Configure Azure Files Share with Windows AD NTFS Permissions

  Рет қаралды 6,400

Travis Roberts

Travis Roberts

Күн бұрын

Пікірлер: 21
@darren85i
@darren85i 3 ай бұрын
Really good that you demo'd the NTFS failure before this is configured :)
@Ciraltos
@Ciraltos 3 ай бұрын
Glad it was helpful!
@JeffWyke-q6o
@JeffWyke-q6o 2 ай бұрын
This is an awesome video. Would you happen to have a video on how to do this from strictly an Azure environment? Like we no longer have an on-prem environment and everything is azure based with users remoting onto an Azure VM with the file share mapped to the VM using Entra ID authentication. But we are running into issues being able to edit the NTFS permissions.
@joshuaeuceda4635
@joshuaeuceda4635 3 ай бұрын
Excellent Work! Thank you for your content!
@mattpollock2105
@mattpollock2105 2 ай бұрын
Thanks for the content, very useful video.👍 Once the share and NTFS permissions have been setup by the admin, what is the best practice for setting the File share authentication method in Azure - leave it as "Access Key" or change it to "Microsoft Entra User account"? If the share and NTFS permissions are set up correctly, are there any implications to leaving the method as access key for example?
@kirubaananth274
@kirubaananth274 3 ай бұрын
Excellent video 🎉🎉🎉
@vinodboddu1991
@vinodboddu1991 3 ай бұрын
Hi Travis , plesse make a video on new teams installation on multi session image.its helps to lot of avd Engineer. ❤❤❤
@johngomes4934
@johngomes4934 2 ай бұрын
@Travis, what if you create the file share but not syncing with on-prem AD. Once you create the file share would robocopy not retain permissions when copied to the AFS. No Azure file sync, Not using onprem AD but did setup Entra Domain services....What are my options then to copy and retain similar NTFS style permissions?
@Ciraltos
@Ciraltos 2 ай бұрын
NTFS permissions require Kerberos. Entra ID can read Kerberos tickets but not create them, that's why user need Windows AD or Entra DS. Also, Robocopy may copy permissions, but the GUID and user object in AD DS is different then from Entra ID, even if the UPN is the same.
@Glitch-Coder
@Glitch-Coder 3 ай бұрын
how to create the sync between the onprem and azure AD group ? Any option to validate
@RobertZajkovski
@RobertZajkovski 2 ай бұрын
Azure Entra Connect is the service that sync users and groups from on-prem to Entra ID.
@ChristianBWG
@ChristianBWG 29 күн бұрын
When I perform a 'Check Names' on a group that I'm trying to add, I get an NTLM-style prompt, which rejects my account, even though I am logged in as an enterprise admin. I've tried with different admin accounts but no success. Have you come across this?
@ChristianBWG
@ChristianBWG 16 күн бұрын
The error disappeared a few days later, so I can lookup users and groups, but when I try to apply, I get an error "Failed to enumerate objects in the container. Access is denied." The account I am using to manage permissions has the "SMB Elevated Contributor" role. Any ideas?
@yazismagictouch7036
@yazismagictouch7036 16 күн бұрын
Can this be done for a remote user with no vpn?
@Ciraltos
@Ciraltos 16 күн бұрын
It requires line-of-sight to a DC, so no.
@rickwagner3797
@rickwagner3797 3 ай бұрын
as an Azure architect I love your videos. I haven't had to run this in a long time but I had to today and i'm getting an error. If i include the -OrganizationalUnitDistinguishedName $OuDistinguishedName switch the command fails with "New-ADComputer: A required privilege is not held by the client.". If i remove just the OU switch the command runs fine but it puts the SA in an OU I don't want it in and I don't have access to move it to the OU i want it in. I have a long distinguished Name but I have confirmed it is correct so I am not sure why i am getting that error when the DN is correct? any idea? thanks!
@v2g2019
@v2g2019 3 ай бұрын
what if my system is add to Intune how can i manage this permission?
@v2g2019
@v2g2019 3 ай бұрын
same account is add to local dc as well but permission is not working
@fbifido2
@fbifido2 3 ай бұрын
Please do a "Azure Files Share with Entra ID per user/group Permissions" ?? cloud only file share with cloud only servers, clients & users.
@Ciraltos
@Ciraltos 3 ай бұрын
Azure File Shares NTFS style permissions needs Kerberos for authentication. Entra ID can read, but not create Kerberos tickets. For now, users and groups need to be sourced from Windows AD.
@v2g2019
@v2g2019 3 ай бұрын
@@Ciraltos what if my system are join to intune and my Azure file share is add to local AD(I have Azure AD Connect). Will this still work ?
Master Azure Files with NTFS and Entra Domain Services
13:39
Travis Roberts
Рет қаралды 2,7 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
REAL or FAKE? #beatbox #tiktok
01:03
BeatboxJCOP
Рет қаралды 18 МЛН
Apple, Google told to be prepared for TikTok ban on Jan 19
2:14
Straight Arrow News
Рет қаралды 12 М.
A Beginners Guide to Azure File Shares
15:48
Travis Roberts
Рет қаралды 8 М.
The Line Between AD and Azure AD!
49:52
John Savill's Technical Training
Рет қаралды 83 М.
Azure Files vs SharePoint: Best Document Storage Option?
14:58
Jonathan Edwards
Рет қаралды 32 М.
Don't Use Entra Domain Services to Replace Windows Active Directory
11:31
The Ultimate FSLogix Compilation!!!
55:43
Azure Academy
Рет қаралды 11 М.
Private Endpoints and DNS in Azure
16:48
Travis Roberts
Рет қаралды 47 М.
Azure Files SMB Access with Windows AD
25:17
Travis Roberts
Рет қаралды 76 М.
Azure Files AD Authentication Integration
22:35
John Savill's Technical Training
Рет қаралды 35 М.
What is Entra ID, Entra Domain Services, and Windows AD?
8:44
Travis Roberts
Рет қаралды 22 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН