You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/files-managed-identities.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article explains how you can authenticate managed identities t
4
4
author: khdownie
5
5
ms.service: azure-file-storage
6
6
ms.topic: how-to
7
-
ms.date: 03/17/2026
7
+
ms.date: 03/23/2026
8
8
ms.author: kendownie
9
9
ms.custom:
10
10
- devx-track-azurepowershell
@@ -408,7 +408,7 @@ sudo azfilesauthmanager set https://<storage-account-name>.file.core.windows.net
408
408
If your VM has a system assigned managed identity, use the `--system` flag:
409
409
410
410
```bash
411
-
sudo azfilesauthmanager set https://<storage-account-name>.file.core.windows.net --imds-client-id <client-id> --system
411
+
sudo azfilesauthmanager set https://<storage-account-name>.file.core.windows.net --system
412
412
```
413
413
414
414
Verify the ticket was created properly:
@@ -446,7 +446,7 @@ For more information, see [Mount SMB Azure file share on Windows](storage-how-to
446
446
447
447
### [Linux](#tab/linux)
448
448
449
-
Run the following command to mount the file share with the recommended mount options. Replace `<storage-account-name>` with your storage account name and `<file-share-name>` with your file share name. You can find your credential ID in the following config file: `cat /etc/azfilesauth/config.yaml`. For a user assigned managed identity, include the client ID of the managed identity. For a system assigned managed identity, omit the mount option `username=<client-id>`.
449
+
Run the following command to mount the file share with the recommended mount options. Replace `<storage-account-name>` with your storage account name and `<file-share-name>` with your file share name. You can find your credential ID in the following config file: `cat /etc/azfilesauth/config.yaml`. For a user assigned managed identity, include the client ID of the managed identity using the `username=<client-id>` mount option. For a system assigned managed identity, omit the mount option `username=<client-id>`.
450
450
451
451
```bash
452
452
sudo mount -t cifs //<storage-account-name>.file.core.windows.net/<file-share-name> /mnt/smb -o sec=krb5,cruid=<credential-id>,username=<client-id>,dir_mode=0755,file_mode=0755,serverino,nosharesock,mfsymlinks,actimeo=30
@@ -462,20 +462,22 @@ For more information, see [Mount SMB Azure file shares on Linux clients](storage
462
462
463
463
### Refresh your credentials
464
464
465
-
The refresh service automatically detects and refreshes credentials. After you mount the file share for the first time, start the refresh service to keep credentials up to date. You can only refresh credentials if your VM has a managed identity assigned. If you're supplying the OAuth token directly, the refresh doesn't work.
465
+
To prevent access interruptions, you should refresh your credentials periodically. The refresh service automatically detects and renews credentials as needed.
466
+
467
+
After mounting the file share for the first time, start the refresh service:
466
468
467
469
```bash
468
470
sudo systemctl start azfilesrefresh
469
471
```
470
472
471
-
You should refresh your credentials periodically to avoid access interruptions. You can refresh credentials manually by using the `azfilesauthmanager set` command as described in [Configure authentication](#configure-authentication), or you can automate the refresh by using the shared library APIs.
472
-
473
-
To persist the settings and enable the refresh service to start on every boot up:
473
+
To ensure the service starts automatically on every boot:
474
474
475
475
```bash
476
476
sudo systemctl enable --now azfilesrefresh
477
477
```
478
478
479
+
Automatic credential refresh requires a managed identity assigned to your VM. If you're supplying the OAuth token directly, you must refresh credentials manually by using the `azfilesauthmanager set`command as described in [Configure authentication](#configure-authentication), or programmatically via the shared library APIs.
0 commit comments