Moving files to the cloud is no longer a “future plan” , it’s now a survival strategy for organizations modernizing their identity infrastructure. With companies aggressively removing on-premises dependencies, decommissioning old AD servers, and shifting toward passwordless authentication, one practical challenge still remained:
How do we securely access large, traditional SMB file shares from Entra ID-joined devices without any domain controller connection?
Until recently, this required Domain Controllers, hybrid trusts, or NTLM/Kerberos issued by on-prem AD.
Not anymore.
Microsoft has introduced Microsoft Entra Kerberos authentication for Azure Files for Hybrid & Cloud Only identities (Preview) , enabling seamless, passwordless SMB access from:
- Entra ID Joined devices
- Hybrid Joined devices
- Cloud-only users
- Hybrid users
- Passwordless users (Passkeys, Windows Hello for Business)
- Zero DC / Zero line-of-sight environments
This blog explains why this matters, how it works, and provides a full step-by-step configuration guide with testing from an Entra Joined Windows 11 device.
Why Azure Files + Entra Kerberos Matters Now
Most companies have TBs of unstructured files living inside on-premises file servers. SharePoint Online or OneDrive may not be suitable because of:
- Large datasets (multi-TB)
- Application dependencies requiring SMB
- Legacy folder structures and ACLs
- Need for lift-and-shift without redesigning information architecture
Azure Files is perfect for this scenario because it provides:
- True SMB file shares (NTFS ACLs, inheritance, apps compatibility)
- Cloud-scale performance (Premium + Standard tiers)
- Global redundancy options
- Azure AD / Entra ID based RBAC (no more domain controllers!)
With Entra Kerberos, access becomes even more powerful:
- No NTLM
- No on-prem domain controllers
- No line-of-sight
- Passwordless authentication works
- Supports roaming profiles, FSLogix, and VDI scenarios
This is a key step in the journey of “Retire On-Prem AD gracefully”.
Understanding Identity Types
Hybrid Identities
These are on-premises AD DS accounts synced to Microsoft Entra ID using:
- Microsoft Entra Connect, or
- Microsoft Entra Connect Cloud Sync.
Cloud-Only Identities
These are accounts that exist only in Microsoft Entra ID, with no on-prem AD presence.
The new Entra Kerberos preview unlocks seamless file share authentication for both identity types.
What Microsoft Entra Kerberos Authentication Enables
When this feature is enabled, Azure Files relies on Microsoft Entra ID to issue Kerberos tickets for SMB access. This means:
- Users authenticate to Azure file shares using their Entra ID credentials.
- Azure Files receives a Kerberos service ticket, not user credentials.
- Cloud-only users no longer need a domain controller for file share access.
- Hybrid users still require on-prem DC access only when ACL changes are made (to resolve SID → name lookups).
This is a major shift toward a DC-less file access experience for modern organizations.
Azure Files Identity-Based Authentication (SMB)
Azure Files supports identity-based SMB authentication similar to a traditional Windows file server:
- Assign permissions at share, folder, or file level.
- Works with Windows, Linux, and macOS SMB clients.
- No additional charges, this is included with Azure Files.
- Not supported for NFS shares.
Important Limitation
You can enable only ONE identity source per storage account:
- On-premises AD DS ( Or It can be DC running on an Azure VM)
- Microsoft Entra Domain Services
- Microsoft Entra Kerberos (preview)
Choose wisely based on your environment.
How the Kerberos Flow Works
- A user or application requests access to an Azure SMB file share.
- Azure Files redirects the request to the configured identity source.
- The identity source (Entra ID, AD DS, or Entra ID DS) authenticates the identity.
- Upon successful authentication, it issues a Kerberos ticket.
- The client presents the Kerberos ticket to Azure Files.
- Azure Files validates the ticket and authorizes the user.
Common Use Cases
Replacing On-Prem Fileservers
Organizations modernizing infrastructure can migrate file data to Azure Files while keeping the same identity and access model.
Lift-and-Shift Applications
Applications lifted to Azure VMs can continue using SMB file shares with Kerberos authentication, no directory redesign required.
Backup & Disaster Recovery (DR)
Azure Files can serve as a DR target for on-prem file servers:- Preserves NTFS DACLs
- Supports proper access control during failover
Choosing the Right Identity Source
Before enabling identity-based access, understand which identity system best fits your environment.
