Skip to content

Commit aaa0958

Browse files
committed
fix numbering
1 parent a9c052f commit aaa0958

1 file changed

Lines changed: 40 additions & 36 deletions

File tree

articles/storage/files/storage-files-identity-multiple-forests.md

Lines changed: 40 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ First, add a new custom suffix on **Forest 2**. Make sure you have the appropria
180180
1. Open the **Active Directory Domains and Trusts** console.
181181
1. Right-click on **Active Directory Domains and Trusts**.
182182
1. Select **Properties**, and then select **Add**.
183-
1. Add "file.core.windows.net" as the UPN Suffix.
183+
1. Add "file.core.windows.net" as the UPN suffix.
184184
1. Select **Apply**, then **OK** to close the wizard.
185185

186186
Next, add the suffix routing rule on **Forest 1**, so that it redirects to **Forest 2**.
@@ -197,53 +197,57 @@ Next, add the suffix routing rule on **Forest 1**, so that it redirects to **For
197197
Validate that the trust is working by running the **klist** command to display the contents of the Kerberos credentials cache and key table.
198198

199199
1. Sign in to a machine or VM that's joined to a domain in **Forest 1** and open a Windows command prompt.
200+
200201
1. To display the credentials cache for the domain-joined storage account in **Forest 2**, run one of the following commands:
201202
- If you used the [Modify storage account SPN suffix and add CNAME record](#modify-storage-account-spn-suffix-and-add-cname-record) method, run: `klist get cifs/onprem2sa.onpremad2.com`
202203
- If you used the [Add custom name suffix and routing rule](#add-custom-name-suffix-and-routing-rule) method, run: `klist get cifs/onprem2sa.file.core.windows.net`
204+
203205
1. You should see output similar to the following. The klist output differs slightly based on which method you used to configure domain suffixes.
204206

205-
```
206-
Client: onprem1user @ ONPREMAD1.COM
207-
Server: cifs/onprem2sa.file.core.windows.net @ ONPREMAD2.COM
208-
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
209-
Ticket Flags 0x40a10000 -> forwardable renewable pre_authent name_canonicalize
210-
Start Time: 11/22/2022 18:45:02 (local)
211-
End Time: 11/23/2022 4:45:02 (local)
212-
Renew Time: 11/29/2022 18:45:02 (local)
213-
Session Key Type: AES-256-CTS-HMAC-SHA1-96
214-
Cache Flags: 0x200 -> DISABLE-TGT-DELEGATION
215-
Kdc Called: onprem2.onpremad2.com
216-
```
207+
```
208+
Client: onprem1user @ ONPREMAD1.COM
209+
Server: cifs/onprem2sa.file.core.windows.net @ ONPREMAD2.COM
210+
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
211+
Ticket Flags 0x40a10000 -> forwardable renewable pre_authent name_canonicalize
212+
Start Time: 11/22/2022 18:45:02 (local)
213+
End Time: 11/23/2022 4:45:02 (local)
214+
Renew Time: 11/29/2022 18:45:02 (local)
215+
Session Key Type: AES-256-CTS-HMAC-SHA1-96
216+
Cache Flags: 0x200 -> DISABLE-TGT-DELEGATION
217+
Kdc Called: onprem2.onpremad2.com
218+
```
217219

218220
1. Sign in to a machine or VM that's joined to a domain in **Forest 2** and open a Windows command prompt.
221+
219222
1. To display the credentials cache for the domain-joined storage account in **Forest 1**, run one of the following commands:
220223
- If you used the [Modify storage account SPN suffix and add CNAME record](#modify-storage-account-spn-suffix-and-add-cname-record) method, run: `klist get cifs/onprem1sa.onpremad1.com`
221224
- If you used the [Add custom name suffix and routing rule](#add-custom-name-suffix-and-routing-rule) method, run: `klist get cifs/onprem1sa.file.core.windows.net`
225+
222226
1. You should see output similar to the following. The klist output differs slightly based on which method you used to configure domain suffixes.
223227

224-
```
225-
Client: onprem2user @ ONPREMAD2.COM
226-
Server: krbtgt/ONPREMAD2.COM @ ONPREMAD2.COM
227-
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
228-
Ticket Flags 0x40e10000 -> forwardable renewable pre_authent name_canonicalize
229-
Start Time: 11/22/2022 18:46:35 (local)
230-
End Time: 11/23/2022 4:46:35 (local)
231-
Renew Time: 11/29/2022 18:46:35 (local)
232-
Session Key Type: AES-256-CTS-HMAC-SHA1-96
233-
Cache Flags: 0x1 -> PRIMARY
234-
Kdc Called: onprem2
235-
236-
Client: onprem2user @ ONPREMAD2.COM
237-
Server: cifs/onprem1sa.file.core.windows.net @ ONPREMAD1.COM
238-
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
239-
Ticket Flags 0x40a10000 -> forwardable renewable pre_authent name_canonicalize
240-
Start Time: 11/22/2022 18:46:35 (local)
241-
End Time: 11/23/2022 4:46:35 (local)
242-
Renew Time: 11/29/2022 18:46:35 (local)
243-
Session Key Type: AES-256-CTS-HMAC-SHA1-96
244-
Cache Flags: 0x200 -> DISABLE-TGT-DELEGATION
245-
Kdc Called: onpremad1.onpremad1.com
246-
```
228+
```
229+
Client: onprem2user @ ONPREMAD2.COM
230+
Server: krbtgt/ONPREMAD2.COM @ ONPREMAD2.COM
231+
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
232+
Ticket Flags 0x40e10000 -> forwardable renewable pre_authent name_canonicalize
233+
Start Time: 11/22/2022 18:46:35 (local)
234+
End Time: 11/23/2022 4:46:35 (local)
235+
Renew Time: 11/29/2022 18:46:35 (local)
236+
Session Key Type: AES-256-CTS-HMAC-SHA1-96
237+
Cache Flags: 0x1 -> PRIMARY
238+
Kdc Called: onprem2
239+
240+
Client: onprem2user @ ONPREMAD2.COM
241+
Server: cifs/onprem1sa.file.core.windows.net @ ONPREMAD1.COM
242+
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
243+
Ticket Flags 0x40a10000 -> forwardable renewable pre_authent name_canonicalize
244+
Start Time: 11/22/2022 18:46:35 (local)
245+
End Time: 11/23/2022 4:46:35 (local)
246+
Renew Time: 11/29/2022 18:46:35 (local)
247+
Session Key Type: AES-256-CTS-HMAC-SHA1-96
248+
Cache Flags: 0x200 -> DISABLE-TGT-DELEGATION
249+
Kdc Called: onpremad1.onpremad1.com
250+
```
247251

248252
If you see the preceding output, you're done. If you don't, follow these steps to provide alternative UPN suffixes to make multi-forest authentication work.
249253

0 commit comments

Comments
 (0)