Skip to content

Commit 45a82c3

Browse files
authored
Update storage-files-aad-permissions-and-mounting.md
1 parent 6935637 commit 45a82c3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
154154

155155
## Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain
156156

157-
Non-domain-joined VMs or VMs that are joined to a different domain than the storage account can access Azure file shares using Microsoft Entra Domain Services authentication only if the VM has line-of-sight to the domain controllers for Microsoft Entra Domain Services, which are located in Azure. This usually requires setting up a site-to-site or point-to-site VPN to allow this connectivity. The user accessing the file share must have an identity and credentials (a Microsoft Entra identity synced from Microsoft Entra ID to Microsoft Entra Domain Services) in the Microsoft Entra Domain Services managed domain.
157+
Non-domain-joined VMs or VMs that are joined to a different domain than the storage account can access Azure file shares using Microsoft Entra Domain Services authentication only if the VM has unimpeded network connectivity to the domain controllers for Microsoft Entra Domain Services, which are located in Azure. This usually requires setting up a site-to-site or point-to-site VPN. The user accessing the file share must have an identity and credentials (a Microsoft Entra identity synced from Microsoft Entra ID to Microsoft Entra Domain Services) in the Microsoft Entra Domain Services managed domain.
158158

159159
To mount a file share from a non-domain-joined VM, the user must either:
160160

0 commit comments

Comments
 (0)