Skip to content

Commit bb9e25c

Browse files
committed
Files Entra Kerberos legacy clients auth integrity check
1 parent 5abda6a commit bb9e25c

1 file changed

Lines changed: 17 additions & 17 deletions

File tree

articles/storage/files/storage-files-identity-auth-hybrid-cloud-trust.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Learn how to enable Microsoft Entra Kerberos authentication over SM
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 02/25/2026
7+
ms.date: 03/04/2026
88
ms.author: kendownie
99
ms.custom: sfi-ga-nochange
10-
# Customer intent: As an IT administrator, I want to configure a cloud trust between on-premises Active Directory and Microsoft Entra ID, so that users can access Azure file shares using their existing credentials in a hybrid environment.
10+
# Customer intent: As an IT administrator, I want to configure a cloud trust between on-premises Active Directory and Microsoft Entra ID, so that users can access SMB Azure file shares using their existing credentials in a hybrid environment.
1111
---
1212

1313
# Configure a cloud trust between on-premises AD DS and Microsoft Entra ID for accessing Azure Files
@@ -18,7 +18,7 @@ Many organizations want to use identity-based authentication for SMB Azure file
1818

1919
In such scenarios, you can enable Microsoft Entra Kerberos authentication for hybrid user identities and then establish a cloud trust between your on-premises AD DS and Entra ID to access SMB file shares by using your on-premises credentials. This article explains how a cloud trust works, and provides instructions for setup and validation. It also includes steps to rotate a Kerberos key for your service account in Entra ID and Trusted Domain Object, and steps to remove a Trusted Domain Object and all Kerberos settings, if desired.
2020

21-
This article focuses on authenticating [hybrid user identities](../../active-directory/hybrid/whatis-hybrid-identity.md), which are on-premises AD DS identities that are synced to Microsoft Entra ID using either [Microsoft Entra Connect](../../active-directory/hybrid/whatis-azure-ad-connect.md) or [Microsoft Entra Connect cloud sync](../../active-directory/cloud-sync/what-is-cloud-sync.md).
21+
This article focuses on authenticating [hybrid user identities](/entra/identity/hybrid/whatis-hybrid-identity), which are on-premises AD DS identities that are synced to Microsoft Entra ID by using either [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync).
2222

2323
## Scenarios
2424

@@ -44,11 +44,11 @@ Before implementing the incoming trust-based authentication flow, make sure that
4444
| **Prerequisite** | **Description** |
4545
| --- | --- |
4646
| Client must run Windows 10, Windows Server 2012, or a higher version of Windows. | |
47-
| Clients must be joined to Active Directory (AD). The domain must have a functional level of Windows Server 2012 or higher. | You can determine if the client is joined to Active Directory by running the [dsregcmd command](/azure/active-directory/devices/troubleshoot-device-dsregcmd): `dsregcmd.exe /status` |
47+
| Clients must be joined to Active Directory (AD). The domain must have a functional level of Windows Server 2012 or higher. | You can determine if the client is joined to Active Directory by running the [dsregcmd command](/entra/identity/devices/troubleshoot-device-dsregcmd): `dsregcmd.exe /status` |
4848
| A Microsoft Entra tenant. | A Microsoft Entra Tenant is an identity security boundary that's under the control of your organization's IT department. It's an instance of Microsoft Entra ID in which information about a single organization resides. |
4949
| An Azure subscription under the same Entra tenant you plan to use for authentication. | |
5050
| An Azure storage account in the Azure subscription. | An Azure storage account is a resource that acts as a container for grouping all the data services from Azure Storage, including files. |
51-
| [Microsoft Entra Connect](/azure/active-directory/hybrid/whatis-azure-ad-connect) or [Microsoft Entra Connect cloud sync](../../active-directory/cloud-sync/what-is-cloud-sync.md) must be installed. | These solutions are used in [hybrid environments](../../active-directory/hybrid/whatis-hybrid-identity.md) where identities exist both in Microsoft Entra ID and on-premises AD DS. |
51+
| [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync) must be installed. | These solutions are used in [hybrid environments](/entra/identity/hybrid/whatis-hybrid-identity) where identities exist both in Microsoft Entra ID and on-premises AD DS. |
5252

