Skip to content

Commit 7488213

Browse files
committed
even more edits
1 parent 0e93d71 commit 7488213

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Mount Azure file share to an AD DS-joined VM
3-
description: Learn how to mount a file share to your on-premises Active Directory Domain Services-joined machines.
3+
description: Learn how to mount an Azure file share to your on-premises Active Directory Domain Services domain-joined machines.
44
author: khdownie
55
ms.service: storage
66
ms.subservice: files
@@ -13,7 +13,7 @@ ms.author: kendownie
1313

1414
Before you begin this article, make sure you complete the previous article, [configure directory and file level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md).
1515

16-
The process described in this article verifies that your file share and access permissions are set up correctly and that you can access an Azure File share from a domain-joined VM. Share-level Azure role assignment can take some time to take effect.
16+
The process described in this article verifies that your SMB file share and access permissions are set up correctly and that you can access an Azure file share from a domain-joined VM. Share-level role assignment can take some time to take effect.
1717

1818
Sign in to the client by using the credentials that you granted permissions to, as shown in the following image.
1919

@@ -33,6 +33,8 @@ Before you can mount the Azure file share, make sure you've gone through the fol
3333
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you've disconnected the share, removed the persistent credentials of the storage account key, and are currently using AD DS credentials for authentication. For instructions on how to remove cached credentials with storage account key and delete existing SMB connections before initializing new connection with Azure AD or AD credentials, follow the two-step process on the [FAQ page](./storage-files-faq.md#ad-ds--azure-ad-ds-authentication).
3434
- Your client must have line of sight to your AD DS. If your machine or VM is outside of the network managed by your AD DS, you'll need to enable VPN to reach AD DS for authentication.
3535

36+
## Mount the file share
37+
3638
Run the PowerShell script below or [use the Azure portal](storage-files-quick-create-use-windows.md#map-the-azure-file-share-to-a-windows-drive) to persistently mount the Azure file share and map it to drive Z: on Windows. If Z: is already in use, replace it with an available drive letter. The script will check to see if this storage account is accessible via TCP port 445, which is the port SMB uses. Remember to replace the placeholder values with your own values. For more information, see [Use an Azure file share with Windows](storage-how-to-use-files-windows.md).
3739

3840
Always mount Azure file shares using.file.core.windows.net, even if you set up a private endpoint for your share. Using CNAME for file share mount isn't supported for identity-based authentication (AD DS or Azure AD DS).

0 commit comments

Comments
 (0)