You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enhance troubleshooting for SMB authentication errors
Added troubleshooting steps for various Microsoft Entra Kerberos authentication errors, including URI requirements and service principal password expiration.
Copy file name to clipboardExpand all lines: support/azure/azure-storage/files/security/files-troubleshoot-smb-authentication.md
+109-5Lines changed: 109 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,6 +61,37 @@ Error AadDsTenantNotFound happens when you try to [enable Microsoft Entra Domain
61
61
62
62
Enable Microsoft Entra Domain Services on the Microsoft Entra tenant of the subscription that your storage account is deployed to. You need administrator privileges of the Microsoft Entra tenant to create a managed domain. If you aren't the administrator of the Microsoft Entra tenant, contact the administrator and follow the step-by-step guidance to [create and configure a Microsoft Entra Domain Services managed domain](/azure/active-directory-domain-services/tutorial-create-instance).
63
63
64
+
65
+
## Error: All newly added URIs must contain a tenant verified domain, tenant ID, or app ID
66
+
67
+
### Cause
68
+
69
+
This error occurs during configuration of identity-based authentication for Azure Files when adding a redirect URI or identifier URI that doesn't meet Microsoft Entra ID application security requirements.
70
+
71
+
Microsoft Entra ID enforces restrictions on application identifier URIs and redirect URIs. Newly added URIs must reference one of the following:
72
+
- A tenant-verified custom domain
73
+
- The Microsoft Entra tenant ID
74
+
- The application (client) ID
75
+
76
+
If a URI uses an unverified domain, a `.local` hostname, or an arbitrary URL that is not associated with the tenant, the request is blocked by default tenant policy.
77
+
78
+
This behavior is enforced by Microsoft Entra ID and is not specific to the Azure Files service.
79
+
80
+
For more information, see:
81
+
[Restrictions on identifier URIs of Microsoft Entra applications](/entra/identity-platform/identifier-uri-restrictions)
82
+
[Redirect URI (reply URL) outline and restrictions](/entra/identity-platform/reply-url)
83
+
[Managing custom domain names in your Microsoft Entra ID](/entra/identity/users/domains-manage)
84
+
85
+
### Solution
86
+
When configuring application registration or identity-based authentication for Azure Files, ensure that any redirect URI or identifier URI uses one of the supported formats:
87
+
- Use a tenant-verified custom domain
88
+
- Use the Microsoft Entra tenant ID
89
+
- Use the application (client) ID
90
+
91
+
Do not use unverified domains, `.local` hostnames, or arbitrary URLs, as these will be rejected by Microsoft Entra ID tenant policy.
92
+
If you are unsure which domains are verified in your tenant, review the Custom domain names section in the Microsoft Entra admin center or contact your tenant administrator.
93
+
94
+
64
95
## Unable to mount Azure file shares with AD credentials
###Error - Service principal password has expired in Microsoft Entra ID
436
+
## Error - Service principal password has expired in Microsoft Entra ID
406
437
407
438
If you've previously enabled Microsoft Entra Kerberos authentication through manual limited preview steps, the password for the storage account's service principal is set to expire every six months. Once the password expires, users won't be able to get Kerberos tickets to the file share.
408
439
@@ -418,7 +449,7 @@ Be sure to save domain properties (domainName and domainGUID) before disabling M
418
449
419
450
Once you've reconfigured Microsoft Entra Kerberos, the new experience will auto-create and manage the newly created application.
420
451
421
-
###Error 1326 - The username or password is incorrect when using private link
452
+
## Error 1326 - The username or password is incorrect when using private link
422
453
423
454
If you're connecting to a storage account via a private endpoint/private link using Microsoft Entra Kerberos authentication, when attempting to mount a file share via `net use` or other method, the client is prompted for credentials. The user will likely type their credentials in, but the credentials are rejected.
424
455
@@ -473,17 +504,90 @@ The solution is to add the privateLink FQDN to the storage account's Microsoft E
473
504
1. Update any internal DNS references to point to the private link.
474
505
1. Retry mounting the share.
475
506
476
-
### Error AADSTS50105
507
+
508
+
## Intermittent authentication failures after network changes when using Microsoft Entra Kerberos
509
+
510
+
### Symptom
511
+
512
+
Windows clients that use Microsoft Entra Kerberos authentication to access Azure Files intermittently lose access after a network change (for example, VPN reconnect, Wi-Fi change, sleep or resume). Access may fail until the user signs out and signs back in to Windows.
