You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md
+32-3Lines changed: 32 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ author: khdownie
5
5
ms.service: storage
6
6
ms.subservice: files
7
7
ms.topic: how-to
8
-
ms.date: 11/09/2022
8
+
ms.date: 01/24/2023
9
9
ms.author: kendownie
10
10
ms.custom: engagement-fy23
11
11
recommendations: false
12
12
---
13
13
14
-
# Mount a file share from a domain-joined VM
14
+
# Mount an Azure file share
15
15
16
16
Before you begin this article, make sure you've read [configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md).
17
17
@@ -33,7 +33,7 @@ Before you can mount the Azure file share, make sure you've gone through the fol
33
33
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you've disconnected the share, removed the persistent credentials of the storage account key, and are currently using AD DS credentials for authentication. For instructions on how to remove cached credentials with storage account key and delete existing SMB connections before initializing new connection with Azure AD or AD credentials, follow the two-step process on the [FAQ page](./storage-files-faq.md#ad-ds--azure-ad-ds-authentication).
34
34
- Your client must have line of sight to your AD DS. If your machine or VM is outside of the network managed by your AD DS, you'll need to enable VPN to reach AD DS for authentication.
35
35
36
-
## Mount the file share
36
+
## Mount the file share from a domain-joined VM
37
37
38
38
Run the PowerShell script below or [use the Azure portal](storage-files-quick-create-use-windows.md#map-the-azure-file-share-to-a-windows-drive) to persistently mount the Azure file share and map it to drive Z: on Windows. If Z: is already in use, replace it with an available drive letter. The script will check to see if this storage account is accessible via TCP port 445, which is the port SMB uses. Remember to replace the placeholder values with your own values. For more information, see [Use an Azure file share with Windows](storage-how-to-use-files-windows.md).
39
39
@@ -49,8 +49,37 @@ if ($connectTestResult.TcpTestSucceeded) {
49
49
}
50
50
```
51
51
52
+
You can also use the `net-use` command from a Windows prompt to mount the file share. Remember to replace `<YourStorageAccountName>` and `<FileShareName>` with your own values.
53
+
54
+
```
55
+
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
56
+
```
57
+
52
58
If you run into issues mounting with AD DS credentials, refer to [Unable to mount Azure Files with AD credentials](storage-troubleshoot-windows-file-connection-problems.md#unable-to-mount-azure-files-with-ad-credentials) for guidance.
53
59
60
+
## Mount the file share from a non-domain-joined VM
61
+
62
+
Non-domain-joined VMs can access Azure file shares if they have line-of-sight to the domain controllers. The user accessing the file share must have an identity and credentials in the AD domain.
63
+
64
+
To mount a file share from a non-domain-joined VM, the user must either:
65
+
66
+
- Provide explicit credentials such as **DOMAINNAME\username** where **DOMAINNAME** is the AD domain and **username** is the identity’s user name, or
67
+
- Use the notation **username@domainFQDN**, where **domainFQDN** is the fully qualified domain name.
68
+
69
+
Using one of these approaches will allow the client to contact the domain controller to request and receive Kerberos tickets.
70
+
71
+
For example:
72
+
73
+
```
74
+
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<DOMAINNAME\username>
75
+
```
76
+
77
+
or
78
+
79
+
```
80
+
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<username@domainFQDN>
81
+
```
82
+
54
83
## Next steps
55
84
56
85
If the identity you created in AD DS to represent the storage account is in a domain or OU that enforces password rotation, you might need to [update the password of your storage account identity in AD DS](storage-files-identity-ad-ds-update-password.md).
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-identity-auth-active-directory-enable.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ To help you set up identity-based authentication for some common use cases, we p
47
47
|[](https://www.youtube.com/watch?v=jd49W33DxkQ)|[](https://www.youtube.com/watch?v=9S5A1IJqfOQ)|
48
48
49
49
50
-
## Prerequisites
50
+
## Prerequisites
51
51
52
52
Before you enable AD DS authentication for Azure file shares, make sure you've completed the following prerequisites:
53
53
@@ -57,7 +57,7 @@ Before you enable AD DS authentication for Azure file shares, make sure you've c
57
57
58
58
- Domain-join an on-premises machine or an Azure VM to on-premises AD DS. For information about how to domain-join, refer to [Join a Computer to a Domain](/windows-server/identity/ad-fs/deployment/join-a-computer-to-a-domain).
59
59
60
-
If a machine isn't domain joined, you can still use AD DS for authentication if the machine has line of sight to the on-premises AD domain controller and the user types in their AD credentials.
60
+
If a machine isn't domain joined, you can still use AD DS for authentication if the machine has line of sight to the on-premises AD domain controller and the user provides explicit credentials. For more information, see [Mount the file share from a non-domain-joined VM](storage-files-identity-ad-ds-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm).
61
61
62
62
- Select or create an Azure storage account. For optimal performance, we recommend that you deploy the storage account in the same region as the client from which you plan to access the share. Then, [mount the Azure file share](storage-how-to-use-files-windows.md) with your storage account key. Mounting with the storage account key verifies connectivity.
Copy file name to clipboardExpand all lines: includes/storage-files-aad-permissions-and-mounting.md
+26-2Lines changed: 26 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
author: khdownie
6
6
ms.service: storage
7
7
ms.topic: include
8
-
ms.date: 12/07/2022
8
+
ms.date: 01/24/2023
9
9
ms.author: kendownie
10
10
ms.custom: include file, devx-track-azurecli, devx-track-azurepowershell
11
11
---
@@ -144,8 +144,32 @@ if ($connectTestResult.TcpTestSucceeded) {
144
144
}
145
145
```
146
146
147
+
You can also use the `net-use` command from a Windows prompt to mount the file share. Remember to replace `<YourStorageAccountName>` and `<FileShareName>` with your own values.
148
+
149
+
```
150
+
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
151
+
```
152
+
147
153
## Mount the file share from a non-domain-joined VM
148
154
149
155
Non-domain-joined VMs can access Azure file shares using Azure AD DS authentication only if the VM has line-of-sight to the domain controllers for Azure AD DS, which are located in Azure. This usually requires setting up a site-to-site or point-to-site VPN to allow this connectivity. The user accessing the file share must have an identity and credentials (an Azure AD identity synced from Azure AD to Azure AD DS) in the Azure AD DS managed domain.
150
156
151
-
When mounting the file share, the user must provide explicit credentials such as **DOMAINNAME\username** where DOMAINNAME is the Azure AD DS domain and username is the identity’s user name in Azure AD DS. This will help route Kerberos ticket requests from the client to the correct domain controller in the Azure AD DS domain.
157
+
To mount a file share from a non-domain-joined VM, the user must either:
158
+
159
+
- Provide explicit credentials such as **DOMAINNAME\username** where **DOMAINNAME** is the Azure AD DS domain and **username** is the identity’s user name in Azure AD DS, or
160
+
- Use the notation **username@domainFQDN**, where **domainFQDN** is the fully qualified domain name.
161
+
162
+
Using one of these approaches will allow the client to contact the domain controller in the Azure AD DS domain to request and receive Kerberos tickets.
163
+
164
+
For example:
165
+
166
+
```
167
+
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<DOMAINNAME\username>
168
+
```
169
+
170
+
or
171
+
172
+
```
173
+
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<username@domainFQDN>
0 commit comments