Skip to content

Commit 5fbf0a9

Browse files
committed
Files multiple forest auth integrity check
1 parent 3a682e8 commit 5fbf0a9

1 file changed

Lines changed: 18 additions & 19 deletions

File tree

articles/storage/files/storage-files-identity-multiple-forests.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Use Azure Files with Multiple Active Directory (AD) Forests
2+
title: Use Azure Files with Multiple Active Directory Forests
33
description: Configure on-premises Active Directory Domain Services (AD DS) authentication for SMB Azure file shares with an AD DS environment using multiple forests.
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 02/23/2026
7+
ms.date: 03/03/2026
88
ms.author: kendownie
99
ms.custom: sfi-image-nochange
1010
# Customer intent: As an IT administrator managing multiple Active Directory forests, I want to configure Azure file shares with identity-based authentication, so that users from different forests can access shared resources seamlessly.
@@ -17,11 +17,11 @@ ms.custom: sfi-image-nochange
1717
Many organizations want to use identity-based authentication for SMB Azure file shares in environments that have multiple on-premises Active Directory Domain Services (AD DS) forests. This is a common IT scenario, especially following mergers and acquisitions, where the acquired company's AD forests are isolated from the parent company's AD forests. This article explains how forest trust relationships work and provides step-by-step instructions for multi-forest setup and validation.
1818

1919
> [!IMPORTANT]
20-
> To set share-level permissions for specific Microsoft Entra ID users or groups by using Azure role-based access control (RBAC), first sync the on-premises AD accounts to Entra ID by using [Microsoft Entra Connect](../../active-directory/hybrid/whatis-azure-ad-connect.md). Otherwise, use a [default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities).
20+
> To set share-level permissions for specific Microsoft Entra ID users or groups by using Azure role-based access control (RBAC), first sync the on-premises AD accounts to Entra ID by using [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis). Otherwise, use a [default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities).
2121
2222
## Prerequisites
2323

24-
- Two AD DS domain controllers with different forests and on different virtual networks (VNETs)
24+
- Two AD DS domain controllers with different forests and on different virtual networks
2525
- Sufficient AD permissions to perform administrative tasks (for example, Domain Admin)
2626
- If using Azure RBAC, both forests must be reachable by a single Microsoft Entra Connect Sync server
2727

@@ -35,15 +35,15 @@ A forest trust is a transitive trust between two AD forests that allows users in
3535

3636
To configure a multi-forest setup, perform the following steps:
3737

38-
- Collect domain information and VNET connections between domains
38+
- Collect domain information and virtual network connections between domains
3939
- Establish and configure a forest trust
4040
- Set up identity-based authentication and hybrid user accounts
4141

4242
### Collect domain information
4343

4444
For this exercise, we have two on-premises AD DS domain controllers with two different forests and in different virtual networks.
4545

46-
| **Forest** | **Domain** | **VNET** |
46+
| **Forest** | **Domain** | **Virtual network** |
4747
|--------|--------|------|
4848
| Forest 1 | onpremad1.com | DomainServicesVNet WUS |
4949
| Forest 2 | onpremad2.com | vnet2/workloads |
@@ -61,16 +61,16 @@ To enable clients from **Forest 1** to access Azure Files domain resources in **
6161
1. Right-click on the local domain **onpremad2.com**, and then select the **Trusts** tab.
6262
1. Select **New Trusts** to launch the **New Trust Wizard**.
6363
1. Specify the domain name you want to build trust with (in this example, **onpremad1.com**), and then select **Next**.
64-
1. For **Trust Type**, select **Forest trust**, and then select **Next**.
64+
1. For **Trust Type**, select **Forest trust**, and then select **Next**.
6565
1. For **Direction of Trust**, select **Two-way**, and then select **Next**.
6666

67-
:::image type="content" source="media/storage-files-identity-multiple-forests/direction-of-trust.png" alt-text="Screenshot of Active Directory Domains and Trusts console showing how to select a two-way direction for the trust." border="true":::
67+
:::image type="content" source="media/storage-files-identity-multiple-forests/direction-of-trust.png" alt-text="Screenshot of Active Directory Domains and Trusts console showing how to select a two-way direction for the trust." border="true":::
6868

6969
1. For **Sides of Trust**, select **This domain only**, and then select **Next**.
7070
1. Users in the specified forest can be authenticated to use all of the resources in the local forest (forest-wide authentication) or only those resources that you select (selective authentication). For **Outgoing Trust Authentication Level**, select **Forest-wide authentication**, which is the preferred option when both forests belong to the same organization. Select **Next**.
7171
1. Enter a password for the trust, and then select **Next**. You must use the same password when creating this trust relationship in the specified domain.
7272

73-
:::image type="content" source="media/storage-files-identity-multiple-forests/trust-password.png" alt-text="Screenshot of Active Directory Domains and Trusts console showing how to enter a password for the trust." border="true":::
73+
:::image type="content" source="media/storage-files-identity-multiple-forests/trust-password.png" alt-text="Screenshot of Active Directory Domains and Trusts console showing how to enter a password for the trust." border="true":::
7474