On-Premises AD DS
Use this when:
- You already have a strong on-prem AD environment.
- Clients/servers have uninterrupted network connectivity to domain controllers.
- You're not ready to move identities fully to the cloud.
Microsoft Entra Kerberos
Choose this if:
- You want to authenticate cloud-only identities (no DC required).
- You have hybrid identities but clients cannot consistently reach on-prem DCs.
- You're using Entra Joined VMs with FSLogix profiles on Azure Files.
- You’re preparing long-term identity modernization toward Entra ID.
This is the recommended option for most modern cloud-first organizations.
Microsoft Entra Domain Services
Use this when:
- You need a managed domain (Entra ID DS) for VMs running legacy applications.
- You already have Entra ID DS enabled and operational.
Entra ID DS behaves like a cloud-hosted AD domain that is a child of your Entra tenant.
Which Identity Source Should You Choose? Practical Guidance
| Requirement / Scenario | Best Option |
|---|---|
| On-prem AD with reliable DC connectivity | AD DS |
| Clients without DC access (remote-first) | Entra Kerberos |
| Cloud-only identities | Entra Kerberos |
| FSLogix profiles on Entra-joined VMs | Entra Kerberos |
| Existing Entra ID Domain Services setup | Entra Domain Services |
Microsoft Entra Kerberos authentication Prerequisites
Before enabling Microsoft Entra Kerberos authentication for Azure SMB file shares, make sure the following requirements are in place.
Core Requirements
- A storage account can use only one identity source. If it's already configured with AD DS or Microsoft Entra Domain Services, disable that first.
- For hybrid identities, you must have:
- An Active Directory domain (AD DS)
- Microsoft Entra Connect or Cloud Sync
- Users and groups created in AD and synced to Entra ID (for RBAC permissions)
- For cloud-only identities, no on-prem AD is required.
- The following Windows services must be running:
- WinHTTP Web Proxy Auto-Discovery Service
- IP Helper
- MFA must be disabled on the Microsoft Entra app representing the storage account.
- Cross-tenant/B2B access isn’t supported. Only users from the same Entra tenant can authenticate.
- Kerberos tickets always use AES-256 encryption.
- External identity support is limited to FSLogix on Azure Virtual Desktop. Non-AVD B2B access isn't supported.
- Cloud-only identity support (preview) currently works only with default share-level permissions.
OS & Domain Requirements
For Cloud-Only Identities (Preview)
Supported OS:
- Windows 11 Enterprise/Pro (single or multi-session)
- Windows Server 2025 (with latest cumulative updates)
For Hybrid Identities
Supported OS:
- Windows 11 Enterprise/Pro (single or multi-session)
- Windows 10 Enterprise/Pro (version 2004 or later + latest updates, including KB5007253)
- Windows Server 2025 (latest updates)
- Windows Server 2022 (latest updates, including KB5007254)
Device Join Requirements
- Clients must be Entra joined or hybrid joined.
- Devices joined only to AD or Entra ID DS aren't supported.
- Cloud-only identity support is available only in Azure Public Cloud.
Step-by-Step Configuration Guide
Step 1 – Create or Select Your Storage Account
Navigate to: Azure Portal → Storage Accounts → Create
When creating your Azure storage account, select the subscription, resource group, storage account name, region, and preferred storage type based on your business needs. Choose the performance tier and redundancy model that aligns with your workload.
For Azure Files, pricing depends on the storage type you select. Azure Files offers two main billing approaches for Standard storage: Pay-as-you-go and Provisioned (v1/v2). The overall cost of Azure Files is influenced by four key factors, especially the billing model.
Billing Models Explained
1. Provisioned v2 (Recommended)
A modern provisioning model where you independently allocate storage, IOPS, and throughput.
You pay for the capacity and performance you provision,even if you don’t use it fully.
Best option for new deployments.
2. Provisioned v1
An older provisioning model where you only provision storage, and IOPS/throughput scale automatically based on the storage size.
Recommended only if you have a specific need for this legacy model.
3. Pay-as-you-go
A consumption-based model where costs are based on actual usage, including storage consumed, transactions, and data transfer.
Use this only if your workload fits a true consumption model, otherwise, Provisioned v2 is preferred.
Step 2 – Enable Microsoft Entra Kerberos Authentication
Open the storage account, go to File shares, and click on Identity-based access (Not configured) to begin the setup.
