About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
powershell_heavy
⚠️
windows_tools
⚠️
missing_linux_example
⚠️
windows_first
Summary:
The documentation exclusively provides instructions and examples using Windows-specific tools and PowerShell cmdlets (AzFilesHybrid, Active Directory PowerShell), with explicit requirements for Windows environments (domain-joined Windows client, Windows PowerShell 5.1). There are no Linux or cross-platform alternatives or examples, and Windows tooling is mentioned first and exclusively.
Recommendations:
- Provide equivalent instructions for Linux environments, such as using cross-platform Azure CLI or REST API for Kerberos key rotation if supported.
- Clarify whether the process is fundamentally Windows-only due to AD DS requirements, or if there are supported Linux-based management options (e.g., via Samba, LDAP tools, or Azure CLI).
- If Linux parity is not possible, explicitly state this limitation early in the documentation.
- Where possible, use cross-platform scripting languages or tools (e.g., Python, Azure CLI) for examples.
- Add a section or note addressing Linux administrators and their options (or lack thereof) for this scenario.
Create pull request
Flagged Code Snippets
# Update the password of the AD DS account registered for the storage account
# You may use either kerb1 or kerb2
Update-AzStorageAccountADObjectPassword `
-RotateToKerbKey kerb2 `
-ResourceGroupName "<your-resource-group-name-here>" `
-StorageAccountName "<your-storage-account-name-here>"
Test-AzStorageAccountADObjectPasswordIsKerbKey -ResourceGroupName "<your-resource-group-name>" -Name "<your-storage-account-name>" -Verbose
$KeyName = "kerb1" # Could be either the first or second Kerberos key, this script assumes we're refreshing the first
$KerbKeys = New-AzStorageAccountKey -ResourceGroupName $ResourceGroupName -Name $StorageAccountName -KeyName $KeyName
$KerbKey = $KerbKeys.keys | Where-Object {$_.KeyName -eq $KeyName} | Select-Object -ExpandProperty Value
$NewPassword = ConvertTo-SecureString -String $KerbKey -AsPlainText -Force
Set-ADAccountPassword -Identity <domain-object-identity> -Reset -NewPassword $NewPassword