Skip to content

Commit ddd8f5b

Browse files
committed
cleanup numbers and formatting
1 parent 880d5a6 commit ddd8f5b

1 file changed

Lines changed: 26 additions & 26 deletions

File tree

articles/storage/files/storage-files-identity-auth-linux-kerberos-enable.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Use Kerberos Authentication for Linux clients with Azure Files
2+
title: Use Kerberos Authentication for Linux Clients with Azure Files
33
description: Learn how to enable identity-based Kerberos authentication for Linux clients over Server Message Block (SMB) for Azure Files using on-premises Active Directory Domain Services (AD DS) or Microsoft Entra Domain Services.
44
author: khdownie
55
ms.service: azure-file-storage
@@ -32,7 +32,7 @@ You can't use identity-based authentication to mount Azure File shares on Linux
3232

3333
## Prerequisites
3434

35-
Before you enable AD authentication over SMB for Azure file shares, make sure you complete the following prerequisites.
35+
Before you enable Active Directory authentication over SMB for Azure file shares, make sure you complete the following prerequisites.
3636

3737
- A Linux VM running Ubuntu 18.04+, or an equivalent RHEL or SLES VM. If running on Azure, the VM must have at least one network interface on the virtual network containing Microsoft Entra Domain Services. If using an on-premises VM, your AD DS must be synced to Microsoft Entra ID.
3838
- Root user or user credentials to a local user account that has full sudo rights (for this guide, localadmin).
@@ -116,9 +116,9 @@ MulticastDNS setting: no
116116
DNS Domain: domain1.contoso.com
117117
```
118118

119-
1. If the command works, skip the following steps and proceed to the next section.
119+
2. If the command works, skip the following steps and proceed to the next section.
120120

121-
1. If the command doesn't work, make sure that you can ping the domain server IP addresses.
121+
3. If the command doesn't work, make sure that you can ping the domain server IP addresses.
122122

123123
```bash
124124
ping 10.0.2.5
@@ -136,9 +136,9 @@ PING 10.0.2.5 (10.0.2.5) 56(84) bytes of data.
136136
rtt min/avg/max/mdev = 0.898/0.922/0.946/0.024 ms
137137
```
138138

139-
1. If the ping doesn't work, go back to [prerequisites](#prerequisites), and make sure that your VM is on a VNET that has access to the Entra tenant.
139+
4. If the ping doesn't work, go back to [prerequisites](#prerequisites), and make sure that your VM is on a virtual network that has access to the Entra tenant.
140140

141-
1. If the IP addresses respond to ping but the DNS servers aren't automatically discovered, you can add the DNS servers manually. Edit `/etc/netplan/50-cloud-init.yaml` by using your favorite text editor.
141+
5. If the IP addresses respond to ping but the DNS servers aren't automatically discovered, you can add the DNS servers manually. Edit `/etc/netplan/50-cloud-init.yaml` by using your favorite text editor.
142142

143143
```plaintext
144144
# This file is generated from information provided by the datasource. Changes
@@ -167,7 +167,7 @@ Then apply the changes:
167167
sudo netplan --debug apply
168168
```
169169

170-
1. Winbind assumes that the DHCP server keeps the domain DNS records up-to-date. However, this assumption isn't true for Azure DHCP. To set up the client to make DDNS updates, use [this guide](../../virtual-network/virtual-networks-name-resolution-ddns.md#linux-clients) to create a network script. Here's a sample script that resides at `/etc/dhcp/dhclient-exit-hooks.d/ddns-update`.
170+
6. Winbind assumes that the DHCP server keeps the domain DNS records up-to-date. However, this assumption isn't true for Azure DHCP. To set up the client to make DDNS updates, use [this guide](../../virtual-network/virtual-networks-name-resolution-ddns.md#linux-clients) to create a network script. Here's a sample script that resides at `/etc/dhcp/dhclient-exit-hooks.d/ddns-update`.
171171

172172
```plaintext
173173
#!/bin/sh
@@ -196,7 +196,7 @@ fi
196196

197197
### Connect to Microsoft Entra Domain Services and make sure the services are discoverable
198198

199-
1. Make sure that you can ping the domain server by the domain name.
199+
Make sure that you can ping the domain server by the domain name.
200200

201201
```bash
202202
ping contosodomain.contoso.com
@@ -216,7 +216,7 @@ PING contosodomain.contoso.com (10.0.2.4) 56(84) bytes of data.
216216
rtt min/avg/max/mdev = 0.740/1.026/1.419/0.248 ms
217217
```
218218

