Skip to content

Commit 607dbdd

Browse files
authored
Update storage-troubleshoot-windows-file-connection-problems.md
1 parent 9946216 commit 607dbdd

File tree

1 file changed

+24
-0
lines changed

1 file changed

+24
-0
lines changed

articles/storage/files/storage-troubleshoot-windows-file-connection-problems.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -319,5 +319,29 @@ Currently, you can consider redeploying your AAD DS using a new domain DNS name
319319
- Names cannot begin with a numeric character.
320320
- Names must be from 3 to 63 characters long.
321321

322+
## Unable to mount Azure Files with AD credentials
323+
324+
### Self diagnostics steps
325+
First, make sure that you have followed through all four steps to [enable Azure Files AD Authentication](http://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable).
326+
327+
Second, try [mounting Azure file share with storage account key](http://docs.microsoft.com/azure/storage/files/storage-how-to-use-files-windows). If you failed to mount, download [AzFileDiagnostics.ps1](https://gallery.technet.microsoft.com/Troubleshooting-tool-for-a9fa1fe5) to help you validate the client running environment, detect the incompatible client configuration which would cause access failure for Azure Files, gives prescriptive guidance on self-fix and, collect the diagnostics traces.
328+
329+
Third, you can run the Debug-AzStorageAccountAuth cmdlet to conduct a set of basic checks on your AD configuration with the logged on AD user. This cmdlet is supported on [AzFilesHybrid v0.1.2+ version](http://github.com/Azure-Samples/azure-files-samples/releases). You need to run this command with an AD user that has owner permission on the target storage account.
330+
```PowerShell
331+
$ResourceGroupName = "<resource-group-name-here>"
332+
$StorageAccountName = "<storage-account-name-here>"
333+
334+
Debug-AzStorageAccountAuth -StorageAccountName $StorageAccountName -ResourceGroupName $ResourceGroupName -Verbose
335+
```
336+
The cmdlet performs these checks below in sequence and provides guidance for failures:
337+
1. CheckPort445Connectivity: check that Port 445 is opened for SMB connection
338+
2. CheckDomainJoined: validate that the client machine is domain joined to AD
339+
3. CheckADObject: confirm that the logged on user has a valid representation in AD
340+
4. CheckGetKerberosTicket: attempt to get a Kerberos ticket to connect to the storage account
341+
5. CheckADObjectPasswordIsCorrect: ensure that the password configured on the AD identity that represents the storage account is matching that of the storage account kerb key
342+
6. CheckSidHasAadUser: check that the logged on AD user is synced to Azure AD
343+
344+
We are actively working on extending this diagnostics cmdlet to provide better troubleshooting guidance.
345+
322346
## Need help? Contact support.
323347
If you still need help, [contact support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade) to get your problem resolved quickly.

0 commit comments

Comments
 (0)