Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
windows_first
windows_tools
powershell_heavy
missing_linux_example
Summary
The documentation demonstrates a Windows bias by prioritizing Windows Active Directory as the only supported KDC, referencing Windows tools (such as Event Viewer, MMC, and setspn) for management and troubleshooting, and providing detailed workflows and terminology rooted in Windows environments. Powershell and Windows-specific management consoles are mentioned for SPN management, while Linux/UNIX equivalents are not. There are no Linux command-line examples for managing Kerberos or SPNs, and Linux-specific workflows are only briefly mentioned, often as exceptions or notes, rather than as first-class guidance.
Recommendations
  • Explicitly mention and, where possible, provide parity for Linux/UNIX tools and workflows (e.g., kadmin, ktutil, klist, and relevant Linux commands for SPN/keytab management).
  • Include Linux/UNIX command-line examples for common Kerberos tasks, such as creating and managing keytabs, configuring krb5.conf, and troubleshooting Kerberos authentication.
  • Where Windows tools (e.g., setspn, MMC, Event Viewer) are referenced, also reference Linux/UNIX equivalents or alternatives.
  • Clarify any Azure NetApp Files limitations regarding non-Windows KDCs, and if only Windows AD is supported, explain the rationale and potential roadmap for broader KDC support.
  • Balance the order of presentation so that Linux/NFS and Windows/SMB are treated with equal depth and priority, rather than consistently leading with Windows.
  • Add troubleshooting sections and best practices relevant to Linux environments, including log file locations, common error messages, and diagnostic commands.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Biased Biased
2026-01-12 00:00 #243 cancelled Biased Biased
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-09-04 00:00 #101 completed Clean Clean
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-13 21:37 #48 completed Biased Biased
2025-07-09 13:09 #3 cancelled Clean Clean
2025-07-08 04:23 #2 cancelled Biased Biased

Flagged Code Snippets

Kerberos Realm: CONTOSO.COM
KDC Vendor: Microsoft
KDC IP Address: x.x.x.x 
KDC Port: 88
Clock Skew: 5
Active Directory Server Name: dc1.contoso.com
Active Directory Server IP Address: x.x.x.x
Comment: -
Admin Server IP Address: x.x.x.x
Admin Server Port: 749
Password Server IP Address: x.x.x.x
Password Server Port: 464
Permitted Encryption Types: aes-256
-    Configured by Azure NetApp Files administrator in the portal
-    Automatically configured by the service using Active Directory connection information/system defaults