Skip to content

Commit ee5d377

Browse files
committed
cleanup add screenshot
1 parent 265c85e commit ee5d377

2 files changed

Lines changed: 23 additions & 33 deletions

File tree

articles/storage/files/change-identity-source.md

Lines changed: 23 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Change the Identity Source for Azure File Shares
2+
title: Change the Identity Source for Azure Files
33
description: Learn how to switch between identity sources for Azure Files identity-based authentication for SMB file shares by disabling your current identity source and enabling a new one.
44
author: khdownie
55
ms.service: azure-file-storage
@@ -20,27 +20,35 @@ For guidance on choosing the right identity source for your environment, see [Ov
2020
> [!IMPORTANT]
2121
> Disabling the current identity source removes identity-based access for all file shares in the storage account immediately. Users can't access shares using identity-based authentication until you enable and configure a new identity source.
2222
23-
## Step 1: Disable the current identity source
23+
## Step 1: Verify the current identity source
24+
25+
Use the Azure portal to verify the identity source that's currently enabled on your storage account. Supported identity sources are Active Directory Domain Services (AD DS), Microsoft Entra Domain Services, and Microsoft Entra Kerberos.
26+
27+
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
28+
1. From the service menu, under **Data storage**, select **File shares**.
29+
1. Next to **Identity-based access**, check the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-3-enable-a-new-identity-source).
30+
31+
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
32+
33+
1. Select **Configured**. The portal shows the identity source that's enabled on the storage account and its configuration status. Other identity sources are grayed out. In this example, Microsoft Entra Kerberos is enabled on the storage account, but not yet configured.
34+
35+
:::image type="content" source="media/change-identity-source/identity-source-status.png" alt-text="Screenshot showing which identity source is enabled on the storage account." lightbox="media/change-identity-source/identity-source-status.png":::
36+
37+
## Step 2: Disable the current identity source
2438

2539
Use the tabs below to find steps for disabling your current identity source.
2640

2741
### Active Directory Domain Services (AD DS)
2842

29-
# [Portal](#tab/portal)
30-
31-
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
32-
1. Under **Data storage**, select **File shares**.
33-
1. Next to **Identity-based access**, select the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-2-enable-a-new-identity-source).
43+
> [!IMPORTANT]
44+
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
3445
35-
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
46+
# [Portal](#tab/portal)
3647

3748
1. Under **Active Directory Domain Services (AD DS)**, select **Configure**.
3849
1. Select the **Disable Active Directory for this storage account** checkbox.
3950
1. Select **Save**.
4051

41-
> [!IMPORTANT]
42-
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
43-
4452
# [Azure PowerShell](#tab/powershell)
4553

4654
Run the following command, replacing the placeholder values with your own.
@@ -49,9 +57,6 @@ Run the following command, replacing the placeholder values with your own.
4957
Set-AzStorageAccount -ResourceGroupName <resourceGroupName> -StorageAccountName <storageAccountName> -EnableActiveDirectoryDomainServicesForFile $false
5058
```
5159

52-
> [!IMPORTANT]
53-
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
54-
5560
# [Azure CLI](#tab/cli)
5661

5762
Run the following command, replacing the placeholder values with your own.
@@ -60,21 +65,12 @@ Run the following command, replacing the placeholder values with your own.
6065
az storage account update --name <storage-account-name> --resource-group <resource-group-name> --enable-files-adds false
6166
```
6267

63-
> [!IMPORTANT]
64-
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
65-
6668
---
6769

6870
### Microsoft Entra Domain Services
6971

7072
# [Portal](#tab/portal)
7173

72-
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
73-
1. Under **Data storage**, select **File shares**.
74-
1. Next to **Identity-based access**, select the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-2-enable-a-new-identity-source).
75-
76-
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
77-
7874
1. Under **Microsoft Entra Domain Services**, select **Configure**.
7975
1. Uncheck the **Microsoft Entra Domain Services** checkbox.
8076
1. Select **Save**.
@@ -101,12 +97,6 @@ az storage account update --name <storage-account-name> --resource-group <resour
10197

10298
# [Portal](#tab/portal)
10399

104-
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
105-
1. Under **Data storage**, select **File shares**.
106-
1. Next to **Identity-based access**, select the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-2-enable-a-new-identity-source).
107-
108-
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
109-
110100
1. Under **Microsoft Entra Kerberos**, select **Configure**.
111101
1. Uncheck the **Microsoft Entra Kerberos** checkbox.
112102
1. Select **Save**.
@@ -129,10 +119,10 @@ az storage account update --name <storage-account-name> --resource-group <resour
129119

130120
---
131121

132-
## Step 2: Enable a new identity source
122+
## Step 3: Enable a new identity source
133123

134124
After disabling the current identity source, follow the instructions for the new identity source you want to enable:
135125

136-
- **Active Directory Domain Services (AD DS)**: See [Enable AD DS authentication for Azure file shares](storage-files-identity-ad-ds-enable.md).
137-
- **Microsoft Entra Domain Services**: See [Enable Microsoft Entra Domain Services authentication on Azure Files](storage-files-identity-auth-domain-services-enable.md).
138-
- **Microsoft Entra Kerberos** (hybrid or cloud-only identities): See [Enable Microsoft Entra Kerberos authentication for hybrid and cloud-only identities on Azure Files](storage-files-identity-auth-hybrid-identities-enable.md).
126+
- **Active Directory Domain Services (AD DS)**: See [Enable AD DS authentication](storage-files-identity-ad-ds-enable.md).
127+
- **Microsoft Entra Domain Services**: See [Enable Microsoft Entra Domain Services authentication](storage-files-identity-auth-domain-services-enable.md).
128+
- **Microsoft Entra Kerberos**: See [Enable Microsoft Entra Kerberos authentication for hybrid and cloud-only identities](storage-files-identity-auth-hybrid-identities-enable.md).
33.4 KB
Loading

0 commit comments

Comments
 (0)