script with the appropriate value for your environment:
Copy file name to clipboardExpand all lines: articles/synapse-analytics/cicd/continuous-integration-delivery.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -253,6 +253,11 @@ You can choose the operation types based on the use case. Following part is an e
253
253
> In CI/CD scenarios, the integration runtime type in different environments must be the same. For example, if you have a self-hosted integration runtime in the development environment, the same integration runtime must be self-hosted in other environments, such as in test and production. Similarly, if you're sharing integration runtimes across multiple stages, the integration runtimes must be linked and self-hosted in all environments, such as in development, test, and production.
254
254
>
255
255
> Currently, the DevOps Service Connection with **Workload Identity Federation (WIF)** is not supported in Synapse Workspace deployment extension. Switch to secret mode to make the connection successful.
256
+
>
257
+
> For secure, secretless alternatives that fully support Workload Identity Federation (WIF), use the [AzureCLI@2](/azure/devops/pipelines/tasks/reference/azure-cli-v2) or [PowerShell](/azure/devops/pipelines/tasks/reference/powershell-v2)
258
+
> pipeline tasks with a federated service connection, as described in [Connect to Azure using Workload Identity Federation](https://learn.microsoft.com/azure/devops/pipelines/library/connect-to-azure?view=azure-devops).
259
+
>
260
+
> These tasks support secretless authentication and can execute Synapse deployment commands (`az synapse pipeline create`, `az synapse artifact publish`) while maintaining the same deployment flow.
0 commit comments