Skip to content

Commit 8a6d0d8

Browse files
Merge pull request #309571 from rladbsal/patch-47
Revise Active Directory overview for Azure Files
2 parents 5d1023d + c393f7b commit 8a6d0d8

1 file changed

Lines changed: 9 additions & 6 deletions

File tree

articles/storage/files/storage-files-active-directory-overview.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Azure Files supports identity-based authentication over SMB (Server
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: overview
7-
ms.date: 11/06/2025
7+
ms.date: 12/15/2025
88
ms.author: kendownie
99
# Customer intent: "As a cloud architect, I want to implement identity-based authentication for Azure file shares over SMB, so that I can enhance security and streamline access for users."
1010
---
@@ -101,13 +101,16 @@ You can also use this feature to store FSLogix profiles on Azure file shares for
101101

102102
### Microsoft Entra Domain Services
103103

104-
For Microsoft Entra Domain Services authentication, you must enable Microsoft Entra Domain Services and domain-join the VMs you plan to access file data from. Your domain-joined VM must reside in the same VNET as your Microsoft Entra Domain Services hosted domain.
104+
For Microsoft Entra Domain Services authentication, you must enable Microsoft Entra Domain Services and domain join the virtual machines that will access Azure file shares using Kerberos authentication. These virtual machines must have network connectivity to the Microsoft Entra Domain Services managed domain.
105105

106-
The following diagram represents the workflow for Microsoft Entra Domain Services authentication to Azure file shares over SMB. It follows a similar pattern to on-premises AD DS authentication, but there are two major differences:
106+
The authentication flow is similar to on premises AD DS authentication, with the following differences:
107+
- The storage account identity is created automatically during enablement.
108+
- All Microsoft Entra ID users can be authenticated and authorized. Users can be cloud only or hybrid. User synchronization from Microsoft Entra ID to Microsoft Entra Domain Services is managed by the platform.
107109

108-
- You don't need to create an identity in Microsoft Entra Domain Services to represent the storage account. This is performed by the enablement process in the background.
109-
110-
- All users that exist in Microsoft Entra ID can be authenticated and authorized. Users can be cloud-only or hybrid. The sync from Microsoft Entra ID to Microsoft Entra Domain Services is managed by the platform without requiring any user configuration. However, the client must be joined to the Microsoft Entra Domain Services hosted domain. It can't be Microsoft Entra joined or registered. Microsoft Entra Domain Services doesn't support non-Azure clients (i.e. user laptops, workstations, VMs in other clouds, etc.) being domain-joined to the Microsoft Entra Domain Services hosted domain. However, it's possible to mount a file share from a non-domain-joined client by providing explicit credentials such as DOMAINNAME\username or using the fully qualified domain name (username@FQDN).
110+
**Access requirements**
111+
- Kerberos authentication requires the client to be domain joined to the Microsoft Entra Domain Services managed domain.
112+
- Non Azure clients cannot be domain joined to the Microsoft Entra Domain Services managed domain.
113+
- Clients that are not domain joined can still access Azure file shares using explicit credentials only if the client has unimpeded network connectivity to the Microsoft Entra Domain Services domain controllers, for example through VPN or other supported connections.
111114

112115
:::image type="content" source="media/storage-files-active-directory-overview/files-microsoft-entra-domain-services-auth-diagram.png" alt-text="Diagram of configuration for Microsoft Entra Domain Services authentication with Azure Files over SMB.":::
113116

0 commit comments

Comments
 (0)