513
+
514
+
### Cause
515
+
516
+
This issue is caused by a known Windows behavior where certain network changes clear the cached KDC proxy configuration on the client. When the KDC proxy configuration is removed, the client is unable to refresh Kerberos service tickets from Microsoft Entra ID.
517
+
518
+
Although the user’s Primary Refresh Token (PRT) remains valid, the missing KDC proxy configuration prevents the client from acquiring a new service ticket, resulting in authentication failures.
519
+
520
+
This is a Windows client limitation and is not caused by Azure Files or Microsoft Entra ID configuration.
521
+
522
+
### Solution
523
+
524
+
**Option one**: Signing out and signing back in to Windows restores access by fetching a new PRT, which includes a refreshed Ticket Granting Ticket (TGT) and KDC proxy configuration. However, this results in a poor user experience.
525
+
526
+
**Option two**: Configure a Group Policy setting to persist the KDC proxy configuration on the client, reducing authentication interruptions caused by network changes.
527
+
1. Configure KDC proxy settings using Group Policy
528
+
2. Open Group Policy Management and edit the applicable policy
> Include the space after https and before the closing /.
541
+
542
+
7. Select **OK**, then select **Apply**.
543
+
544
+
After this policy is applied, Windows clients retain the KDC proxy configuration across network changes, reducing authentication disruptions.
545
+
546
+
547
+
548
+
## Authentication stops after approximately 10 hours when using Microsoft Entra Kerberos
549
+
550
+
### Symptom
551
+
552
+
Windows clients using Microsoft Entra Kerberos authentication to access Azure Files lose access after approximately 10 hours of continuous use. Access is restored only after the user signs out and signs back in to Windows.
553
+
554
+
### Cause
555
+
556
+
This issue is caused by a known limitation in Microsoft Entra Kerberos authentication. Microsoft Entra ID does not currently support renewal of Ticket Granting Tickets (TGTs).
557
+
558
+
In Microsoft Entra Kerberos scenarios, the TGT is obtained as part of the user’s Primary Refresh Token (PRT). Because TGT renewal is not supported, the client cannot refresh the TGT once it expires. When the TGT expires, the client is unable to acquire new service tickets, resulting in authentication failures.
559
+
560
+
Signing out and signing back in to Windows resolves the issue by obtaining a new PRT, which includes a new TGT.
561
+
This is a known limitation of Microsoft Entra Kerberos and is not caused by Azure Files configuration.
562
+
563
+
### Solution
564
+
565
+
As a mitigation, customers can use cloud trust between on-premises Active Directory Domain Services (AD DS) and Microsoft Entra ID when accessing Azure Files.
566
+
567
+
With cloud trust configured, Windows clients obtain their TGT from AD DS instead of Microsoft Entra ID. AD DS-issued TGTs support renewal, avoiding the expiration behavior seen with Microsoft Entra Kerberos. The AD DS-issued TGT is then exchanged for an Entra referral TGT, which is used to obtain service tickets for Azure Files.
568
+
569
+
This mitigation applies only to clients that are:
570
+
- AD DS domain joined, or
571
+
- Hybrid Microsoft Entra joined
572
+
- Cloud-native (Microsoft Entra–only) clients cannot use this workaround.
573
+
574
+
To apply this mitigation, configure a cloud trust between on-premises AD DS and Microsoft Entra ID for accessing Azure Files. For step-by-step guidance, see: [Configure a cloud trust for Azure Files authentication](files/storage-files-identity-auth-hybrid-cloud-trust?tabs=azure-portal)
575
+
576
+
577
+
578
+
## Error AADSTS50105
579
+
580
+
### Symptom
477
581
478
582
The request was interrupted by the following error AADSTS50105:
479
583
480
584
> Your administrator has configured the application "Enterprise application name" to block users unless they are specifically granted (assigned) access to the application. The signed in user '{EmailHidden}' is blocked because they are not a direct member of a group with access, nor had access directly assigned by an administrator. Please contact your administrator to assign access to this application.
481
585
482
-
####Cause
586
+
### Cause
483
587
484
588
If you set up "assignment required" for the corresponding enterprise application, you won't be able to get a Kerberos ticket, and Microsoft Entra sign-in logs will show an error even though users or groups are assigned to the application.
485
589
486
-
####Solution
590
+
### Solution
487
591
488
592
Don't select **Assignment required for Microsoft Entra application** for the storage account because we don't populate entitlements in the Kerberos ticket that's returned back to the requestor. For more information, see [Error AADSTS50105 - The signed in user is not assigned to a role for the application](../../../entra-id/app-integration/error-code-AADSTS50105-user-not-assigned-role.md).
0 commit comments