Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Configure Azure file shares for Entra joined Windows devices and hybrid identities
    Intune

    Configure Azure file shares for Entra joined Windows devices and hybrid identities

    Peter KlapwijkBy Peter KlapwijkJanuary 10, 2024Updated:May 24, 202416 Mins Read

    You started your journey to a modern Windows workplace. Your (new) devices are Microsoft Entra joined and no longer joined to the on-premises Active Directory. However, some of your applications might still need a drive mapping to a file share on an on-prem server. This means your Entra joined devices still need a line of sight to your on-prem network, even when you’re working from a nice place under the sun. Fortunately, we can also host file shares on Azure storage and for some time we can configure Microsoft Entra Kerberos authentication for hybrid identities for these file shares.

    Microsoft Entra Kerberos authentication

    This configuration allows hybrid users to access Azure file shares using Kerberos authentication, using Microsoft Entra ID to issue the necessary Kerberos tickets to access the file share with the SMB protocol. This means your end users can access Azure file shares over the internet without requiring unimpeded network connectivity to domain controllers from Microsoft Entra hybrid joined and Microsoft Entra joined clients.

    This sounds like an interesting solution when you still have some data left on on-premises file shares and want to move these to a cloud solution. Let’s look at the prerequisites and things we need to configure for this solution.

    Requirements

    Let’s start with the requirements for this solution, which can be found in detail on the Microsoft Learn site.
    Of course, we need to have a storage account on Azure, these are the other requirements;

    • Windows 10/11 Enterprise/ Pro
    • Microsoft Entra joined or Microsoft Entra Hybrid joined
    • Hybrid user identity (thus Microsoft Entra Connect or Microsoft Entra Connect cloud sync)
    • Exclude on CA policy with MFA

    Take note of the last listed requirement. Multi-factor Authentication is not supported for this solution (Azure storage accounts), thus we need to exclude this solution from our Conditional Access policy if these force MFA. But later more on that.

    Create Storage account

    I’m not going into full detail about setting up an Azure environment and Azure storage account, as the configuration you need might differ from my tenant.

    Storage accounts can be created in the Azure portal.
    Make the choices that fit your needs.

    Enable Microsoft Entra Kerberos authentication for hybrid user accounts

    The next step in our setup is to Enable Microsoft Entra Kerberos authentication for the file shares in the storage account.
    On the Files shares tab (under Data storage) click on Not configured which is shown behind Identity-based access.

    Click Setup under Microsoft Entra Kerberos.

    Set a checkmark behind Microsoft Entra Kerberos and click Save.
    When you want to configure directory and file level permissions through Windows Explorer, you also need to provide the Domain name and Domain GUID of the on-premises domain.

    The Domain Name and Domain GUID can be found by running this PowerShell command on a domain server or client; Get-ADDomain | select DNSRoot,ObjectGUID

    Grant admin consent to the new service principal

    In the background, a Microsoft Application was registered in Microsoft Entra ID when we enabled Kerberos authentication. We need to explicitly grant admin consent to the new Microsoft Entra application, which is the next step in our setup.

    Browse to App registrations in the Azure portal and to the All applications tab. Search for [storage and you will find the automatically created application. Select the application with the name matching [Storage Account] .file.core.windows.net.

    On the Permissions tab click Grant admin consent for [domain name] to grant the requested API permissions. Click Yes for a confirmation.

    Create a file share

    We need to have at least one file share to store our files.
    Browse to Azure Storage accounts, open your storage account, and on the File shares tab click +File share.

    Configure the share to your own needs.

    Assigning share-level permissions

    We need to provide access to the file share, we can do that by adding a Role assignment to the file share. We have different default roles available with different permissions.

    Open the previously created file share and browse to the tab Access control (IAM).
    Click Add and select Add role assignment.

    Search for data smb share to find the related roles. Select the role you want to assign and click Next.

    We can assign the role directly to a user, but most likely you want to assign the role to a group. In my case, I used a synced AD group.

    When the assignment is added, the storage account part is configured.

    Configure Conditional Access policies (Optional)

    As we can read in the documentation the Azure storage account can’t authenticate with both Microsoft Entra ID and a second method like AD DS or Microsoft Entra Domain Services.
    This means we need to make sure no MFA is required for the previously created Microsoft Azure application.

    If you for example require MFA for All cloud apps in a Conditional Access policy, you need to exclude the application from the CA policy.

    As we can exclude the Azure Storage application, we can also include the application.

    This means we can for example only allow access to the file share from Compliant devices.

    Configuring Windows devices to retrieve Kerberos tickets

    Everything is configured in Azure, but we also need to configure our Windows devices.

    We need to configure our Windows clients to retrieve a Kerberos ticket at logon. We can deploy the setting for this with Microsoft Intune to our clients. Unfortunately, at the moment of writing this setting is not available in the Settings catalog, thus we need to use a Custom configuration profile. Information about the needed CSP can be found in the Microsoft docs.

    For this configuration, we need to sign-in to the Intune portal.

    • Browse to Devices, Windows, Configuration profile
    • Click Create profile
    • Select Windows 10 and later as Platform
    • Select Templates as PRofile type
    • Select Custom and click Create

    Enter a Name and Description (optional) and click Next.

    Click Add, to add an OMA-URI row.

    Enter below information to the policy;
    Name: CloudKerberosTicketRetrievalEnabled
    OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Kerberos/CloudKerberosTicketRetrievalEnabled
    Data Type: Integer
    Value: 1

    Assign this Intune profile to a group that holds your devices and we can start testing!

    The end result

    The end result is that we can browse via the UNC path to the file share located on our Azure storage.

    And if needed we can also make a network drive mapping to the file share.
    This can be done for example with the script I previously shared.

    In case the user is signed in to a non-compliant device (and you require a compliant device to access the file share) the user can’t access the file share.

    The user will see an error message like below. Unfortunately, not really an error message that describes the real issue (most likely because File Explorer doesn’t handle this very nicely).

    If we have a look at the user sign-in logs, we see the Conditional Access policy is triggered.

    And as we can see one of the devices was not compliant.

    That’s it for this post. Thanks for reading!

    Note; Azure file share uses the SMB protocol. SMB uses firewall port 445 which is blocked by some ISPs. Something to consider when implementing this solution.

    Modern Workplace Windows Windows 10 Windows 11
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Automatically inform your users on outdated Windows devices

    May 8, 2024

    Manage the local administrators group with Microsoft Intune – Hybrid AAD joined Windows 10 devices

    April 13, 2020

    Create a local user account on Windows 10 with Microsoft Intune

    April 12, 2020
    View 1 Comment

    1 Comment

    1. Patrick on January 12, 2024 22:32

      The only problem with that solution , is that not every ISP let the port 445 open. At least over here in Canada. So when I tried to implement this solution, most of the users were not able to connect to the file share when at home because i445 was blocked at the ISP level…

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}