Skip to content

Commit f49edc0

Browse files
committed
more formatting
1 parent 4dec0dd commit f49edc0

1 file changed

Lines changed: 16 additions & 10 deletions

File tree

articles/storage/files/change-identity-source.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ First, verify the identity source that's currently enabled on your storage accou
3636

3737
1. Select **Configured**.
3838

39-
1. The portal shows the identity source that's enabled on the storage account and its configuration status. Other identity sources are grayed out. In this example, Microsoft Entra Kerberos is enabled on the storage account, but not yet configured.
39+
1. The portal shows the identity source that's enabled on the storage account and its configuration status. Other identity sources are grayed out. In this example, Microsoft Entra Kerberos is enabled as the identity source for the storage account.
4040

4141
:::image type="content" source="media/change-identity-source/identity-source-status.png" alt-text="Screenshot showing which identity source is enabled on the storage account." lightbox="media/change-identity-source/identity-source-status.png":::
4242

@@ -74,26 +74,28 @@ Disable your current identity source by using the Azure portal, Azure PowerShell
7474

7575
### Active Directory Domain Services (AD DS)
7676

77-
> [!IMPORTANT]
78-
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
79-
8077
# [Portal](#tab/portal)
8178

79+
To disable AD DS on the storage account, follow these steps.
80+
8281
1. Under **Active Directory Domain Services (AD DS)**, select **Configure**.
8382
1. Select the **Disable Active Directory for this storage account** checkbox.
8483
1. Select **Save**.
8584

85+
> [!IMPORTANT]
86+
> After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.
87+
8688
# [Azure PowerShell](#tab/powershell)
8789

88-
Run the following command, replacing the placeholder values with your own.
90+
To disable AD DS on the storage account, run the following cmdlet. Replace the placeholder values with your own.
8991

9092
```azurepowershell
9193
Set-AzStorageAccount -ResourceGroupName <resourceGroupName> -StorageAccountName <storageAccountName> -EnableActiveDirectoryDomainServicesForFile $false
9294
```
9395

9496
# [Azure CLI](#tab/cli)
9597

96-
Run the following command, replacing the placeholder values with your own.
98+
To disable AD DS on the storage account, run the following command. Replace the placeholder values with your own.
9799

98100
```azurecli
99101
az storage account update --name <storage-account-name> --resource-group <resource-group-name> --enable-files-adds false
@@ -105,21 +107,23 @@ az storage account update --name <storage-account-name> --resource-group <resour
105107

106108
# [Portal](#tab/portal)
107109

110+
To disable Microsoft Entra Domain Services on the storage account, follow these steps.
111+
108112
1. Under **Microsoft Entra Domain Services**, select **Configure**.
109113
1. Uncheck the **Enable Microsoft Entra Domain Services** checkbox.
110114
1. Select **Save**.
111115

112116
# [Azure PowerShell](#tab/powershell)
113117

114-
Run the following command, replacing the placeholder values with your own.
118+
To disable Microsoft Entra Domain Services on the storage account, run the following cmdlet. Replace the placeholder values with your own.
115119

116120
```azurepowershell
117121
Set-AzStorageAccount -ResourceGroupName <resourceGroupName> -StorageAccountName <storageAccountName> -EnableAzureActiveDirectoryDomainServicesForFile $false
118122
```
119123

120124
# [Azure CLI](#tab/cli)
121125

122-
Run the following command, replacing the placeholder values with your own.
126+
To disable Microsoft Entra Domain Services on the storage account, run the following command. Replace the placeholder values with your own.
123127

124128
```azurecli
125129
az storage account update --name <storage-account-name> --resource-group <resource-group-name> --enable-files-aadds false
@@ -131,21 +135,23 @@ az storage account update --name <storage-account-name> --resource-group <resour
131135

132136
# [Portal](#tab/portal)
133137

138+
To disable Microsoft Entra Kerberos on the storage account, follow these steps.
139+
134140
1. Under **Microsoft Entra Kerberos**, select **Configure**.
135141
1. Uncheck the **Microsoft Entra Kerberos** checkbox.
136142
1. Select **Save**.
137143

138144
# [Azure PowerShell](#tab/powershell)
139145

140-
Run the following command, replacing the placeholder values with your own.
146+
To disable Microsoft Entra Kerberos on the storage account, run the following cmdlet. Replace the placeholder values with your own.
141147

142148
```azurepowershell
143149
Set-AzStorageAccount -ResourceGroupName <resourceGroupName> -StorageAccountName <storageAccountName> -EnableAzureActiveDirectoryKerberosForFile $false
144150
```
145151

146152
# [Azure CLI](#tab/cli)
147153

148-
Run the following command, replacing the placeholder values with your own.
154+
To disable Microsoft Entra Kerberos on the storage account, run the following command. Replace the placeholder values with your own.
149155

150156
```azurecli
151157
az storage account update --name <storage-account-name> --resource-group <resource-group-name> --enable-files-aadkerb false

0 commit comments

Comments
 (0)