Skip to content

Commit ea05ffc

Browse files
committed
updating non domain joined VM
1 parent cd65ad6 commit ea05ffc

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 04/03/2023
8+
ms.date: 04/07/2023
99
ms.author: kendownie
1010
ms.custom: engagement-fy23
1111
recommendations: false
@@ -59,7 +59,7 @@ If you run into issues, refer to [Unable to mount Azure file shares with AD cred
5959

6060
## Mount the file share from a non-domain-joined VM
6161

62-
Non-domain-joined VMs can access Azure file shares if they have line-of-sight to the domain controllers. The user accessing the file share must have an identity and credentials in the AD domain.
62+
Non-domain-joined VMs or VMs that are joined to a different AD domain than the storage account can access Azure file shares if they have line-of-sight to the domain controllers and provide explicit credentials. The user accessing the file share must have an identity and credentials in the AD domain that the storage account is joined to.
6363

6464
To mount a file share from a non-domain-joined VM, use the notation **username@domainFQDN**, where **domainFQDN** is the fully qualified domain name. This will allow the client to contact the domain controller to request and receive Kerberos tickets. You can get the value of **domainFQDN** by running `(Get-ADDomain).Dnsroot` in Active Directory PowerShell.
6565

0 commit comments

Comments
 (0)