219-
1. Make sure you can discover the Entra services on the network.
219+
Make sure you can discover the Entra services on the network.
220220

221221
```bash
222222
nslookup
@@ -236,15 +236,15 @@ _ldap._tcp.contosodomain.contoso.com service = 0 100 389 hxt4yo--jb9q529.contoso
236236

237237
### Set up hostname and fully qualified domain name (FQDN)
238238

239-
1. Using your text editor, update the `/etc/hosts` file with the final FQDN (after joining the domain) and the alias for the host. The IP address doesn't matter for now because this line is mainly used to translate short hostname to FQDN. For more information, see [Setting up Samba as a Domain Member](https://wiki.samba.org/index.php/Setting_up_Samba_as_a_Domain_Member).
239+
Using your text editor, update the `/etc/hosts` file with the final FQDN (after joining the domain) and the alias for the host. The IP address doesn't matter for now because this line is mainly used to translate short hostname to FQDN. For more information, see [Setting up Samba as a Domain Member](https://wiki.samba.org/index.php/Setting_up_Samba_as_a_Domain_Member).
240240

241241
```plaintext
242242
127.0.0.1 contosovm.contosodomain.contoso.com contosovm
243243
#cmd=sudo vim /etc/hosts
244244
#then enter this value instead of localhost "ubuntvm.contosodomain.contoso.com UbuntuVM"
245245
```
246246

247-
1. Now, your hostname should resolve. You can ignore the IP address it resolves to for now. The short hostname should resolve to the FQDN.
247+
Now, your hostname should resolve. You can ignore the IP address it resolves to for now. The short hostname should resolve to the FQDN.
248248

249249
```bash
250250
getent hosts contosovm
@@ -271,13 +271,13 @@ contosovm.contosodomain.contoso.com
271271
```
272272

273273
> [!NOTE]
274-
> Some distros require you to run the `hostnamectl` command in order for `hostname -f` to be updated:
274+
> Some Linux distros require you to run the `hostnamectl` command in order for `hostname -f` to be updated:
275275
>
276276
> `hostnamectl set-hostname contosovm.contosodomain.contoso.com`
277277
278278
### Set up krb5.conf
279279

280-
1. Configure `/etc/krb5.conf` so that the Kerberos key distribution center (KDC) with the domain server can be contacted for authentication. For more information, see [MIT Kerberos Documentation](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html). Here's a sample `/etc/krb5.conf` file.
280+
Configure `/etc/krb5.conf` so that the Kerberos key distribution center (KDC) with the domain server can be contacted for authentication. For more information, see [MIT Kerberos Documentation](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html). Here's a sample `/etc/krb5.conf` file.
281281

282282
```plaintext
283283
[libdefaults]
@@ -288,7 +288,7 @@ contosovm.contosodomain.contoso.com
288288

289289
### Set up smb.conf
290290

291-
1. Identify the path to `smb.conf`.
291+
Identify the path to `smb.conf`.
292292

293293
```bash
294294
sudo smbd -b | grep "CONFIGFILE"
@@ -298,7 +298,7 @@ sudo smbd -b | grep "CONFIGFILE"
298298
CONFIGFILE: /etc/samba/smb.conf
299299
```
300300

301-
1. Change the SMB configuration to act as a domain member. For more information, see [Setting up samba as a domain member](https://wiki.samba.org/index.php/Setting_up_Samba_as_a_Domain_Member). Here's a sample `smb.conf` file.
301+
Change the SMB configuration to act as a domain member. For more information, see [Setting up samba as a domain member](https://wiki.samba.org/index.php/Setting_up_Samba_as_a_Domain_Member). Here's a sample `smb.conf` file.
302302

