Skip to content

Commit 5124d0a

Browse files
Merge pull request #246256 from pgangal-git/patch-1
Update storage-files-identity-ad-ds-mount-file-share.md
2 parents fa39931 + d27796c commit 5124d0a

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

articles/storage/files/storage-files-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ ms.topic: conceptual
107107

108108
### Identity-based authentication
109109
* <a id="ad-support-devices"></a>
110-
**Does Azure Active Directory Domain Services (Azure AD DS) support SMB access using Azure AD credentials from devices joined to or registered with Azure AD?**
110+
**Does Azure Active Directory Services (Azure AD DS) support SMB access using Azure AD credentials from devices joined to or registered with Azure AD?**
111111

112112
No, this scenario isn't supported.
113113

@@ -118,7 +118,7 @@ ms.topic: conceptual
118118

119119
As an alternative to CNAME, you can use DFS Namespaces with SMB Azure file shares. To learn more, see [How to use DFS Namespaces with Azure Files](files-manage-namespaces.md).
120120

121-
As a workaround for mounting the file share, see the instructions in [Mount the file share from a non-domain-joined VM](storage-files-identity-ad-ds-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm).
121+
As a workaround for mounting the file share, see the instructions in [Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain](storage-files-identity-ad-ds-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm-or-a-vm-joined-to-a-different-ad-domain).
122122

123123
* <a id="ad-vm-subscription"></a>
124124
**Can I access Azure file shares with Azure AD credentials from a VM under a different subscription?**

articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
5959

6060
If you run into issues, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#unable-to-mount-azure-file-shares-with-ad-credentials).
6161

62-
## Mount the file share from a non-domain-joined VM
62+
## Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain
6363

6464
Non-domain-joined VMs or VMs that are joined to a different AD domain than the storage account can access Azure file shares if they have line-of-sight to the domain controllers and provide explicit credentials. The user accessing the file share must have an identity and credentials in the AD domain that the storage account is joined to.
6565

@@ -73,4 +73,4 @@ net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /use
7373

7474
## Next steps
7575

76-
If the identity you created in AD DS to represent the storage account is in a domain or OU that enforces password rotation, you might need to [update the password of your storage account identity in AD DS](storage-files-identity-ad-ds-update-password.md).
76+
If the identity you created in AD DS to represent the storage account is in a domain or OU that enforces password rotation, you might need to [update the password of your storage account identity in AD DS](storage-files-identity-ad-ds-update-password.md).

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Before you enable AD DS authentication for Azure file shares, make sure you've c
5656

5757
- Domain-join an on-premises machine or an Azure VM to on-premises AD DS. For information about how to domain-join, refer to [Join a Computer to a Domain](/windows-server/identity/ad-fs/deployment/join-a-computer-to-a-domain).
5858

59-
If a machine isn't domain joined, you can still use AD DS for authentication if the machine has line of sight to the on-premises AD domain controller and the user provides explicit credentials. For more information, see [Mount the file share from a non-domain-joined VM](storage-files-identity-ad-ds-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm).
59+
If a machine isn't domain joined, you can still use AD DS for authentication if the machine has line of sight to the on-premises AD domain controller and the user provides explicit credentials. For more information, see [Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain](storage-files-identity-ad-ds-mount-file-share.md#mount-the-file-share-from-a-non-domain-joined-vm-or-a-vm-joined-to-a-different-ad-domain).
6060

6161
- Select or create an Azure storage account. For optimal performance, we recommend that you deploy the storage account in the same region as the client from which you plan to access the share. Then, [mount the Azure file share](storage-how-to-use-files-windows.md) with your storage account key. Mounting with the storage account key verifies connectivity.
6262

0 commit comments

Comments
 (0)