Skip to content

Commit 6731a3c

Browse files
authored
Merge pull request #10364 from MicrosoftDocs/rladbsal-patch-9
Enhance troubleshooting for SMB authentication errors
2 parents 232a4ba + 25daa90 commit 6731a3c

1 file changed

Lines changed: 109 additions & 5 deletions

File tree

support/azure/azure-storage/files/security/files-troubleshoot-smb-authentication.md

Lines changed: 109 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,37 @@ Error AadDsTenantNotFound happens when you try to [enable Microsoft Entra Domain
6161

6262
Enable Microsoft Entra Domain Services on the Microsoft Entra tenant of the subscription that your storage account is deployed to. You need administrator privileges of the Microsoft Entra tenant to create a managed domain. If you aren't the administrator of the Microsoft Entra tenant, contact the administrator and follow the step-by-step guidance to [create and configure a Microsoft Entra Domain Services managed domain](/azure/active-directory-domain-services/tutorial-create-instance).
6363

64+
65+
## Error: All newly added URIs must contain a tenant verified domain, tenant ID, or app ID
66+
67+
### Cause
68+
69+
This error occurs during configuration of identity-based authentication for Azure Files when adding a redirect URI or identifier URI that doesn't meet Microsoft Entra ID application security requirements.
70+
71+
Microsoft Entra ID enforces restrictions on application identifier URIs and redirect URIs. Newly added URIs must reference one of the following:
72+
- A tenant-verified custom domain
73+
- The Microsoft Entra tenant ID
74+
- The application (client) ID
75+
76+
If a URI uses an unverified domain, a `.local` hostname, or an arbitrary URL that is not associated with the tenant, the request is blocked by default tenant policy.
77+
78+
This behavior is enforced by Microsoft Entra ID and is not specific to the Azure Files service.
79+
80+
For more information, see:
81+
[Restrictions on identifier URIs of Microsoft Entra applications](/entra/identity-platform/identifier-uri-restrictions)
82+
[Redirect URI (reply URL) outline and restrictions](/entra/identity-platform/reply-url)
83+
[Managing custom domain names in your Microsoft Entra ID](/entra/identity/users/domains-manage)
84+
85+
### Solution
86+
When configuring application registration or identity-based authentication for Azure Files, ensure that any redirect URI or identifier URI uses one of the supported formats:
87+
- Use a tenant-verified custom domain
88+
- Use the Microsoft Entra tenant ID
89+
- Use the application (client) ID
90+
91+
Do not use unverified domains, `.local` hostnames, or arbitrary URLs, as these will be rejected by Microsoft Entra ID tenant policy.
92+
If you are unsure which domains are verified in your tenant, review the Custom domain names section in the Microsoft Entra admin center or contact your tenant administrator.
93+
94+
6495
## Unable to mount Azure file shares with AD credentials
6596

6697
### Self diagnostics steps
@@ -402,7 +433,7 @@ if ($null -ne $application) {
402433

403434
<a name='error---service-principal-password-has-expired-in-azure-ad'></a>
404435

405-
### Error - Service principal password has expired in Microsoft Entra ID
436+
## Error - Service principal password has expired in Microsoft Entra ID
406437

407438
If you've previously enabled Microsoft Entra Kerberos authentication through manual limited preview steps, the password for the storage account's service principal is set to expire every six months. Once the password expires, users won't be able to get Kerberos tickets to the file share.
408439

@@ -418,7 +449,7 @@ Be sure to save domain properties (domainName and domainGUID) before disabling M
418449

419450
Once you've reconfigured Microsoft Entra Kerberos, the new experience will auto-create and manage the newly created application.
420451

421-
### Error 1326 - The username or password is incorrect when using private link
452+
## Error 1326 - The username or password is incorrect when using private link
422453

423454
If you're connecting to a storage account via a private endpoint/private link using Microsoft Entra Kerberos authentication, when attempting to mount a file share via `net use` or other method, the client is prompted for credentials. The user will likely type their credentials in, but the credentials are rejected.
424455

@@ -473,17 +504,90 @@ The solution is to add the privateLink FQDN to the storage account's Microsoft E
473504
1. Update any internal DNS references to point to the private link.
474505
1. Retry mounting the share.
475506