7575
1. You should see a message that the trust relationship was successfully created. To configure the trust, select **Next**.
7676
1. Confirm the outgoing trust, and select **Next**.
@@ -97,7 +97,7 @@ After you establish the trust, follow these steps to create a storage account an
9797
- If the user is synced to Entra ID, grant a share-level permission (Azure RBAC role) to the user **onprem1user** on storage account **onprem1sa** so the user can mount the file share. To do this, go to the file share you created in **onprem1sa** and follow the instructions in [Assign share-level permissions for specific Microsoft Entra users or groups](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-specific-azure-ad-users-or-groups).
9898
- Otherwise, use a [default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities) that applies to all authenticated identities.
9999

100-
Repeat steps 4-8 for **Forest2** domain **onpremad2.com** (storage account **onprem2sa**/user **onprem2user**). If you have more than two forests, repeat the steps for each forest.
100+
Repeat steps 4-8 for **Forest 2** domain **onpremad2.com** (storage account **onprem2sa**/user **onprem2user**). If you have more than two forests, repeat the steps for each forest.
101101

102102
## Configure directory and file-level permissions (optional)
103103

@@ -109,7 +109,7 @@ If icacls fails with an *Access is denied* error, follow these steps to configur
109109

110110
1. Re-mount the share by using either the [Windows permission model for SMB admin](storage-files-identity-configure-file-level-permissions.md#use-the-windows-permission-model-for-smb-admin) or the storage account key (not recommended). See [Mount SMB Azure file share on Windows](storage-how-to-use-files-windows.md).
111111

112-
1. Set icacls permissions for user in **Forest2** on storage account joined to **Forest1** from client in **Forest1**.
112+
1. Set icacls permissions for user in **Forest 2** on storage account joined to **Forest 1** from client in **Forest 1**.
113113

114114
> [!NOTE]
115115
> Don't use File Explorer to configure ACLs in a multi-forest environment. Although users who belong to the forest that's domain-joined to the storage account can have file and directory-level permissions set via File Explorer, it doesn't work for users that don't belong to the same forest that's domain-joined to the storage account.
@@ -124,12 +124,12 @@ For example, when users in a domain in **Forest 1** want to reach a file share w
124124

125125
You can configure domain suffixes by using one of the following methods:
126126

127-
- [Modify storage account suffix and add a CNAME record](#modify-storage-account-name-suffix-and-add-cname-record) (recommended - works with two or more forests)
127+
- [Modify storage account SPN suffix and add a CNAME record](#modify-storage-account-spn-suffix-and-add-cname-record) (recommended - works with two or more forests)
128128
- [Add custom name suffix and routing rule](#add-custom-name-suffix-and-routing-rule) (doesn't work with more than two forests)
129129

130-
### Modify storage account name suffix and add CNAME record
130+
### Modify storage account SPN suffix and add CNAME record
131131

132-
You can solve the domain routing issue by modifying the suffix of the storage account name associated with the Azure file share, and then adding a CNAME record to route the new suffix to the endpoint of the storage account. With this configuration, domain-joined clients can access storage accounts joined to any forest. This solution works for environments that have two or more forests.
132+
You can solve the domain routing issue by modifying the SPN suffix of the storage account associated with the Azure file share, and then adding a CNAME record to route the new suffix to the endpoint of the storage account. With this configuration, domain-joined clients can access storage accounts joined to any forest. This solution works for environments that have two or more forests.
133133

134134
In this example, the domains **onpremad1.com** and **onpremad2.com** have **onprem1sa** and **onprem2sa** as storage accounts associated with SMB Azure file shares in the respective domains. These domains are in different forests that trust each other to access resources in each other's forests. You want to allow access to both storage accounts from clients who belong to each forest. To do this, you need to modify the SPN suffixes of the storage account:
135135

@@ -248,7 +248,7 @@ Kdc Called: onpremad1.onpremad1.com
248248
If you see the preceding output, you're done. If you don't, follow these steps to provide alternative UPN suffixes to make multi-forest authentication work.
249249

250250
> [!IMPORTANT]
251-
> This method works only in environments with two forests. If you have more than two forests, use one of the other methods to configure domain suffixes.
251+
> Adding a custom name suffix and routing rule works only in environments with two forests. If you have more than two forests, [modify the storage account SPN suffix and add a CNAME record](#modify-storage-account-spn-suffix-and-add-cname-record) instead.
252252
253253
First, add a new custom suffix on **Forest 1**.
254254

@@ -268,9 +268,8 @@ Next, add the suffix routing rule on **Forest 2**.
268268
1. Check if the "onprem1sa.file.core.windows.net" suffix shows up. If not, select **Refresh**.
269269
1. Select "onprem1sa.file.core.windows.net", then select **Enable** and **Apply**.
270270

271-
## Next steps
271+
## Next step
272272

273-
For more information, see the following resources:
273+
For more information, see:
274274

275-
- [Overview of Azure Files identity-based authentication support (SMB only)](storage-files-active-directory-overview.md)
276-
- [Azure Files FAQ](storage-files-faq.md)
275+
- [Overview of Azure Files identity-based authentication (SMB only)](storage-files-active-directory-overview.md)

0 commit comments

Comments
 (0)