Skip to content

Commit c57b112

Browse files
committed
update screen shots for Entra Kerberos
1 parent 16089be commit c57b112

5 files changed

Lines changed: 15 additions & 14 deletions

File tree

83.3 KB
Loading
299 KB
Loading

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Microsoft Entra Kerberos for hybrid identities on Azure Files
3-
description: Learn how to enable identity-based Kerberos authentication for hybrid user identities over Server Message Block (SMB) for Azure Files through Microsoft Entra ID. Your users can then access Azure file shares by using their Microsoft Entra credentials.
2+
title: Microsoft Entra Kerberos Authentication for Azure Files
3+
description: Learn how to enable identity-based Kerberos authentication over Server Message Block (SMB) for Azure Files through Microsoft Entra ID. Your users can then access Azure file shares by using their Microsoft Entra credentials.
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 02/10/2025
7+
ms.date: 10/08/2025
88
ms.author: kendownie
99
recommendations: false
10-
# Customer intent: As a storage administrator, I want to enable Microsoft Entra Kerberos authentication for hybrid user identities on Azure Files, so that users can securely access file shares with their existing credentials without requiring constant connectivity to on-premises domain controllers.
10+
# Customer intent: As a storage administrator, I want to enable Microsoft Entra Kerberos authentication on Azure Files, so that users can securely access file shares with their existing credentials without requiring constant connectivity to on-premises domain controllers.
1111
---
1212

1313
# Enable Microsoft Entra Kerberos authentication for hybrid identities on Azure Files
@@ -19,7 +19,7 @@ This configuration allows hybrid users to access Azure file shares using Kerbero
1919
For more information on supported options and considerations, see [Overview of Azure Files identity-based authentication options for SMB access](storage-files-active-directory-overview.md). For more information, see [this deep dive](https://techcommunity.microsoft.com/t5/itops-talk-blog/deep-dive-how-azure-ad-kerberos-works/ba-p/3070889).
2020

2121
> [!IMPORTANT]
22-
> You can only use one AD method for identity-based authentication with Azure Files. If Microsoft Entra Kerberos authentication for hybrid identities doesn't fit your requirements, you might be able to use [on-premises Active Directory Domain Service (AD DS)](storage-files-identity-ad-ds-overview.md) or [Microsoft Entra Domain Services](storage-files-identity-auth-domain-services-enable.md) instead. The configuration steps and supported scenarios are different for each method.
22+
> You can only enable one identity source on your storage account for identity-based authentication with Azure Files. If Microsoft Entra Kerberos authentication for hybrid identities doesn't fit your requirements, you might be able to use [on-premises Active Directory Domain Service (AD DS)](storage-files-identity-ad-ds-overview.md) or [Microsoft Entra Domain Services](storage-files-identity-auth-domain-services-enable.md) instead. The configuration steps and supported scenarios are different for each method.
2323
2424
## Applies to
2525
| Management model | Billing model | Media tier | Redundancy | SMB | NFS |
@@ -43,7 +43,7 @@ Before you enable Microsoft Entra Kerberos authentication over SMB for Azure fil
4343

4444
The following prerequisites are mandatory. Without these, you can't authenticate using Microsoft Entra ID.
4545

46-
- Your Azure storage account can't authenticate with both Microsoft Entra ID and a second method like AD DS or Microsoft Entra Domain Services. If you've already chosen another AD method for your storage account, you must disable it before enabling Microsoft Entra Kerberos.
46+
- Your Azure storage account can't authenticate with both Microsoft Entra ID and a second method like AD DS or Microsoft Entra Domain Services. If you've already chosen another identity source for your storage account, you must disable it before enabling Microsoft Entra Kerberos.
4747

4848
- This feature doesn't currently support user accounts that you create and manage solely in Microsoft Entra ID. User accounts must be [hybrid user identities](../../active-directory/hybrid/whatis-hybrid-identity.md), which means you'll also need AD DS and either [Microsoft Entra Connect](../../active-directory/hybrid/whatis-azure-ad-connect.md) or [Microsoft Entra Connect cloud sync](../../active-directory/cloud-sync/what-is-cloud-sync.md). You must create these accounts in Active Directory and sync them to Microsoft Entra ID. To assign Azure Role-Based Access Control (RBAC) permissions for the Azure file share to a user group, you must create the group in Active Directory and sync it to Microsoft Entra ID.
4949

@@ -61,11 +61,12 @@ The following prerequisites are mandatory. Without these, you can't authenticate
6161

6262
The following prerequisites are required for the standard Microsoft Entra Kerberos authentication flow as described in this article. If some or all of your client machines don't meet these, you can still enable Microsoft Entra Kerberos authentication for SMB file shares, but you'll also need to [configure a cloud trust](storage-files-identity-auth-hybrid-cloud-trust.md) to allow these clients to access file shares.
6363

64-
Operating system requirements:
64+
Using Microsoft Entra Kerberos authentication requires one of the following operating systems:
6565

