Skip to content

Commit 5fce78a

Browse files
authored
Update files-troubleshoot-smb-authentication.md
1 parent 9e4b431 commit 5fce78a

1 file changed

Lines changed: 21 additions & 4 deletions

File tree

support/azure/azure-storage/files/security/files-troubleshoot-smb-authentication.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure Files identity-based authentication and authorization
33
description: Troubleshoot problems using identity-based authentication to connect to SMB Azure file shares and see possible resolutions.
44
ms.service: azure-file-storage
55
ms.custom: sap:Security, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
6-
ms.date: 11/15/2024
6+
ms.date: 02/10/2025
77
ms.reviewer: kendownie, v-surmaini, v-weizhu
88
---
99
# Troubleshoot Azure Files identity-based authentication and authorization issues (SMB)
@@ -75,9 +75,17 @@ First, make sure that you've followed the steps to [enable Azure Files AD DS Aut
7575

7676
Second, try [mounting Azure file share with storage account key](/azure/storage/files/storage-how-to-use-files-windows). If the share fails to mount, download [AzFileDiagnostics](https://github.com/Azure-Samples/azure-files-samples/tree/master/AzFileDiagnostics/Windows) to help you validate the client running environment. AzFileDiagnostics can detect incompatible client configurations that might cause access failure for Azure Files, give prescriptive guidance on self-fix, and collect the diagnostics traces.
7777

78-
Third, you can run the `Debug-AzStorageAccountAuth` cmdlet to conduct a set of basic checks on your AD configuration with the logged-on AD user. This cmdlet is supported on [AzFilesHybrid v0.1.2+ version](https://github.com/Azure-Samples/azure-files-samples/releases). You need to run this cmdlet with an AD user that has owner permission on the target storage account.
78+
Third, you can run the `Debug-AzStorageAccountAuth` cmdlet to conduct a set of basic checks on your AD configuration with the logged-on AD user. This cmdlet is supported on [AzFilesHybrid v0.1.2+ version](https://github.com/Azure-Samples/azure-files-samples/releases).
7979

80-
```PowerShell
80+
Sign in to Azure PowerShell interactively as an AD user that has owner permission on the target storage account:
81+
82+
```azurepowershell-interactive
83+
Connect-AzAccount
84+
```
85+
86+
Then run the debug cmdlet:
87+
88+
```azurepowershell-interactive
8189
$ResourceGroupName = "<resource-group-name-here>"
8290
$StorageAccountName = "<storage-account-name-here>"
8391
@@ -132,6 +140,7 @@ Debug-AzStorageAccountAuth `
132140
-FilePath $FilePath `
133141
-Verbose
134142
```
143+
135144
## Unable to mount Azure file shares with Microsoft Entra Kerberos
136145

137146
### Self diagnostics steps
@@ -140,7 +149,15 @@ First, make sure that you've followed the steps to [enable Microsoft Entra Kerbe
140149

141150
Second, you can run the `Debug-AzStorageAccountAuth` cmdlet to perform a set of basic checks. This cmdlet is supported for storage accounts configured for Microsoft Entra Kerberos authentication, on [AzFilesHybrid v0.3.0+ version](https://github.com/Azure-Samples/azure-files-samples/releases).
142151

143-
```PowerShell
152+
Sign in to Azure PowerShell interactively as an AD user that has owner permission on the target storage account:
153+
154+
```azurepowershell-interactive
155+
Connect-AzAccount
156+
```
157+
158+
Then run the debug cmdlet:
159+
160+
```azurepowershell-interactive
144161
$ResourceGroupName = "<resource-group-name-here>"
145162
$StorageAccountName = "<storage-account-name-here>"
146163

0 commit comments

Comments
 (0)