You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/change-identity-source.md
+23-33Lines changed: 23 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Change the Identity Source for Azure File Shares
2
+
title: Change the Identity Source for Azure Files
3
3
description: Learn how to switch between identity sources for Azure Files identity-based authentication for SMB file shares by disabling your current identity source and enabling a new one.
4
4
author: khdownie
5
5
ms.service: azure-file-storage
@@ -20,27 +20,35 @@ For guidance on choosing the right identity source for your environment, see [Ov
20
20
> [!IMPORTANT]
21
21
> Disabling the current identity source removes identity-based access for all file shares in the storage account immediately. Users can't access shares using identity-based authentication until you enable and configure a new identity source.
22
22
23
-
## Step 1: Disable the current identity source
23
+
## Step 1: Verify the current identity source
24
+
25
+
Use the Azure portal to verify the identity source that's currently enabled on your storage account. Supported identity sources are Active Directory Domain Services (AD DS), Microsoft Entra Domain Services, and Microsoft Entra Kerberos.
26
+
27
+
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
28
+
1. From the service menu, under **Data storage**, select **File shares**.
29
+
1. Next to **Identity-based access**, check the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-3-enable-a-new-identity-source).
30
+
31
+
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
32
+
33
+
1. Select **Configured**. The portal shows the identity source that's enabled on the storage account and its configuration status. Other identity sources are grayed out. In this example, Microsoft Entra Kerberos is enabled on the storage account, but not yet configured.
34
+
35
+
:::image type="content" source="media/change-identity-source/identity-source-status.png" alt-text="Screenshot showing which identity source is enabled on the storage account." lightbox="media/change-identity-source/identity-source-status.png":::
36
+
37
+
## Step 2: Disable the current identity source
24
38
25
39
Use the tabs below to find steps for disabling your current identity source.
26
40
27
41
### Active Directory Domain Services (AD DS)
28
42
29
-
# [Portal](#tab/portal)
30
-
31
-
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
32
-
1. Under **Data storage**, select **File shares**.
33
-
1. Next to **Identity-based access**, select the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-2-enable-a-new-identity-source).
43
+
> [!IMPORTANT]
44
+
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
34
45
35
-
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
46
+
# [Portal](#tab/portal)
36
47
37
48
1. Under **Active Directory Domain Services (AD DS)**, select **Configure**.
38
49
1. Select the **Disable Active Directory for this storage account** checkbox.
39
50
1. Select **Save**.
40
51
41
-
> [!IMPORTANT]
42
-
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
43
-
44
52
# [Azure PowerShell](#tab/powershell)
45
53
46
54
Run the following command, replacing the placeholder values with your own.
@@ -49,9 +57,6 @@ Run the following command, replacing the placeholder values with your own.
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
54
-
55
60
# [Azure CLI](#tab/cli)
56
61
57
62
Run the following command, replacing the placeholder values with your own.
@@ -60,21 +65,12 @@ Run the following command, replacing the placeholder values with your own.
60
65
az storage account update --name <storage-account-name> --resource-group <resource-group-name> --enable-files-adds false
61
66
```
62
67
63
-
> [!IMPORTANT]
64
-
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
65
-
66
68
---
67
69
68
70
### Microsoft Entra Domain Services
69
71
70
72
# [Portal](#tab/portal)
71
73
72
-
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
73
-
1. Under **Data storage**, select **File shares**.
74
-
1. Next to **Identity-based access**, select the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-2-enable-a-new-identity-source).
75
-
76
-
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
77
-
78
74
1. Under **Microsoft Entra Domain Services**, select **Configure**.
79
75
1. Uncheck the **Microsoft Entra Domain Services** checkbox.
1. Sign in to the [Azure portal](https://portal.azure.com) and select the storage account.
105
-
1. Under **Data storage**, select **File shares**.
106
-
1. Next to **Identity-based access**, select the configuration status. It should show **Configured**. If it shows **Not configured**, then you don't have an identity source enabled on the storage account and you can proceed to [Enable a new identity source](#step-2-enable-a-new-identity-source).
107
-
108
-
:::image type="content" source="media/change-identity-source/configure-identity-based-access.png" alt-text="Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted." lightbox="media/change-identity-source/configure-identity-based-access.png":::
109
-
110
100
1. Under **Microsoft Entra Kerberos**, select **Configure**.
111
101
1. Uncheck the **Microsoft Entra Kerberos** checkbox.
After disabling the current identity source, follow the instructions for the new identity source you want to enable:
135
125
136
-
-**Active Directory Domain Services (AD DS)**: See [Enable AD DS authentication for Azure file shares](storage-files-identity-ad-ds-enable.md).
137
-
-**Microsoft Entra Domain Services**: See [Enable Microsoft Entra Domain Services authentication on Azure Files](storage-files-identity-auth-domain-services-enable.md).
138
-
-**Microsoft Entra Kerberos** (hybrid or cloud-only identities): See [Enable Microsoft Entra Kerberos authentication for hybrid and cloud-only identities on Azure Files](storage-files-identity-auth-hybrid-identities-enable.md).
126
+
-**Active Directory Domain Services (AD DS)**: See [Enable AD DS authentication](storage-files-identity-ad-ds-enable.md).
127
+
-**Microsoft Entra Domain Services**: See [Enable Microsoft Entra Domain Services authentication](storage-files-identity-auth-domain-services-enable.md).
128
+
-**Microsoft Entra Kerberos**: See [Enable Microsoft Entra Kerberos authentication for hybrid and cloud-only identities](storage-files-identity-auth-hybrid-identities-enable.md).
0 commit comments