Hi YMCA2838382,
Thanks for the reply, we have some below suggestions for you, hope that works
Review Permissions: Ensure that you have the necessary permissions granted to your Azure AD users. Check if the users involved have roles like Storage File Data Owner or Storage File Data Contributor, which are crucial for accessing the files properly.
The identity used for Join-AzStorageAccount or Set-AzStorageAccount must have Storage Account Contributor and Directory Join permissions in Entra ID.
Verify Synchronization: Since you mentioned syncing with an on-premises file server, confirm that the synchronization is happening correctly. If you're using Microsoft Entra Connect, make sure it is configured to synchronize password hashes.
Use Correct Sign-in Format: When signing in or mapping the drives, try using the UPN format (i.e., ******@domain.com) rather than SAMAccountName
As you mentioned storage account that has 3 shares that are also by synced with an on prem file server, please ensure your VM must be domain-joined to Microsoft Entra Domain Services. For more information about how to domain-join a VM, see Join a Windows Server virtual machine to a managed domain. Microsoft Entra Domain Services authentication over SMB with Azure file shares is supported only on Windows VMs running OS versions above Windows 7 or Windows Server 2008 R2, or on Linux VMs running Ubuntu 18.04+ or an equivalent RHEL or SLES VM.
Reference link:https://learn.microsoft.com/en-us/azure/storage/files/storage-files-identity-auth-domain-services-enable?tabs=azure-portal
DNS Configuration
- The VNet linked to the storage account must use the AAD DS DNS servers. If DNS reverts to Azure default or custom DNS without the domain controllers, the Kerberos setup breaks. You can follow some of the below steps to verify
- Verify DNS Settings Ensure DNS servers point to AAD DS IPs.
PowerShell Get-AzVirtualNetwork -Name <VNetName> -ResourceGroupName <RGName> - Re-run Join with Kerberos Key
PowerShell Join-AzStorageAccount ` -ResourceGroupName <RGName> ` -Name <StorageAccountName> ` -DomainName <AADDSDomainName> ` -OrganizationalUnit <OUPath> ` -AccountType Computer
3.Enable Azure Files AD DS Authentication
PowerShell
Set-AzStorageAccount `
-ResourceGroupName <RGName> `
-Name <StorageAccountName> `
-EnableAzureActiveDirectoryDomainServicesForFile $true
4.validate Kerberos Status
PowerShell
Get-AzStorageAccount `
-ResourceGroupName <RGName> `
-Name <StorageAccountName> `
| Select-Object AzureFilesIdentityBasedAuthentication
Hope, you find this comment helpful, if yes, please “up-vote” for the information provided , this can be beneficial to community members.
Kindly let us know if you have any additional questions.
Thanks