5353
## Enable Microsoft Entra Kerberos authentication
5454

@@ -158,8 +158,8 @@ Remember to replace `<your-storage-account-name>` with the proper value.
158158
159159
For guidance on disabling MFA, see the following articles:
160160

161-
- [Add exclusions for service principals of Azure resources](../../active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md#user-exclusions)
162-
- [Create a conditional access policy](../../active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md#create-a-conditional-access-policy)
161+
- [Add exclusions for service principals of Azure resources](/entra/identity/conditional-access/policy-all-users-mfa-strength#user-exclusions)
162+
- [Create a conditional access policy](/entra/identity/conditional-access/policy-all-users-mfa-strength#create-a-conditional-access-policy)
163163

164164
### Assign share-level permissions
165165

@@ -235,7 +235,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
235235
Run the following command to check your domain's current Kerberos settings:
236236

237237
```powershell
238-
Get-AzureAdKerberosServer -Domain $domain `
238+
Get-AzureADKerberosServer -Domain $domain `
239239
-DomainCredential $domainCred `
240240
-UserPrincipalName $cloudUserName
241241
```
@@ -245,7 +245,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
245245
- Enter the password for your Entra ID Global Administrator account.
246246
- If your organization uses other modern authentication methods such as Entra multifactor authentication or Smart Card, follow the instructions as requested for sign in.
247247

248-
If this is the first time you're configuring Microsoft Entra Kerberos settings, the [Get-AzureAdKerberosServer cmdlet](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises#view-and-verify-the-azure-ad-kerberos-server) displays empty information, as in the following sample output:
248+
If this is the first time you're configuring Microsoft Entra Kerberos settings, the [Get-AzureADKerberosServer cmdlet](/entra/identity/authentication/howto-authentication-passwordless-security-key-on-premises#view-and-verify-the-azure-ad-kerberos-server) displays empty information, as in the following sample output:
249249

250250
```output
251251
ID :
@@ -264,7 +264,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
264264
CloudTrustDisplay :
265265
```
266266

267-
If your domain already supports FIDO authentication, the `Get-AzureAdKerberosServer` cmdlet displays Entra service account information, as in the following sample output. The `CloudTrustDisplay` field returns an empty value.
267+
If your domain already supports FIDO authentication, the `Get-AzureADKerberosServer` cmdlet displays Entra service account information, as in the following sample output. The `CloudTrustDisplay` field returns an empty value.
268268

269269
```output
270270
ID : XXXXX
@@ -285,7 +285,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
285285

286286
1. Add the Trusted Domain Object.
287287

288-
Run the [Set-AzureAdKerberosServer PowerShell cmdlet](/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises#create-a-kerberos-server-object) to add the Trusted Domain Object. Be sure to include `-SetupCloudTrust` parameter. If there's no Entra service account, this command creates a new Entra service account. This command only creates the requested Trusted Domain object if there's an Entra service account.
288+
Run the [Set-AzureADKerberosServer](/entra/identity/authentication/howto-authentication-passwordless-security-key-on-premises#create-a-kerberos-server-object) PowerShell cmdlet to add the Trusted Domain Object. Be sure to include `-SetupCloudTrust` parameter. If there's no Entra service account, this command creates a new Entra service account. This command only creates the requested Trusted Domain object if there's an Entra service account.
289289

290290
```powershell
291291
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $cloudUserName -DomainCredential $domainCred -SetupCloudTrust
@@ -297,7 +297,7 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
297297
> 1. Run the command on root domain (include `-SetupCloudTrust` parameter).
298298
> 1. Run the same command on the child domain without the `-SetupCloudTrust` parameter.
299299
300-
After creating the Trusted Domain Object, you can check the updated Kerberos Settings by using the `Get-AzureAdKerberosServer` PowerShell cmdlet, as shown in the previous step. If the `Set-AzureAdKerberosServer` cmdlet runs successfully with the `-SetupCloudTrust` parameter, the `CloudTrustDisplay` field returns `Microsoft.AzureAD.Kdc.Service.TrustDisplay`, as shown in the following sample output:
300+
After creating the Trusted Domain Object, you can check the updated Kerberos Settings by using the `Get-AzureADKerberosServer` PowerShell cmdlet, as shown in the previous step. If the `Set-AzureADKerberosServer` cmdlet runs successfully with the `-SetupCloudTrust` parameter, the `CloudTrustDisplay` field returns `Microsoft.AzureAD.Kdc.Service.TrustDisplay`, as shown in the following sample output:
301301

