Skip to content

Commit c9da093

Browse files
authored
Clarify WinHTTP service requirements in troubleshooting
1 parent a1c718b commit c9da093

1 file changed

Lines changed: 18 additions & 24 deletions

File tree

support/azure/azure-storage/files/security/files-troubleshoot-smb-authentication.md

Lines changed: 18 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure Files identity-based authentication and authorization
33
description: Troubleshoot problems using identity-based authentication to connect to SMB Azure file shares and see possible resolutions.
44
ms.service: azure-file-storage
55
ms.custom: sap:Security, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
6-
ms.date: 12/05/2025
6+
ms.date: 02/05/2026
77
ms.reviewer: kendownie, v-surmaini, v-weizhu
88
---
99
# Troubleshoot Azure Files identity-based authentication and authorization issues (SMB)
@@ -192,15 +192,15 @@ Second, you can run the `Debug-AzStorageAccountAuth` cmdlet to perform a set of
192192
The cmdlet performs these checks in sequence and provides guidance for failures:
193193
194194
1. `CheckPort445Connectivity`: Check if port 445 is opened for SMB connection. If port 445 isn't open, use the troubleshooting tool [AzFileDiagnostics](https://github.com/Azure-Samples/azure-files-samples/tree/master/AzFileDiagnostics/Windows) for connectivity issues with Azure Files.
195-
2. `CheckAADConnectivity`: Check for Entra connectivity. SMB mounts with Kerberos authentication can fail if the client can't reach out to Entra. If this check fails, it indicates that there is a networking error (perhaps a firewall or VPN issue).
196-
3. `CheckEntraObject`: Confirm that there is an object in the Entra that represents the storage account and has the correct service principal name (SPN). If the SPN isn't correctly set up, disable and re-enable Entra Kerberos authentication on the storage account.
197-
4. `CheckRegKey`: Check if the `CloudKerberosTicketRetrieval` registry key is enabled. This registry key is required for Entra Kerberos authentication.
198-
5. `CheckRealmMap`: Check if the user has [configured any realm mappings](/azure/storage/files/storage-files-identity-auth-hybrid-identities-enable#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds) that would join the account to another Kerberos realm than `KERBEROS.MICROSOFTONLINE.COM`.
199-
6. `CheckAdminConsent`: Check if the Entra service principal has been [granted admin consent](/azure/storage/files/storage-files-identity-auth-hybrid-identities-enable#grant-admin-consent-to-the-new-service-principal) for the Microsoft Graph permissions that are required to get a Kerberos ticket.
200-
7. `CheckWinHttpAutoProxySvc`: Checks for the WinHTTP Web Proxy Auto-Discovery Service (WinHttpAutoProxySvc) that's required for Microsoft Entra Kerberos authentication. Its state should be set to `Running`.
201-
8. `CheckIpHlpScv`: Check for the IP Helper service (iphlpsvc) that's required for Microsoft Entra Kerberos authentication. Its state should be set to `Running`.
202-
9. `CheckFiddlerProxy`: Check if a Fiddler proxy that prevents Microsoft Entra Kerberos authentication exists.
203-
10. `CheckEntraJoinType`: Check if the machine is Entra domain joined or hybrid Entra domain Joined. It is a prerequisite for Microsoft Entra Kerberos authentication.
195+
1. `CheckAADConnectivity`: Check for Entra connectivity. SMB mounts with Kerberos authentication can fail if the client can't reach out to Entra. If this check fails, it indicates that there is a networking error (perhaps a firewall or VPN issue).
196+
1. `CheckEntraObject`: Confirm that there is an object in the Entra that represents the storage account and has the correct service principal name (SPN). If the SPN isn't correctly set up, disable and re-enable Entra Kerberos authentication on the storage account.
197+
1. `CheckRegKey`: Check if the `CloudKerberosTicketRetrieval` registry key is enabled. This registry key is required for Entra Kerberos authentication.
198+
1. `CheckRealmMap`: Check if the user has [configured any realm mappings](/azure/storage/files/storage-files-identity-auth-hybrid-identities-enable#configure-coexistence-with-storage-accounts-using-on-premises-ad-ds) that would join the account to another Kerberos realm than `KERBEROS.MICROSOFTONLINE.COM`.
199+
1. `CheckAdminConsent`: Check if the Entra service principal has been [granted admin consent](/azure/storage/files/storage-files-identity-auth-hybrid-identities-enable#grant-admin-consent-to-the-new-service-principal) for the Microsoft Graph permissions that are required to get a Kerberos ticket.
200+
1. `CheckWinHttpAutoProxySvc`: Checks for the WinHTTP Web Proxy Auto-Discovery Service (WinHttpAutoProxySvc) that's required for Microsoft Entra Kerberos authentication. Its state should be set to `Running`. For security reasons, you may optionally [disable Web Proxy Auto-Discovery (WPAD)](/troubleshoot/windows-server/networking/disable-http-proxy-auth-features#how-to-disable-wpad) via registry keys. However, you shouldn't disable the the entire `WinHttpAutoProxySvc` service, as it is responsible for a host of other functionalities, including Kerberos Key Distribution Center Proxy (KDC Proxy) requests.
201+
1. `CheckIpHlpScv`: Check for the IP Helper service (iphlpsvc) that's required for Microsoft Entra Kerberos authentication. Its state should be set to `Running`.
202+
1. `CheckFiddlerProxy`: Check if a Fiddler proxy that prevents Microsoft Entra Kerberos authentication exists.
203+
1. `CheckEntraJoinType`: Check if the machine is Entra domain joined or hybrid Entra domain Joined. It is a prerequisite for Microsoft Entra Kerberos authentication.
204204
205205
If you just want to run a subselection of the previous checks, you can use the `-Filter` parameter, along with a comma-separated list of checks to run.
206206
@@ -524,27 +524,21 @@ This is a Windows client limitation and is not caused by Azure Files or Microsof
524524
**Option one**: Signing out and signing back in to Windows restores access by fetching a new PRT, which includes a refreshed Ticket Granting Ticket (TGT) and KDC proxy configuration. However, this results in a poor user experience.
525525

