Skip to content

Commit be7cecf

Browse files
Merge pull request #10351 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-11 02:00 UTC
2 parents 86b61fb + 5a3fa4e commit be7cecf

File tree

1 file changed

+58
-3
lines changed

1 file changed

+58
-3
lines changed

support/azure/azure-storage/files/security/files-troubleshoot-smb-authentication.md

Lines changed: 58 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure Files identity-based authentication and authorization
33
description: Troubleshoot problems using identity-based authentication to connect to SMB Azure file shares and see possible resolutions.
44
ms.service: azure-file-storage
55
ms.custom: sap:Security, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
6-
ms.date: 02/11/2025
6+
ms.date: 12/05/2025
77
ms.reviewer: kendownie, v-surmaini, v-weizhu
88
---
99
# Troubleshoot Azure Files identity-based authentication and authorization issues (SMB)
@@ -173,12 +173,67 @@ The cmdlet performs these checks in sequence and provides guidance for failures:
173173
174174
If you just want to run a subselection of the previous checks, you can use the `-Filter` parameter, along with a comma-separated list of checks to run.
175175
176+
## Mount to Azure Files fails when using Entra Kerberos due to unsupported Kerberos encryption types
177+
178+
When mounting an Azure file share using Entra Kerberos authentication, the mount operation fails. Log collection might show that the Kerberos service ticket can't be decrypted.
179+
You might also find that the following registry key is configured: `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\SupportedEncryptionTypes`
180+
181+
### Cause
182+
183+
If the `SupportedEncryptionTypes` registry key is configured with a value that does **not include AES**, Windows will only allow the encryption types specified in the bitmask. For example, the value `0x7` indicates that the client supports only the following Kerberos encryption types:
184+
185+
- DES_CBC_CRC
186+
- DES_CBC_MD5
187+
- RC4_HMAC
188+
189+
Because Entra Kerberos always encrypts service tickets with **AES-256 (AES256-CTS-HMAC-SHA1-96)**, mounts will fail if AES isn't included in the supported encryption types for the account or machine.
190+
191+
> [!NOTE]
192+
> AES encryption is enabled by default on modern Windows operating systems. If the `SupportedEncryptionTypes` registry key isn't configured, Windows will automatically negotiate AES when available.
193+
194+
### Solution
195+
196+
To successfully mount Azure file shares using Entra Kerberos, AES-256 must be included in the supported encryption types.
197+
198+
Use one of the following options:
199+
200+
#### Option 1: Remove the registry key (recommended if not intentionally configured)
201+
202+
If the encryption types weren't deliberately restricted:
203+
204+
1. Delete the registry key: `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\SupportedEncryptionTypes`
205+
1. Reboot the computer.
206+
207+
After rebooting, retry mounting the file share.
208+
209+
> [!TIP]
210+
> Removing the key restores Windows default behavior, allowing Active Directory to automatically negotiate AES for Kerberos tickets.
211+
212+
#### Option 2: Explicitly enable AES-256 using Group Policy
213+
214+
If your organization requires explicitly configured Kerberos encryption types:
215+
216+
1. Press **Win + R**, type `gpedit.msc`, and select **Enter**.
217+
1. Navigate to: **Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options**
218+
1. Open **Network Security: Configure encryption types allowed for Kerberos**.
219+
1. Enable the following encryption types:
220+
- **AES256_HMAC_SHA1**
221+
- **AES128_HMAC_SHA1** (optional)
222+
1. Apply the change and reboot the computer.
223+
224+
After rebooting, retry mounting the file share.
225+
226+
> [!IMPORTANT]
227+
> Entra Kerberos requires **AES256_HMAC_SHA1** to successfully mount Azure file shares. RC4 or DES-only configurations will fail.
228+
> To understand more about registry keys, see [Decrypting the Selection of Supported Kerberos Encryption Types](https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/decrypting-the-selection-of-supported-kerberos-encryption-types/1628797).
229+
176230
## Unable to configure directory/file level permissions (Windows ACLs) with Windows File Explorer
177231
178232
### Symptom
179233
180-
You might experience one of the symptoms described below when trying to configure Windows ACLs with File Explorer on a mounted file share:
181-
- After you click on **Edit permission** under the Security tab, the Permission wizard doesn't load.
234+
You might experience one of the symptoms described below when trying to configure Windows ACLs with Windows File Explorer on a mounted file share:
235+
236+
- After you click on **Edit permission** under the **Security** tab, the Permission wizard doesn't load.
182237
- When you try to select a new user or group, the domain location doesn't display the right AD DS domain.
183238
- You're using multiple AD forests and get the following error message: "The Active Directory domain controllers required to find the selected objects in the following domains are not available. Ensure the Active Directory domain controllers are available, and try to select the objects again."
184239

0 commit comments

Comments
 (0)