Skip to content

Commit e3fcd82

Browse files
Merge pull request #232265 from khdownie/kendownie032723
AAD Kerberos instructions for privatelink
2 parents 78b938b + e088ddc commit e3fcd82

File tree

1 file changed

+23
-2
lines changed

1 file changed

+23
-2
lines changed

articles/storage/files/files-troubleshoot-smb-authentication.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Troubleshoot problems using identity-based authentication to connec
44
author: khdownie
55
ms.service: storage
66
ms.topic: troubleshooting
7-
ms.date: 02/21/2023
7+
ms.date: 03/28/2023
88
ms.author: kendownie
99
ms.subservice: files
1010
---
@@ -183,7 +183,7 @@ After enabling Azure AD Kerberos authentication, you'll need to explicitly grant
183183

184184
## Potential errors when enabling Azure AD Kerberos authentication for hybrid users
185185

186-
You might encounter the following errors when trying to enable Azure AD Kerberos authentication for hybrid user accounts.
186+
You might encounter the following errors when enabling Azure AD Kerberos authentication for hybrid user accounts.
187187

188188
### Error - Grant admin consent disabled
189189

@@ -320,6 +320,27 @@ If you don't want to rotate the service principal password every six months, you
320320

321321
Once you've reconfigured Azure AD Kerberos, the new experience will auto-create and manage the newly created application.
322322

323+
### Error 1326 - The username or password is incorrect when using private link
324+
325+
If you're connecting to a storage account via a private endpoint/private link using Azure AD Kerberos authentication, when attempting to mount a file share via `net use` or other method, the client is prompted for credentials. The user will likely type their credentials in, but the credentials are rejected.
326+
327+
#### Cause
328+
329+
This is because the SMB client has tried to use Kerberos but failed, so it falls back to using NTLM authentication, which Azure Files doesn't support. The client can't get a Kerberos ticket to the storage account because the private link FQDN isn't registered to any existing Azure AD application.
330+
331+
#### Solution
332+
333+
The solution is to add the privateLink FQDN to the storage account's Azure AD application before you mount the file share. You can add the required identifierUris to the application object using the [Azure portal](https://portal.azure.com) by following these steps.
334+
335+
1. Open **Azure Active Directory**.
336+
1. Select **App registrations** in the left pane.
337+
1. Select **All Applications**.
338+
1. Select the application with the name matching **[Storage Account] $storageAccountName.file.core.windows.net**.
339+
1. Select **Manifest** in the left pane.
340+
1. Copy and paste the existing content so you have a duplicate copy. Replace all instances of `<storageaccount>.file.core.windows.net` with `<storageaccount>.privatelink.file.core.windows.net`.
341+
1. Review the content and select **Save** to update the application object with the new identifierUris.
342+
1. Retry mounting the share.
343+
323344
## Need help?
324345
If you still need help, [contact support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade) to get your problem resolved quickly.
325346

0 commit comments

Comments
 (0)