In the next menu, select the Microsoft Entra Kerberos checkbox. In the Domain Services section, enter your on-premises AD Domain Name and Domain GUID (required only for hybrid environments ,cloud-only setups don’t need this).Click Save to apply the settings.
If you want to manage directory and file permissions through Windows File Explorer, the domain name and GUID must be provided. You can retrieve this information from your domain admin or by running Get-ADDomain on any on-prem AD-joined machine. The DNSRoot in the output is your domain name, and the ObjectGUID is your domain GUID.
If you prefer configuring permissions using icacls, this step is optional. but remember, the client must have full network connectivity to the on-prem AD.Note: Configuring permissions through Windows File Explorer isn’t currently supported for cloud-only identities (preview).
For this demo testing, I’ll showcase both hybrid user and cloud-only user scenarios, so I’ll include these details in the configuration.
Step 3 – Configuring Share-Level Permissions for Azure File Shares
After enabling your identity source (Microsoft Entra Kerberos, AD DS, or Entra Domain Services), the next step is to assign share-level permissions for your Azure file share. Without this, users won’t be able to access the share ,regardless of their NTFS/ACL permissions.
Azure Files supports two ways of assigning share-level permissions:
- Assign permissions to specific Microsoft Entra users or groups
- Assign a default share-level permission to all authenticated identities
Both methods serve different scenarios depending on your identity setup.
1. Assigning Share-Level Permissions to Specific Entra Users or Groups (Recommended)
For most environments, you should assign access to specific Entra ID users or groups, and then apply detailed folder/file permissions using Windows ACLs.
This approach gives the strongest and most granular access control.
- The Entra identity must be synced from on-prem AD DS if you’re using hybrid identities. Example:
user1@onprem.localsynced to Entra asuser1@contoso.com. - Assign permissions to the Entra version of the identity.
- Use built-in Azure RBAC roles for Azure Files, such as:
- Storage File Data SMB Reader
- Storage File Data SMB Contributor
- Storage File Data SMB Elevated Contributor
- Avoid wildcard (*) permissions in custom roles—this may unintentionally grant broader access as new data actions are added.
Once assigned, share-level permissions may take up to 3 hours to fully propagate.
2. Assigning a Default Share-Level Permission (All Authenticated Identities)
In some scenarios, instead of assigning permissions per user or group, you can configure a default share-level permission. This applies the same access level to all authenticated identities.
This method is useful when:
- You’re using Microsoft Entra Kerberos for cloud-only identities (preview).
- On-prem AD identities aren’t synced to Entra ID.
- You have identities such as:
- sMSA/gMSA accounts
- Computer accounts
- You’re working in multi-tenant environments where AD DS syncs to a different Entra tenant.
- You prefer to control access only through Windows ACLs.
- With default share-level permissions, you don’t need to sync on-prem identities to Entra ID.
- All authenticated users get the same permission level (Reader, Contributor, Elevated Contributor, etc.).
- Default permission starts as None, meaning no access until you assign a level.
Step 4 - Finalize Entra Kerberos Configuration: Admin Consent, Cloud-Only Group Support & MFA Exclusions
- Granting admin consent to the auto-created service principal
- Enabling cloud-only group SID support (mandatory for cloud-only identities)
- Excluding the storage account from MFA policies
Grant Admin Consent to the Auto-Generated Service Principal
When you enable Microsoft Entra Kerberos, Azure automatically creates a service principal for your storage account (named:
[Storage Account] <your-storage-account-name>.file.core.windows.net).
This service principal is required for the Kerberos flow but is not used for file access authorization so avoid making any unnecessary modifications.
[Storage Account] <your-storage-account-name>.file.core.windows.net).
How to Grant Admin Consent
Go to Microsoft Entra ID → App registrations Select All applications Locate the app named: [Storage Account] <your-storage-account-name>.file.core.windows.net
Open the app → go to API permissions Click Grant admin consent Confirm with Yes This grants the required permissions: openid ,profile, User.Read
Enable Cloud-Only Groups Support (Mandatory for Cloud-Only Identities)
Kerberos tickets have a limit of 1,010 SIDs. With cloud-only identity support now in preview, Entra Kerberos may need to include both:- On-premises group SIDs
- Entra ID cloud group SIDs
Go to Entra ID → App registrations Open the app for your storage account Go to Manifest Find the tags section Add the following entry:
"kdc_enable_cloud_group_sids"
Click Save
This ensures cloud-only identities can receive Kerberos tickets without hitting the SID limit.
