Skip to content

Commit dd0d41b

Browse files
authored
Merge pull request #233251 from khdownie/kendownie040323
clarifying non domain joined VM mount
2 parents 20b5520 + 9e007d7 commit dd0d41b

File tree

1 file changed

+5
-16
lines changed

1 file changed

+5
-16
lines changed

articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md

Lines changed: 5 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 01/24/2023
8+
ms.date: 04/03/2023
99
ms.author: kendownie
1010
ms.custom: engagement-fy23
1111
recommendations: false
@@ -30,14 +30,14 @@ Sign in to the client using the credentials of the identity that you granted per
3030

3131
Before you can mount the Azure file share, make sure you've gone through the following prerequisites:
3232

33-
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you've disconnected the share, removed the persistent credentials of the storage account key, and are currently using AD DS credentials for authentication. For instructions on how to remove cached credentials with storage account key and delete existing SMB connections before initializing new connection with Azure AD or AD credentials, follow the two-step process on the [FAQ page](./storage-files-faq.md#ad-ds--azure-ad-ds-authentication).
33+
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you've disconnected the share, removed the persistent credentials of the storage account key, and are currently using AD DS credentials for authentication. For instructions on how to remove cached credentials with storage account key and delete existing SMB connections before initializing a new connection with AD DS or Azure AD credentials, follow the two-step process on the [FAQ page](./storage-files-faq.md#ad-ds--azure-ad-ds-authentication).
3434
- Your client must have line of sight to your AD DS. If your machine or VM is outside of the network managed by your AD DS, you'll need to enable VPN to reach AD DS for authentication.
3535

3636
## Mount the file share from a domain-joined VM
3737

3838
Run the PowerShell script below or [use the Azure portal](storage-files-quick-create-use-windows.md#map-the-azure-file-share-to-a-windows-drive) to persistently mount the Azure file share and map it to drive Z: on Windows. If Z: is already in use, replace it with an available drive letter. The script will check to see if this storage account is accessible via TCP port 445, which is the port SMB uses. Remember to replace the placeholder values with your own values. For more information, see [Use an Azure file share with Windows](storage-how-to-use-files-windows.md).
3939

40-
Always mount Azure file shares using file.core.windows.net, even if you set up a private endpoint for your share. Using CNAME for file share mount isn't supported for identity-based authentication.
40+
Mount Azure file shares using `file.core.windows.net`, even if you set up a private endpoint for your share.
4141

4242
```powershell
4343
$connectTestResult = Test-NetConnection -ComputerName <storage-account-name>.file.core.windows.net -Port 445
@@ -55,27 +55,16 @@ You can also use the `net-use` command from a Windows prompt to mount the file s
5555
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
5656
```
5757

58-
If you run into issues mounting with AD DS credentials, refer to [Unable to mount Azure file shares with AD credentials](files-troubleshoot-smb-authentication.md#unable-to-mount-azure-file-shares-with-ad-credentials).
58+
If you run into issues, refer to [Unable to mount Azure file shares with AD credentials](files-troubleshoot-smb-authentication.md#unable-to-mount-azure-file-shares-with-ad-credentials).
5959

6060
## Mount the file share from a non-domain-joined VM
6161

6262
Non-domain-joined VMs can access Azure file shares if they have line-of-sight to the domain controllers. The user accessing the file share must have an identity and credentials in the AD domain.
6363

64-
To mount a file share from a non-domain-joined VM, the user must either:
65-
66-
- Provide explicit credentials such as **DOMAINNAME\username** where **DOMAINNAME** is the AD domain and **username** is the identity’s user name, or
67-
- Use the notation **username@domainFQDN**, where **domainFQDN** is the fully qualified domain name.
68-
69-
Using one of these approaches will allow the client to contact the domain controller to request and receive Kerberos tickets.
64+
To mount a file share from a non-domain-joined VM, use the notation **username@domainFQDN**, where **domainFQDN** is the fully qualified domain name. This will allow the client to contact the domain controller to request and receive Kerberos tickets. You can get the value of **domainFQDN** by running `(Get-ADDomain).Dnsroot` in Active Directory PowerShell.
7065

7166
For example:
7267

73-
```
74-
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<DOMAINNAME\username>
75-
```
76-
77-
or
78-
7968
```
8069
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<username@domainFQDN>
8170
```

0 commit comments

Comments
 (0)