6666
- Windows 11 Enterprise/Pro single or multi-session.
6767
- Windows 10 Enterprise/Pro single or multi-session, versions 2004 or later with the latest cumulative updates installed, especially the [KB5007253 - 2021-11 Cumulative Update Preview for Windows 10](https://support.microsoft.com/topic/november-22-2021-kb5007253-os-builds-19041-1387-19042-1387-19043-1387-and-19044-1387-preview-d1847be9-46c1-49fc-bf56-1d469fc1b3af).
68-
- Windows Server, version 2022 with the latest cumulative updates installed, especially the [KB5007254 - 2021-11 Cumulative Update Preview for Microsoft server operating system version 21H2](https://support.microsoft.com/topic/november-22-2021-kb5007254-os-build-20348-380-preview-9a960291-d62e-486a-adcc-6babe5ae6fc1).
68+
- Windows Server 2025 with the latest cumulative updates installed.
69+
- Windows Server 2022 with the latest cumulative updates installed, especially the [KB5007254 - 2021-11 Cumulative Update Preview for Microsoft server operating system version 21H2](https://support.microsoft.com/topic/november-22-2021-kb5007254-os-build-20348-380-preview-9a960291-d62e-486a-adcc-6babe5ae6fc1).
6970

7071
To learn how to create and configure a Windows VM and log in by using Microsoft Entra ID-based authentication, see [Log in to a Windows virtual machine in Azure by using Microsoft Entra ID](../../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md).
7172

@@ -87,14 +88,14 @@ To enable Microsoft Entra Kerberos authentication using the [Azure portal](https
8788

8889
1. Sign in to the Azure portal and select the storage account you want to enable Microsoft Entra Kerberos authentication for.
8990
1. Under **Data storage**, select **File shares**.
90-
1. Next to **Active Directory**, select the configuration status (for example, **Not configured**).
91+
1. Next to **Identity-based access**, select the configuration status (for example, **Not configured**).
9192

92-
:::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/configure-active-directory.png" alt-text="Screenshot of the Azure portal showing file share settings for a storage account. Active Directory configuration settings are selected." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/configure-active-directory.png" border="true":::
93+
:::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/configure-identity-based-access.png" alt-text="Screenshot of the Azure portal showing file share settings for a storage account." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/configure-identity-based-access.png" border="true":::
9394

9495
1. Under **Microsoft Entra Kerberos**, select **Set up**.
9596
1. Select the **Microsoft Entra Kerberos** checkbox.
9697

97-
:::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/enable-azure-ad-kerberos.png" alt-text="Screenshot of the Azure portal showing Active Directory configuration settings for a storage account. Microsoft Entra Kerberos is selected." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/enable-azure-ad-kerberos.png" border="true":::
98+
:::image type="content" source="media/storage-files-identity-auth-hybrid-identities-enable/enable-entra-kerberos.png" alt-text="Screenshot of the Azure portal showing identity-based access configuration settings for a storage account. Microsoft Entra Kerberos is selected." lightbox="media/storage-files-identity-auth-hybrid-identities-enable/enable-entra-kerberos.png" border="true":::
9899

99100
1. **Optional:** If you want to configure directory and file-level permissions through Windows File Explorer, then you must specify the domain name and domain GUID for your on-premises AD. You can get this information from your domain admin or by running the following Active Directory PowerShell cmdlet from an on-premises AD-joined client: `Get-ADDomain`. Your domain name should be listed in the output under `DNSRoot` and your domain GUID should be listed under `ObjectGUID`. If you'd prefer to configure directory and file-level permissions using icacls, you can skip this step. However, if you want to use icacls, the client will need unimpeded network connectivity to the on-premises AD.
100101

@@ -229,7 +230,7 @@ reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKe
229230

230231
---
231232

232-
Changes are not instant, and require a policy refresh or a reboot to take effect.
233+
Changes aren't instant, and require a policy refresh or a reboot to take effect.
233234

234235
> [!IMPORTANT]
235236
> Once this change is applied, the client(s) won't be able to connect to storage accounts that are configured for on-premises AD DS integration without configuring Kerberos realm mappings. If you want the client(s) to be able to connect to storage accounts configured for AD DS as well as storage accounts configured for Microsoft Entra Kerberos, follow the steps in [Configure coexistence with storage accounts using on-premises AD DS](#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds).
@@ -290,7 +291,7 @@ reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters /v CloudKe
290291

291292
---
292293

293-
Changes are not instant, and require a policy refresh or a reboot to take effect.
294+
Changes aren't instant, and require a policy refresh or a reboot to take effect.
294295

295296
If you followed the steps in [Configure coexistence with storage accounts using on-premises AD DS](#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds), you can optionally remove all host name to Kerberos realm mappings from the client machine. Use one of the following three methods:
296297

@@ -336,7 +337,7 @@ To disable Microsoft Entra Kerberos authentication on your storage account by us
336337

337338
1. Sign in to the Azure portal and select the storage account you want to disable Microsoft Entra Kerberos authentication for.
338339
1. Under **Data storage**, select **File shares**.
339-
1. Next to **Active Directory**, select the configuration status.
340+
1. Next to **Identity-based access**, select the configuration status.
340341
1. Under **Microsoft Entra Kerberos**, select **Configure**.
341342
1. Uncheck the **Microsoft Entra Kerberos** checkbox.
342343
1. Select **Save**.

0 commit comments

Comments
 (0)