

You can either use a default share-level permission to allow computer accounts to access the share, or consider using a service logon account instead. Doesn't support assigning share-level permissions to computer accounts (machine accounts) using Azure RBAC.If you need to access your Azure file share from a different forest, make sure that you have the proper forest trust configured, see the FAQ for details. You can only access Azure file shares with the AD DS credentials from a single forest by default. Only supported against the AD forest that the storage account is registered to.Only supported on clients running OS versions Windows 8/Windows Server 2012 or newer.AES 128 Kerberos encryption is not yet supported. Supports Kerberos authentication with AD with AES 256 encryption (recommended) and RC4-HMAC.Supports Azure file shares managed by Azure File Sync.Password hash synchronization is optional.


AD DS identities used for Azure Files on-premises AD DS authentication must be synced to Azure AD or use a default share-level permission.Premium file shares (FileStorage), LRS/ZRS If you're new to Azure Files, we recommend reading our planning guide. This article focuses on enabling and configuring on-premises AD DS for authentication with Azure file shares. The setup is different depending on the domain service you choose. We strongly recommend that you review the How it works section to select the right AD source for authentication. Overview - on-premises Active Directory Domain Services authentication over SMB for Azure file shares