302302
```output
303303
ID : XXXXX
@@ -317,11 +317,11 @@ Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
317317
```
318318

319319
> [!NOTE]
320-
> Azure sovereign clouds require setting the `TopLevelNames` property, which is set to `windows.net` by default. Azure sovereign cloud deployments of Azure SQL Managed Instance use a different top-level domain name, such as `usgovcloudapi.net` for Azure US Government. Set your Trusted Domain Object to that top-level domain name by using the following PowerShell command: `Set-AzureADKerberosServer -Domain $domain -DomainCredential $domainCred -CloudCredential $cloudCred -SetupCloudTrust -TopLevelNames "usgovcloudapi.net,windows.net"`. You can verify the setting by using the following PowerShell command: `Get-AzureAdKerberosServer -Domain $domain -DomainCredential $domainCred -UserPrincipalName $cloudUserName | Select-Object -ExpandProperty CloudTrustDisplay`.
320+
> Azure sovereign clouds require setting the `TopLevelNames` property, which is set to `windows.net` by default. Azure sovereign cloud deployments of Azure SQL Managed Instance use a different top-level domain name, such as `usgovcloudapi.net` for Azure US Government. Set your Trusted Domain Object to that top-level domain name by using the following PowerShell command: `Set-AzureADKerberosServer -Domain $domain -DomainCredential $domainCred -CloudCredential $cloudCred -SetupCloudTrust -TopLevelNames "usgovcloudapi.net,windows.net"`. You can verify the setting by using the following PowerShell command: `Get-AzureADKerberosServer -Domain $domain -DomainCredential $domainCred -UserPrincipalName $cloudUserName | Select-Object -ExpandProperty CloudTrustDisplay`.
321321
322322
## Configure the clients to retrieve Kerberos tickets
323323

324-
Identify your [Microsoft Entra tenant ID](/azure/active-directory/fundamentals/how-to-find-tenant) and use Group Policy to configure the client machines you want to mount or use Azure file shares from. You must do this on every client where you use Azure Files.
324+
Identify your [Microsoft Entra tenant ID](/entra/fundamentals/how-to-find-tenant) and use Group Policy to configure the client machines you want to mount or use Azure file shares from. You must do this on every client where you use Azure Files.
325325

326326
Set this Group Policy on the clients to "Enabled": `Administrative Templates\System\Kerberos\Specify KDC proxy servers for Kerberos clients`
327327

@@ -349,7 +349,7 @@ Deploy the Group Policy setting to client machines by using the incoming trust-b
349349
For management purposes, rotate the Kerberos key periodically for the created Entra service account and Trusted Domain Object.
350350

351351
```powershell
352-
Set-AzureAdKerberosServer -Domain $domain `
352+
Set-AzureADKerberosServer -Domain $domain `
353353
-DomainCredential $domainCred `
354354
-UserPrincipalName $cloudUserName -SetupCloudTrust `
355355
-RotateServerKey
@@ -358,7 +358,7 @@ Set-AzureAdKerberosServer -Domain $domain `
358358
After you rotate the key, it takes several hours to propagate the changed key between the Kerberos KDC servers. Due to this key distribution timing, you can rotate the key once within 24 hours. If you need to rotate the key again within 24 hours for any reason, such as just after creating the Trusted Domain Object, add the `-Force` parameter:
359359

360360
```powershell
361-
Set-AzureAdKerberosServer -Domain $domain `
361+
Set-AzureADKerberosServer -Domain $domain `
362362
-DomainCredential $domainCred `
363363
-UserPrincipalName $cloudUserName -SetupCloudTrust `
364364
-RotateServerKey -Force
@@ -381,7 +381,7 @@ This command removes only the Trusted Domain Object. If your domain supports FID
381381
You can remove both the Entra service account and the Trusted Domain Object by using the following command:
382382

383383
```powershell
384-
Remove-AzureAdKerberosServer -Domain $domain `
384+
Remove-AzureADKerberosServer -Domain $domain `
385385
-DomainCredential $domainCred `
386386
-UserPrincipalName $cloudUserName
387387
```

0 commit comments

Comments
 (0)