Skip to content

Commit e958234

Browse files
committed
edits
1 parent 1a72d1a commit e958234

1 file changed

Lines changed: 13 additions & 5 deletions

File tree

articles/storage/files/storage-files-identity-auth-linux-kerberos-enable.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,12 @@ sudo systemctl restart systemd-timesyncd.service
6464

6565
## Enable AD Kerberos authentication
6666

67-
Follow these steps to enable AD Kerberos authentication. [This Samba documentation](https://wiki.samba.org/index.php/Setting_up_Samba_as_a_Domain_Member) might be helpful as a reference.
67+
Follow these steps to enable AD Kerberos authentication using either on-premises AD DS or Microsoft Entra Domain Services. [This Samba documentation](https://wiki.samba.org/index.php/Setting_up_Samba_as_a_Domain_Member) might be helpful as a reference.
6868

6969
### Make sure the domain server is reachable and discoverable
7070

71+
The following section assumes you have an existing, on-premises AD DS. If you're using Microsoft Entra Domain Services instead, skip this section and proceed to [Connect to Entra Domain Services and make sure the services are discoverable](#connect-to-microsoft-entra-domain-services-and-make-sure-the-services-are-discoverable).
72+
7173
1. Make sure that the DNS servers you enter contain the domain server IP addresses.
7274

7375
```bash
@@ -192,10 +194,14 @@ Follow these steps to enable AD Kerberos authentication. [This Samba documentati
192194
fi
193195
```
194196

197+
Proceed to [set up a hostname and fully qualified domain name](#set-up-hostname-and-fully-qualified-domain-name-fqdn).
198+
195199
<a name='connect-to-azure-ad-ds-and-make-sure-the-services-are-discoverable'></a>
196200

197201
### Connect to Microsoft Entra Domain Services and make sure the services are discoverable
198202

203+
If you're using AD DS and not Microsoft Entra Domain Services, you can skip this section and proceed to [set up a hostname and fully qualified domain name](#set-up-hostname-and-fully-qualified-domain-name-fqdn).
204+
199205
Make sure that you can ping the domain server by the domain name.
200206

201207
```bash
@@ -345,7 +351,7 @@ sudo smbcontrol all reload-config
345351

346352
### Join the domain
347353

348-
Use the `net ads join` command to join the host to the Microsoft Entra Domain Services domain. If the command returns an error, see [Troubleshooting samba domain members](https://wiki.samba.org/index.php/Troubleshooting_Samba_Domain_Members) to resolve the problem.
354+
Use the `net ads join` command to join the host to the domain. If the command returns an error, see [Troubleshooting samba domain members](https://wiki.samba.org/index.php/Troubleshooting_Samba_Domain_Members) to resolve the problem.
349355

350356
```bash
351357
sudo net ads join -U contososmbadmin # user - garead
@@ -372,10 +378,10 @@ Name: contosovm.contosodomain.contoso.com
372378
Address: 10.0.0.8
373379
```
374380
375-
If you plan for users to actively sign in to client machines and access the Azure file shares, you need to [set up nsswitch.conf](#set-up-nsswitchconf) and [configure PAM for winbind](#configure-pam-for-winbind). If planned access is limited to applications represented by a user account or computer account that need Kerberos authentication to access the file share, you can skip these steps.
376-
377381
### Set up nsswitch.conf
378382
383+
If you plan for users to actively sign in to client machines and access the Azure file shares, you need to set up nsswitch.conf. If planned access is limited to applications represented by a user account or computer account that need Kerberos authentication to access the file share, you can skip this step.
384+
379385
After you join the host to the domain, add the winbind libraries to the user and group lookup paths. Use your text editor to edit `/etc/nsswitch.conf` and add the following entries:
380386
381387
```plaintext
@@ -449,6 +455,8 @@ wbinfo --ping-dc
449455

450456
### Configure PAM for winbind
451457

458+
If you plan for users to actively sign in to client machines and access the Azure file shares, you need to configure PAM for winbind. If planned access is limited to applications represented by a user account or computer account that need Kerberos authentication to access the file share, you can skip this step.
459+
452460
Place winbind in the authentication stack so that domain users authenticate through winbind by configuring PAM (Pluggable Authentication Module) for winbind. The second command ensures that the system creates the home directory for a domain user upon first login.
453461

454462
```bash
@@ -509,7 +517,7 @@ wbinfo -K 'contososmbadmin%SUPERSECRETPASSWORD'
509517
510518
## Mount the file share
511519
512-
After you enable AD (or Entra ID) Kerberos authentication and domain-join your Linux VM, you can mount the file share.
520+
After you enable Kerberos authentication and domain-join your Linux VM, you can mount the file share.
513521
514522
Use the following mount option with all access control models to enable Kerberos security: `sec=krb5`. Omit the username and password when you use `sec=krb5`. For example:
515523

0 commit comments

Comments
 (0)