Skip to content

Commit 13c2463

Browse files
committed
quality report feedback
1 parent 5d707cc commit 13c2463

1 file changed

Lines changed: 15 additions & 13 deletions

File tree

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to enable Active Directory Domain Services authentication
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 03/06/2026
7+
ms.date: 04/03/2026
88
ms.author: kendownie
99
ms.custom: devx-track-azurepowershell
1010
# Customer intent: As an IT administrator, I want to enable Active Directory Domain Services authentication for Azure file shares, so that our domain-joined Windows virtual machines can securely access and manage file shares using existing AD credentials.
@@ -81,7 +81,7 @@ Connect-AzAccount
8181
$SubscriptionId = "<your-subscription-id-here>"
8282
$ResourceGroupName = "<resource-group-name-here>"
8383
$StorageAccountName = "<storage-account-name-here>"
84-
$SamAccountName = "<sam-account-name-here>"
84+
$SamAccountName = "<sam-account-name-here without the trailing '$'>"
8585
$DomainAccountType = "<ComputerAccount|ServiceLogonAccount>" # Default is set as ComputerAccount
8686
# If you don't provide the OU name as an input parameter, the AD identity that represents the
8787
# storage account is created under the root directory.
@@ -115,6 +115,8 @@ Join-AzStorageAccount `
115115
Debug-AzStorageAccountAuth -StorageAccountName $StorageAccountName -ResourceGroupName $ResourceGroupName -Verbose
116116
```
117117

118+
You can now proceed to [confirm the feature is enabled](#confirm-the-feature-is-enabled).
119+
118120
## Option two: Manually perform the enablement actions
119121

120122
If you're unable to use the AzFilesHybrid PowerShell module, you can execute the steps manually by using Active Directory PowerShell.
@@ -194,7 +196,7 @@ Set-AzStorageAccount `
194196
-ActiveDirectoryDomainGuid "<your-guid>" `
195197
-ActiveDirectoryDomainSid "<your-domain-sid>" `
196198
-ActiveDirectoryAzureStorageSid "<your-storage-account-sid>" `
197-
-ActiveDirectorySamAccountName "<your-domain-object-sam-account-name>" `
199+
-ActiveDirectorySamAccountName "<your-domain-object-sam-account-name without the trailing '$'>" `
198200
-ActiveDirectoryAccountType "<your-domain-object-account-type, the value could be 'Computer' or 'User'>"
199201
```
200202

@@ -233,14 +235,6 @@ Set-ADAccountPassword -Identity <domain-object-identity> -Reset -NewPassword $Ne
233235
> [!IMPORTANT]
234236
> If you previously used RC4 encryption and updated the storage account to use AES-256 (recommended), run `klist purge` on the client and then remount the file share to get new Kerberos tickets with AES-256.
235237
236-
### Debugging
237-
238-
If needed, run the `Debug-AzStorageAccountAuth` cmdlet to check your AD configuration by using the signed in AD user. This cmdlet is supported on AzFilesHybrid v0.1.2+ version and higher. This cmdlet works for AD DS and Microsoft Entra Kerberos authentication. It doesn't work for Microsoft Entra Domain Services enabled storage accounts. For more information, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication#unable-to-mount-azure-file-shares-with-ad-credentials?toc=/azure/storage/files/toc.json).
239-
240-
```PowerShell
241-
Debug-AzStorageAccountAuth -StorageAccountName $StorageAccountName -ResourceGroupName $ResourceGroupName -Verbose
242-
```
243-
244238
## Confirm the feature is enabled
245239

246240
Check if AD DS is enabled as the identity source on your storage account by using the following script. Replace `<resource-group-name>` and `<storage-account-name>` with your values.
@@ -272,11 +266,19 @@ AzureStorageID:<yourStorageSIDHere>
272266
> [!IMPORTANT]
273267
> Before you can authenticate users, you must [assign share-level permissions](storage-files-identity-assign-share-level-permissions.md).
274268
269+
## Debugging
270+
271+
To check your AD configuration by using the signed in AD user, run the `Debug-AzStorageAccountAuth` cmdlet. This cmdlet is supported on AzFilesHybrid v0.1.2+ version and higher. This cmdlet works for AD DS and Microsoft Entra Kerberos authentication. It doesn't work for storage accounts that use Microsoft Entra Domain Services as the identity source. For more information, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication#unable-to-mount-azure-file-shares-with-ad-credentials?toc=/azure/storage/files/toc.json).
272+
273+
```PowerShell
274+
Debug-AzStorageAccountAuth -StorageAccountName $StorageAccountName -ResourceGroupName $ResourceGroupName -Verbose
275+
```
276+
275277
## Disable AD DS authentication on your storage account
276278

277-
If you want to use another authentication method, disable AD DS authentication on your storage account by using the Azure portal, PowerShell, or Azure CLI.
279+
If you want to use another identity source, disable AD DS authentication on your storage account by using the Azure portal, PowerShell, or Azure CLI.
278280

279-
If you disable this feature, the file shares in your storage account won't have identity-based access until you enable and configure one of the other identity sources.
281+
If you disable this identity source, the file shares in your storage account won't have identity-based access until you enable and configure one of the other identity sources.
280282

281283
> [!IMPORTANT]
282284
> After disabling AD DS authentication on the storage account, consider deleting the AD DS identity (computer account or service logon account) that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object. Removing it isn't automatic.

0 commit comments

Comments
 (0)