Skip to content

Commit 78649ad

Browse files
Merge pull request #219802 from khdownie/kendownie112922-2
updates to Azure AD DS article
2 parents 21206ca + 9ecb69f commit 78649ad

File tree

2 files changed

+10
-4
lines changed

2 files changed

+10
-4
lines changed

articles/storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Before you enable Azure AD DS over SMB for Azure file shares, make sure you've c
5252
To access an Azure file share by using Azure AD credentials from a VM, your VM must be domain-joined to Azure AD DS. For more information about how to domain-join a VM, see [Join a Windows Server virtual machine to a managed domain](../../active-directory-domain-services/join-windows-vm.md). Azure AD DS authentication over SMB with Azure file shares is supported only on Azure VMs running on OS versions above Windows 7 or Windows Server 2008 R2.
5353

5454
> [!NOTE]
55-
> Non-domain-joined VMs can access Azure file shares using Azure AD DS authentication only if the VM has line-of-sight to the domain controllers for Azure AD DS, which are located in Azure. This requires either site-to-site or point-to-site VPN.
55+
> Non-domain-joined VMs can access Azure file shares using Azure AD DS authentication only if the VM has line-of-sight to the domain controllers for Azure AD DS. Usually this requires either site-to-site or point-to-site VPN.
5656
5757
1. **Select or create an Azure file share.**
5858

@@ -181,10 +181,10 @@ Get-ADUser $userObject -properties KerberosEncryptionType
181181

182182
[!INCLUDE [storage-files-aad-permissions-and-mounting](../../../includes/storage-files-aad-permissions-and-mounting.md)]
183183

184-
You've now successfully enabled Azure AD DS authentication over SMB and assigned a custom role that provides access to an Azure file share with an Azure AD identity. To grant additional users access to your file share, follow the instructions in [Assign share-level permissions to an Azure AD identity](#assign-share-level-permissions-to-an-azure-ad-identity) and [Configure Windows ACLs](#configure-windows-acls).
185-
186184
## Next steps
187185

186+
To grant additional users access to your file share, follow the instructions in [Assign share-level permissions to an Azure AD identity](#assign-share-level-permissions-to-an-azure-ad-identity) and [Configure Windows ACLs](#configure-windows-acls).
187+
188188
For more information about identity-based authentication for Azure Files, see these resources:
189189

190190
- [Overview of Azure Files identity-based authentication support for SMB access](storage-files-active-directory-overview.md)

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: khdownie
66
ms.service: storage
77
ms.topic: include
8-
ms.date: 11/01/2022
8+
ms.date: 11/29/2022
99
ms.author: kendownie
1010
ms.custom: include file, devx-track-azurecli, devx-track-azurepowershell
1111
---
@@ -139,3 +139,9 @@ if ($connectTestResult.TcpTestSucceeded) {
139139
Write-Error -Message "Unable to reach the Azure storage account via port 445. Check to make sure your organization or ISP is not blocking port 445, or use Azure P2S VPN, Azure S2S VPN, or Express Route to tunnel SMB traffic over a different port."
140140
}
141141
```
142+
143+
## Mount the file share from a non-domain-joined VM
144+
145+
Non-domain-joined VMs can access Azure file shares using Azure AD DS authentication only if the VM has line-of-sight to the domain controllers for Azure AD DS, which are located in Azure. This usually requires setting up a site-to-site or point-to-site VPN to allow this connectivity. The user accessing the file share must have an identity and credentials (an Azure AD identity synced from Azure AD to Azure AD DS) in the Azure AD DS managed domain.
146+
147+
When mounting the file share, the user must provide explicit credentials such as **DOMAINNAME\username** where DOMAINNAME is the Azure AD DS domain and username is the identity’s user name in Azure AD DS. This will help route Kerberos ticket requests from the client to the correct domain controller in the Azure AD DS domain.

0 commit comments

Comments
 (0)