Domain Join Azure File Share
Doing this requires synching identities from on prem ad ds to azure ad with ad connect.
Domain join azure file share. Enabling ad ds authentication for your azure file shares allows you to authenticate to your azure file shares with your on prem ad ds credentials. This is applicable if these folders are accessed via windows virtual desktop or domain joined azure vm. Open the powershell and navigate to the directory where the downloaded files are and set executionpolicy executionpolicy unrestricted scope currentuser.
Azure file shares only receive the kerberos token not access credentials. To enable ad ds authentication over smb for azure file. Since migrating we cannot connect to the file share using credentials of a local user on the destination pc.
To access a file share by using azure ad credentials from a vm your vm must be domain joined to azure ad ds. Find the azure files share unc path at the storage account configuration menu. Sign in to the client by using the credentials that you granted permissions to as shown in the following image.
If authentication is successful it returns a kerberos token. First of all you need to join the azure file share to the domain. Share level azure role assignment can take some time to take effect.
This post will quickly show how to enable it. Before you can mount the file share make sure you ve gone through the following pre requisites. The issue is a legacy app is installed on a windows 7 pc and is accessed via a file share.
After enabling the feature you must configure your storage account and your ad ds to use ad ds credentials for authenticating to your azure file share. Further it allows you to better manage your permissions to allow granular access control. When an identity associated with a user or application running on a client attempts to access data in azure file shares the request is sent to the domain service either ad ds or azure ad ds to authenticate the identity.