Skip to content

Commit 6c8b6da

Browse files
committed
updates to Azure AD DS article
1 parent b27f166 commit 6c8b6da

File tree

2 files changed

+8
-2
lines changed

2 files changed

+8
-2
lines changed

articles/storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Before you enable Azure AD DS over SMB for Azure file shares, make sure you've c
5252
To access an Azure file share by using Azure AD credentials from a VM, your VM must be domain-joined to Azure AD DS. For more information about how to domain-join a VM, see [Join a Windows Server virtual machine to a managed domain](../../active-directory-domain-services/join-windows-vm.md). Azure AD DS authentication over SMB with Azure file shares is supported only on Azure VMs running on OS versions above Windows 7 or Windows Server 2008 R2.
5353

5454
> [!NOTE]
55-
> Non-domain-joined VMs can access Azure file shares using Azure AD DS authentication only if the VM has line-of-sight to the domain controllers for Azure AD DS, which are located in Azure. This requires either site-to-site or point-to-site VPN.
55+
> Non-domain-joined VMs can access Azure file shares using Azure AD DS authentication only if the VM has line-of-sight to the domain controllers for Azure AD DS. Usually this requires either site-to-site or point-to-site VPN.
5656
5757
1. **Select or create an Azure file share.**
5858

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: khdownie
66
ms.service: storage
77
ms.topic: include
8-
ms.date: 11/01/2022
8+
ms.date: 11/29/2022
99
ms.author: kendownie
1010
ms.custom: include file, devx-track-azurecli, devx-track-azurepowershell
1111
---
@@ -139,3 +139,9 @@ if ($connectTestResult.TcpTestSucceeded) {
139139
Write-Error -Message "Unable to reach the Azure storage account via port 445. Check to make sure your organization or ISP is not blocking port 445, or use Azure P2S VPN, Azure S2S VPN, or Express Route to tunnel SMB traffic over a different port."
140140
}
141141
```
142+
143+
## Mount the file share from a non-domain-joined VM
144+
145+
Non-domain-joined VMs can access Azure file shares using Azure AD DS authentication only if the VM has line-of-sight to the domain controllers for Azure AD DS, which are located in Azure. This usually requires setting up a site-to-site or point-to-site VPN to allow this connectivity. The user accessing the file share must have an identity and credentials (an Azure AD identity synced from Azure AD to Azure AD DS) in the Azure AD DS managed domain.
146+
147+
When mounting the file share, the user must provide explicit credentials such as **DOMAINNAME\username** where DOMAINNAME is the Azure AD DS domain and username is the identity’s user name in Azure AD DS. This will help route Kerberos ticket requests from the client to the correct domain controller in the Azure AD DS domain.

0 commit comments

Comments
 (0)