Skip to content

Commit d24d765

Browse files
Merge pull request #259335 from khdownie/patch-1
Update storage-files-aad-permissions-and-mounting.md
2 parents 63e98a5 + 45a82c3 commit d24d765

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
154154

155155
## Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain
156156

157-
Non-domain-joined VMs or VMs that are joined to a different domain than the storage account can access Azure file shares using Microsoft Entra Domain Services authentication only if the VM has line-of-sight to the domain controllers for Microsoft Entra Domain Services, which are located in Azure. This usually requires setting up a site-to-site or point-to-site VPN to allow this connectivity. The user accessing the file share must have an identity and credentials (a Microsoft Entra identity synced from Microsoft Entra ID to Microsoft Entra Domain Services) in the Microsoft Entra Domain Services managed domain.
157+
Non-domain-joined VMs or VMs that are joined to a different domain than the storage account can access Azure file shares using Microsoft Entra Domain Services authentication only if the VM has unimpeded network connectivity to the domain controllers for Microsoft Entra Domain Services, which are located in Azure. This usually requires setting up a site-to-site or point-to-site VPN. The user accessing the file share must have an identity and credentials (a Microsoft Entra identity synced from Microsoft Entra ID to Microsoft Entra Domain Services) in the Microsoft Entra Domain Services managed domain.
158158

159159
To mount a file share from a non-domain-joined VM, the user must either:
160160

0 commit comments

Comments
 (0)