303303
> [!NOTE]
304304
> This example is for Microsoft Entra Domain Services, for which setting `backend = rid` is recommended when configuring idmap. On-premises AD DS users might prefer to [choose a different idmap backend](https://wiki.samba.org/index.php/Setting_up_Samba_as_a_Domain_Member#Choosing_an_idmap_backend).
@@ -337,15 +337,15 @@ sudo smbd -b | grep "CONFIGFILE"
337337
template homedir = /home/%U
338338
```
339339

340-
1. Force winbind to reload the changed config file.
340+
Force winbind to reload the changed config file.
341341

342342
```bash
343343
sudo smbcontrol all reload-config
344344
```
345345

346346
### Join the domain
347347

348-
1. Use the `net ads join` command to join the host to the Microsoft Entra Domain Services domain. If the command returns an error, see [Troubleshooting samba domain members](https://wiki.samba.org/index.php/Troubleshooting_Samba_Domain_Members) to resolve the problem.
348+
Use the `net ads join` command to join the host to the Microsoft Entra Domain Services domain. If the command returns an error, see [Troubleshooting samba domain members](https://wiki.samba.org/index.php/Troubleshooting_Samba_Domain_Members) to resolve the problem.
349349

350350
```bash
351351
sudo net ads join -U contososmbadmin # user - garead
@@ -358,7 +358,7 @@ Using short domain name -- CONTOSODOMAIN
358358
Joined 'CONTOSOVM' to dns domain 'contosodomain.contoso.com'
359359
```
360360
361-
1. Make sure that the DNS record exists for this host on the domain server.
361+
Make sure that the DNS record exists for this host on the domain server.
362362
363363
```bash
364364
nslookup contosovm.contosodomain.contoso.com 10.0.2.5
@@ -376,14 +376,14 @@ If you plan for users to actively sign in to client machines and access the Azur
376376
377377
### Set up nsswitch.conf
378378
379-
1. After you join the host to the domain, add the winbind libraries to the user and group lookup paths. Use your text editor to edit `/etc/nsswitch.conf` and add the following entries:
379+
After you join the host to the domain, add the winbind libraries to the user and group lookup paths. Use your text editor to edit `/etc/nsswitch.conf` and add the following entries:
380380
381381
```plaintext
382382
passwd: compat systemd winbind
383383
group: compat systemd winbind
384384
```
385385
386-
1. Enable the winbind service to start automatically on reboot.
386+
Enable the winbind service to start automatically on reboot.
387387
388388
```bash
389389
sudo systemctl enable winbind
@@ -394,7 +394,7 @@ Synchronizing state of winbind.service with SysV service script with /lib/system
394394
Executing: /lib/systemd/systemd-sysv-install enable winbind
395395
```
396396
397-
1. Restart the service.
397+
Restart the service.
398398
399399
```bash
400400
sudo systemctl restart winbind
@@ -423,7 +423,7 @@ Apr 24 09:34:31 contosovm systemd[1]: Started Samba Winbind Daemon.
423423
Apr 24 09:34:31 contosovm winbindd[27349]: STATUS=daemon 'winbindd' finished starting up and ready to serve connections
424424
```
425425
426-
1. Make sure that the domain users and groups are discovered.
426+
Make sure that the domain users and groups are discovered.
427427
428428
```bash
429429
getent passwd contososmbadmin
@@ -449,14 +449,14 @@ wbinfo --ping-dc
449449

450450
### Configure PAM for winbind
451451

452-
1. Place winbind in the authentication stack so that domain users authenticate through winbind by configuring PAM (Pluggable Authentication Module) for winbind. The second command ensures that the system creates the home directory for a domain user upon first login.
452+
Place winbind in the authentication stack so that domain users authenticate through winbind by configuring PAM (Pluggable Authentication Module) for winbind. The second command ensures that the system creates the home directory for a domain user upon first login.
453453

454454
```bash
455455
sudo pam-auth-update --enable winbind
456456
sudo pam-auth-update --enable mkhomedir
457457
```
458458

459-
1. Ensure that the PAM authentication config has the following arguments in `/etc/pam.d/common-auth`:
459+
Ensure that the PAM authentication config has the following arguments in `/etc/pam.d/common-auth`:
460460

461461
```bash
462462
grep pam_winbind.so /etc/pam.d/common-auth
@@ -466,7 +466,7 @@ grep pam_winbind.so /etc/pam.d/common-auth
466466
auth [success=1 default=ignore] pam_winbind.so krb5_auth krb5_ccache_type=FILE cached_login try_first_pass
467467
```
468468

469-
1. You can now sign in to this system as the domain user, either through ssh, su, or any other means of authentication.
469+
You can now sign in to this system as the domain user, either through ssh, su, or any other means of authentication.
470470

471471
```bash
472472
su - contososmbadmin
@@ -547,6 +547,6 @@ For newer kernels, consider setting the **actimeo** features more granularly. Yo
547547
548548
## Next step
549549
550-
For more information on how to mount an SMB file share on Linux, see:
550+
To learn how to mount an SMB file share on Linux, see:
551551
552552
- [Mount SMB Azure file share on Linux](storage-how-to-use-files-linux.md)

0 commit comments

Comments
 (0)