diff --git a/avm/res/net-app/net-app-account/capacity-pool/main.bicep b/avm/res/net-app/net-app-account/capacity-pool/main.bicep index 083df98628..16d4a0fae2 100644 --- a/avm/res/net-app/net-app-account/capacity-pool/main.bicep +++ b/avm/res/net-app/net-app-account/capacity-pool/main.bicep @@ -218,4 +218,7 @@ type volumeType = { @description('Optional. Enables non-browsable property for SMB Shares. Only applicable for SMB/DualProtocol volume.') smbNonBrowsable: ('Enabled' | 'Disabled')? + + @description('Optional. Define if a volume is KerberosEnabled.') + kerberosEnabled: bool? } diff --git a/avm/res/net-app/net-app-account/capacity-pool/volume/main.bicep b/avm/res/net-app/net-app-account/capacity-pool/volume/main.bicep index 7b310882b9..f5f538d3d7 100644 --- a/avm/res/net-app/net-app-account/capacity-pool/volume/main.bicep +++ b/avm/res/net-app/net-app-account/capacity-pool/volume/main.bicep @@ -91,6 +91,9 @@ param smbContinuouslyAvailable bool = false ]) param smbNonBrowsable string = 'Disabled' +@description('Optional. Define if a volume is KerberosEnabled.') +param kerberosEnabled bool = false + var builtInRoleNames = { Contributor: subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'b24988ac-6180-42a0-ab88-20f7382dd24c') Owner: subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '8e3af657-a8ff-443c-a75c-2fe8c4bcb635') @@ -226,6 +229,7 @@ resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2024-03-0 smbContinuouslyAvailable: smbContinuouslyAvailable smbEncryption: smbEncryption smbNonBrowsable: smbNonBrowsable + kerberosEnabled: kerberosEnabled } zones: map(zones, zone => '${zone}') } diff --git a/avm/res/net-app/net-app-account/tests/e2e/max/main.test.bicep b/avm/res/net-app/net-app-account/tests/e2e/max/main.test.bicep index 27282e50b7..ad547ce18c 100644 --- a/avm/res/net-app/net-app-account/tests/e2e/max/main.test.bicep +++ b/avm/res/net-app/net-app-account/tests/e2e/max/main.test.bicep @@ -130,6 +130,7 @@ module testDeployment '../../../main.bicep' = { usageThreshold: 107374182400 } { + kerberosEnabled: true exportPolicy: { rules: [ {