Azure file share with Azure ad Kerberos cannot authenticate to domain controller on Hybrid-Entra Joined Device

Tyler Douglas 20 Reputation points
2025-03-19T15:54:57.8833333+00:00

I've set up and configured an Azure file share with Azure AD Kerberos authentication. When attempting to mount the drive on a hybrid-Entra joined device that is not on our domain network it fails with the below errors.
If I mount using CMD I get: "The password is invalid for \<StorageAccountName>.file.core.windows.net" and am then prompted to enter a username. If I type my username again, I get a message telling me that that username was already tried and a domain controller could not be contacted to verify.

If I mount using Powershell I get: "The system cannot contact a domain controller to service the authentication request. Please try again later"

Note: I have configured the local group policy for the test machine to allow the device to get the Azure AD Kerberos Ticket. The test machine is running Windows 11 Enterprise v23H2

I have also confirmed that the "Storage Account App" is excluded from our MFA policy and I do not see any failed sign-in's related to this issue.

My end goal is to be able to mount this drive on an Entra-Hybrid joined computer that is NOT on our domain network (remote). I believe Entra Kerberos is able to do this based on the description given in this article. I need some assistance understanding where I am going wrong here.

Azure Files
Azure Files
An Azure service that offers file shares in the cloud.
1,403 questions
{count} votes

Accepted answer
  1. Venkatesan S 1,625 Reputation points Microsoft External Staff
    2025-03-25T13:50:27.7166667+00:00

    Hi Tyler Douglas

    I'm glad that you were able to resolve your issue and thank you for posting your solution so that others experiencing the same thing can easily reference this! Since the Microsoft Q&A community has a policy that "The question author cannot accept their own answer. They can only accept answers by others", I'll repost your solution in case you'd like to "Accept" the answer.

    Issue:

    When configuring Azure AD Kerberos for Azure Files authentication, users should be able to mount Azure Files remotely without requiring a VPN. However, if file share permissions rely on NTFS ACLs with on-prem AD SIDs, the system may still need to contact the on-prem AD to verify permissions.

    Solution:

    The root cause was that the computer no longer had a local AD Kerberos ticket, which prevented it from verifying NTFS permissions to access the drive.

    • Once the computer was able to contact the domain controller and receive a local Kerberos ticket, access to the drive was restored, even without an active connection to the domain controller.
    • After testing, I found that the ticket remained valid for several days, allowing continued access to the drive without requiring reauthentication to the local DC.

    If you have any other questions, please let me know. Thank you again for your time and patience throughout this issue.

    Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.


2 additional answers

Sort by: Most helpful
  1. chrischin 915 Reputation points Microsoft Employee
    2025-03-20T23:36:54.96+00:00

    Hi Tyler,Sounds like we are dealing with 2 separate AD domains here.

    You mention the session hosts are hybrid joined. Let's say the session hosts are hybrid joined to AD domain A and joined to Entra tenant X. Are the devices hybrid joined via Entra ID Connect?

    Let's also say that your user identities are hybrid identities from AD domain B and Entra tenant X? Is this done via a separate Entra ID Connect (than for devices)?

    When you enabled Entra Kerberos on the Azure File share, did you pick the guid and domain name for AD domain A or B?

    What did you prime the Azure File share with as far as ACLs? It should be SIDs from AD Domain B.

    Your ACLs needs to look like those in the screenshot in this link (https://learn.microsoft.com/en-us/fslogix/how-to-configure-storage-permissions) where the SIDs are from AD domain B (hybrid identity domain).


  2. Tyler Douglas 20 Reputation points
    2025-03-25T13:20:01.9233333+00:00

    For authentication: If configured properly, Azure AD Kerberos should allow users to authenticate and mount Azure Files remotely without requiring a VPN.

    For authorization: If file share permissions rely on NTFS ACLs with on-prem AD SIDs, then the system may still need to contact on-prem AD to verify permissions.

    This comment by Venkatesan S ended up leading me to the issue. The problem was that this computer no longer had a local AD Kerberos ticket, so was not able to verify it had the correct NTFS permissions to access the drive. Once the computer was able to contact the domain controller and receive a local Kerberos ticket, this started working regardless of if it has an active line of site to the domain controller. I am now testing this again after leaving the computer sit for a few days and it has still retained its ticket and access to the drive without needing to reauthenticate to the local DC. Thank you all for your assistance with this issue.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.