Skip to content

Commit 4908c74

Browse files
Merge pull request #267094 from khdownie/patch-1
Update storage-files-identity-ad-ds-mount-file-share.md
2 parents 1012590 + 56f7430 commit 4908c74

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If you run into issues, see [Unable to mount Azure file shares with AD credentia
5959

6060
## Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain
6161

62-
Non-domain-joined VMs or VMs that are joined to a different AD domain than the storage account can access Azure file shares if they have unimpeded network connectivity to the domain controllers and provide explicit credentials. The user accessing the file share must have an identity and credentials in the AD domain that the storage account is joined to.
62+
Non-domain-joined VMs or VMs that are joined to a different AD domain than the storage account can access Azure file shares if they have unimpeded network connectivity to the domain controllers and provide explicit credentials (username and password). The user accessing the file share must have an identity and credentials in the AD domain that the storage account is joined to.
6363

6464
To mount a file share from a non-domain-joined VM, use the notation **username@domainFQDN**, where **domainFQDN** is the fully qualified domain name. This will allow the client to contact the domain controller to request and receive Kerberos tickets. You can get the value of **domainFQDN** by running `(Get-ADDomain).Dnsroot` in Active Directory PowerShell.
6565

0 commit comments

Comments
 (0)