You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-troubleshoot-windows-file-connection-problems.md
+24Lines changed: 24 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -319,5 +319,29 @@ Currently, you can consider redeploying your AAD DS using a new domain DNS name
319
319
- Names cannot begin with a numeric character.
320
320
- Names must be from 3 to 63 characters long.
321
321
322
+
## Unable to mount Azure Files with AD credentials
323
+
324
+
### Self diagnostics steps
325
+
First, make sure that you have followed through all four steps to [enable Azure Files AD Authentication](http://docs.microsoft.com/azure/storage/files/storage-files-identity-auth-active-directory-enable).
326
+
327
+
Second, try [mounting Azure file share with storage account key](http://docs.microsoft.com/azure/storage/files/storage-how-to-use-files-windows). If you failed to mount, download [AzFileDiagnostics.ps1](https://gallery.technet.microsoft.com/Troubleshooting-tool-for-a9fa1fe5) to help you validate the client running environment, detect the incompatible client configuration which would cause access failure for Azure Files, gives prescriptive guidance on self-fix and, collect the diagnostics traces.
328
+
329
+
Third, you can run the Debug-AzStorageAccountAuth cmdlet to conduct a set of basic checks on your AD configuration with the logged on AD user. This cmdlet is supported on [AzFilesHybrid v0.1.2+ version](http://github.com/Azure-Samples/azure-files-samples/releases). You need to run this command with an AD user that has owner permission on the target storage account.
The cmdlet performs these checks below in sequence and provides guidance for failures:
337
+
1. CheckPort445Connectivity: check that Port 445 is opened for SMB connection
338
+
2. CheckDomainJoined: validate that the client machine is domain joined to AD
339
+
3. CheckADObject: confirm that the logged on user has a valid representation in AD
340
+
4. CheckGetKerberosTicket: attempt to get a Kerberos ticket to connect to the storage account
341
+
5. CheckADObjectPasswordIsCorrect: ensure that the password configured on the AD identity that represents the storage account is matching that of the storage account kerb key
342
+
6. CheckSidHasAadUser: check that the logged on AD user is synced to Azure AD
343
+
344
+
We are actively working on extending this diagnostics cmdlet to provide better troubleshooting guidance.
345
+
322
346
## Need help? Contact support.
323
347
If you still need help, [contact support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade) to get your problem resolved quickly.
0 commit comments