Disable MFA for the Storage Account Application
Users will receive:
System error 1327: Account restrictions are preventing this user from signing in.
Mapping the share with net use or accessing via Explorer will fail.
Step 5 - Configure Clients to Retrieve Entra Kerberos Tickets
- Microsoft Intune
- Group Policy
- Registry Key
Test and Validate the Entra Kerberos File Share
Go to your storage account, open File shares, and click + File share to create a new share.
Click Next to configure the file share backup options.
Now the file share has been created, and you can see all available options—such as Connect, Upload, Add directory, Deleted shares, Change tier, Edit quota, and more. You’ll also notice that Identity-based access now shows as Configured.
At this stage, we’re relying solely on the default share-level permission, which grants access to all authenticated users based on the selected permission role. We haven’t configured any additional RBAC roles or Windows ACLs, as the default permission already covers this scenario.
The Azure File Share is now successfully mounted and accessible on the Entra Joined PC using a cloud-only identity.
Access Azure File Share using Hybrid Account
Now that we’re signed in with a hybrid user account, accessing the Azure File Share from an Entra Joined device that has line-of-sight to the on-premises domain controller allows us to configure folder ACLs directly through Windows Explorer.
This works because we previously configured the on-prem AD Domain Name and Domain GUID during the Entra Kerberos setup. As a result, Entra Kerberos seamlessly supports both hybrid identities and cloud-only identities, depending on your deployment scenario.
How Mixed Permissions Work in Azure File Shares
Azure Files uses two layers of access control:
- Share-level permissions (Azure RBAC)
- Directory/File-level permissions (Windows ACLs / NTFS)
Understanding how these work together is crucial for proper access configuration.
If you configure both a default share-level permission and specific RBAC permissions for a user or group, Azure Files always gives the user the higher of the two permission levels.
Example:
- Default share-level: Elevated Contributor
- User-specific RBAC: Reader
- The user receives Elevated Contributor
How RBAC and NTFS Permissions Work Together
Share-level permissions act as the first gate ,it determine whether a user can access the file share at all.
NTFS permissions (ACLs) then provide granular control on what a user can do inside the share, such as read, write, delete, or modify.
The most restrictive permission always wins.
Example scenarios:
| Share-Level Permission | NTFS Permission | Resulting Access |
|---|---|---|
| Read | Read/Write | Read only (share-level is more restrictive) |
| Contributor | Read | Read only (NTFS is more restrictive) |
Azure Files supports the standard set of Windows ACLs, allowing full compatibility with:
- Folder owners
- Authenticated users
- Built-in groups
- File server–style ACL inheritance
Configuring Windows ACLs
The method depends on the identity type:
1. Cloud-Only Identities (Preview)- Must configure ACLs using Azure Portal or PowerShell
- File Explorer and icacls are not supported yet (Which you have seen from the previous Testing)
When Microsoft Entra Kerberos is your identity source, you can configure Windows ACLs directly from the Azure portal for both hybrid and cloud-only identities.
Select Browse from the menu. To set ACLs at the root folder, click Manage access from the top menu.This provides a simple way to apply NTFS-style permissions without requiring Windows Explorer or command-line tools.
- Can configure ACLs using:
- Windows File Explorer
- icacls
- PowerShell (Set-Acl)
- You can migrate existing NTFS permissions using:
- Robocopy
- AzCopy (latest version)
- Azure File Sync (ACLs preserved automatically)
Important Hybrid Identity Note
If you're using Microsoft Entra Kerberos for hybrid access:
- Hybrid identities must be synced to Entra ID for their ACLs to be enforced.
- You can set ACLs for identities that are not synced, but they will not be enforced because the Kerberos ticket won’t contain those SIDs.
- If your identity source is on-prem AD DS, non-synced identities can be enforced because AD DS includes those SIDs in the Kerberos ticket.
Conclusion
For organizations moving away from on-prem infrastructure, this feature eliminates the dependency on domain controllers and simplifies your identity strategy. Combined with device modernization and Window Hello for Business, it ensures a seamless and secure access experience for users.


































0 Comments