526526
**Option two**: Configure a Group Policy setting to persist the KDC proxy configuration on the client, reducing authentication interruptions caused by network changes.
527-
1. Configure KDC proxy settings using Group Policy
528-
2. Open Group Policy Management and edit the applicable policy
529-
3. Navigate to:
530-
**Administrative Templates** > **System** > **Kerberos** > **Specify KDC proxy servers for Kerberos clients**
531-
4. Select **Enabled**
532-
5. Under Options, select Show to open the Show Contents dialog box.
533-
6. Add the following mapping, replacing your_Azure_AD_tenant_id with your Microsoft Entra tenant ID
527+
1. Configure KDC proxy settings using Group Policy.
528+
2. Open Group Policy Management and edit the applicable policy.
529+
3. Navigate to: **Administrative Templates** > **System** > **Kerberos** > **Specify KDC proxy servers for Kerberos clients**
530+
4. Select **Enabled**.
531+
5. Under **Options**, select **Show** to open the Show Contents dialog box.
532+
6. Add the following mapping, replacing `Microsoft_Entra_tenant_id` with your Microsoft Entra tenant ID. Include the space after https and before the closing /.
534533

535534
|Value name |Value |
536535
|-----------|--------------|
537-
| KERBEROS.MICROSOFTONLINE.COM| <https login.microsoftonline.com:443:your_Azure_AD_tenant_id/kerberos /> |
538-
539-
> [!NOTE]
540-
> Include the space after https and before the closing /.
536+
| KERBEROS.MICROSOFTONLINE.COM| <https login.microsoftonline.com:443:your_Microsoft_Entra_tenant_id/kerberos /> |
541537

542538
7. Select **OK**, then select **Apply**.
543539

544540
After this policy is applied, Windows clients retain the KDC proxy configuration across network changes, reducing authentication disruptions.
545541

546-
547-
548542
## Authentication stops after approximately 10 hours when using Microsoft Entra Kerberos
549543

550544
### Symptom
@@ -569,7 +563,7 @@ With cloud trust configured, Windows clients obtain their TGT from AD DS instead
569563
This mitigation applies only to clients that are:
570564
- AD DS domain joined, or
571565
- Hybrid Microsoft Entra joined
572-
- Cloud-native (Microsoft Entra–only) clients cannot use this workaround.
566+
- Cloud-native (Microsoft Entra–only) clients can't use this workaround.
573567

574568
To apply this mitigation, configure a cloud trust between on-premises AD DS and Microsoft Entra ID for accessing Azure Files. For step-by-step guidance, see [Configure a cloud trust for Azure Files authentication](/azure/storage/files/storage-files-identity-auth-hybrid-cloud-trust).
575569

0 commit comments

Comments
 (0)