476-
### Error AADSTS50105
507+
508+
## Intermittent authentication failures after network changes when using Microsoft Entra Kerberos
509+
510+
### Symptom
511+
512+
Windows clients that use Microsoft Entra Kerberos authentication to access Azure Files intermittently lose access after a network change (for example, VPN reconnect, Wi-Fi change, sleep or resume). Access may fail until the user signs out and signs back in to Windows.
513+
514+
### Cause
515+
516+
This issue is caused by a known Windows behavior where certain network changes clear the cached KDC proxy configuration on the client. When the KDC proxy configuration is removed, the client is unable to refresh Kerberos service tickets from Microsoft Entra ID.
517+
518+
Although the user’s Primary Refresh Token (PRT) remains valid, the missing KDC proxy configuration prevents the client from acquiring a new service ticket, resulting in authentication failures.
519+
520+
This is a Windows client limitation and is not caused by Azure Files or Microsoft Entra ID configuration.
521+
522+
### Solution
523+
524+
**Option one**: Signing out and signing back in to Windows restores access by fetching a new PRT, which includes a refreshed Ticket Granting Ticket (TGT) and KDC proxy configuration. However, this results in a poor user experience.
525+
526+
**Option two**: Configure a Group Policy setting to persist the KDC proxy configuration on the client, reducing authentication interruptions caused by network changes.
527+
1. Configure KDC proxy settings using Group Policy
528+
2. Open Group Policy Management and edit the applicable policy
529+
3. Navigate to:
530+
**Administrative Templates** > **System** > **Kerberos** > **Specify KDC proxy servers for Kerberos clients**
531+
4. Select **Enabled**
532+
5. Under Options, select Show to open the Show Contents dialog box.
533+
6. Add the following mapping, replacing your_Azure_AD_tenant_id with your Microsoft Entra tenant ID
534+
535+
|Value name |Value |
536+
|-----------|--------------|
537+
| KERBEROS.MICROSOFTONLINE.COM| <https login.microsoftonline.com:443:your_Azure_AD_tenant_id/kerberos /> |
538+
539+
> [!NOTE]
540+
> Include the space after https and before the closing /.
541+
542+
7. Select **OK**, then select **Apply**.
543+
544+
After this policy is applied, Windows clients retain the KDC proxy configuration across network changes, reducing authentication disruptions.
545+
546+
547+
548+
## Authentication stops after approximately 10 hours when using Microsoft Entra Kerberos
549+
550+
### Symptom
551+
552+
Windows clients using Microsoft Entra Kerberos authentication to access Azure Files lose access after approximately 10 hours of continuous use. Access is restored only after the user signs out and signs back in to Windows.
553+
554+
### Cause
555+
556+
This issue is caused by a known limitation in Microsoft Entra Kerberos authentication. Microsoft Entra ID does not currently support renewal of Ticket Granting Tickets (TGTs).
557+
558+
In Microsoft Entra Kerberos scenarios, the TGT is obtained as part of the user’s Primary Refresh Token (PRT). Because TGT renewal is not supported, the client cannot refresh the TGT once it expires. When the TGT expires, the client is unable to acquire new service tickets, resulting in authentication failures.
559+
560+
Signing out and signing back in to Windows resolves the issue by obtaining a new PRT, which includes a new TGT.
561+
This is a known limitation of Microsoft Entra Kerberos and is not caused by Azure Files configuration.
562+
563+
### Solution
564+
565+
As a mitigation, customers can use cloud trust between on-premises Active Directory Domain Services (AD DS) and Microsoft Entra ID when accessing Azure Files.
566+
567+
With cloud trust configured, Windows clients obtain their TGT from AD DS instead of Microsoft Entra ID. AD DS-issued TGTs support renewal, avoiding the expiration behavior seen with Microsoft Entra Kerberos. The AD DS-issued TGT is then exchanged for an Entra referral TGT, which is used to obtain service tickets for Azure Files.
568+
569+
This mitigation applies only to clients that are:
570+
- AD DS domain joined, or
571+
- Hybrid Microsoft Entra joined
572+
- Cloud-native (Microsoft Entra–only) clients cannot use this workaround.
573+
574+
To apply this mitigation, configure a cloud trust between on-premises AD DS and Microsoft Entra ID for accessing Azure Files. For step-by-step guidance, see: [Configure a cloud trust for Azure Files authentication](files/storage-files-identity-auth-hybrid-cloud-trust?tabs=azure-portal)
575+
576+
577+
578+
## Error AADSTS50105
579+
580+
### Symptom
477581

478582
The request was interrupted by the following error AADSTS50105:
479583

480584
> Your administrator has configured the application "Enterprise application name" to block users unless they are specifically granted (assigned) access to the application. The signed in user '{EmailHidden}' is blocked because they are not a direct member of a group with access, nor had access directly assigned by an administrator. Please contact your administrator to assign access to this application.
481585
482-
#### Cause
586+
### Cause
483587

484588
If you set up "assignment required" for the corresponding enterprise application, you won't be able to get a Kerberos ticket, and Microsoft Entra sign-in logs will show an error even though users or groups are assigned to the application.
485589

486-
#### Solution
590+
### Solution
487591

488592
Don't select **Assignment required for Microsoft Entra application** for the storage account because we don't populate entitlements in the Kerberos ticket that's returned back to the requestor. For more information, see [Error AADSTS50105 - The signed in user is not assigned to a role for the application](../../../entra-id/app-integration/error-code-AADSTS50105-user-not-assigned-role.md).
489593

0 commit comments

Comments
 (0)