Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
Hello rr-4098
Thanks for the reply!
In your scenario Azure Files does not authenticate SMB access using Entra ID tokens or OAuth. All identity‑based SMB access requires Kerberos authentication.
To issue Kerberos tickets, Azure Files must be able to authenticate users against one of the following supported identity sources:
- On‑premises Active Directory Domain Services (AD DS)
- Microsoft Entra Domain Services (AAD DS)
- Microsoft Entra Kerberos (preview)
In your current setup, the on-premises domain controllers are not accessible from Azure, AAD DS has not been deployed, and Entra Kerberos is not enabled.
Because of this, there is no Kerberos Key Distribution Center (KDC) available to issue a ticket for:
cifs/<storageaccount>. file.core.windows.net
Microsoft docs:
Enable Microsoft Entra Kerberos authentication for hybrid identities on Azure Files
NOTE: There is no supported Kerberos authentication source configured for Azure Files SMB access**.**
Until a valid Kerberos identity source is provided, Azure Files cannot authenticate user credentials, and access will continue to fail.
The Recommended scenarios is to Enable Microsoft Entra Kerberos for Azure Files
Can you please update us if the action plan provided was helpful?
Should there be any follow-up questions or concerns, please let us know and we shall try to address them.
If these answer your question, click "Upvote" and "Accept Answer" which may be beneficial to other community members reading this thread.