Providing Access to Azure Files

IntermediateTopic20 min5 min readAzure

AZ-104 notes: Providing Access to Azure Files. Covers key concepts for the Azure Administrator Associate exam.

Primary service:

  • Azure Files

Identity-based authentication allows Azure Files to integrate with directory services such as:

  • Microsoft Entra ID
  • Active Directory Domain Services (AD DS)
  • Microsoft Entra Domain Services

Instead of using:

  • Storage account keys
  • SAS tokens
  • This provides enterprise-grade access control.

Official documentation:

1️⃣ Why Use Identity-Based Authentication?

Traditional methods (Access Keys / SAS):

❌ Full account-level access ❌ Hard to audit ❌ Not user-specific ❌ Poor least-privilege enforcement

Identity-based authentication provides:

✔ Per-user authentication ✔ Kerberos support ✔ RBAC enforcement ✔ Familiar Windows admin model ✔ Integration with LDAP/Kerberos apps ✔ Auditability

2️⃣ What Identity-Based Authentication Controls

Important distinction:

Identity-based authentication controls:

  • ✔ Share-level access

It does NOT replace:

  • ❗ File-level NTFS ACLs ❗ Directory-level permissions

You still must configure:

  • Windows Access Control Lists (ACLs)

Think of it as:

  • Layer 1: Share access (Azure RBAC) Layer 2: File/folder permissions (NTFS ACL)

3️⃣ Identity Options for Azure Files

Azure Files supports three identity models:

🔹 1. Active Directory Domain Services (AD DS)

  • Traditional on-premises domain.

Best for:

  • ✔ Hybrid environments ✔ Lift-and-shift scenarios ✔ Existing Windows infrastructure

Requires:

  • Domain-joined storage account
  • Service principal setup
  • SPN configuration

Docs:

🔹 2. Microsoft Entra Domain Services

  • Managed domain service.

Best for:

  • ✔ Cloud-first deployments ✔ No on-prem domain controllers ✔ Simplified domain management

Prerequisite:

  • Entra Domain Services must already be deployed.

Docs:

🔹 3. Microsoft Entra Kerberos

  • Modern cloud-native approach.

Best for:

  • ✔ Hybrid Azure AD-joined devices ✔ Cloud-first identity strategy

Requires:

  • Entra ID application registration
  • Kerberos ticket issuance
  • Explicit permission grants

Docs:

4️⃣ Share-Level RBAC Roles

When identity-based authentication is enabled, you manage access via:

  • Azure RBAC roles.

Key built-in roles:

These apply at:

  • File share scope
  • Storage account scope
  • Resource group scope

Docs:

5️⃣ How Authentication Flow Changes

Without Identity-Based Auth

Mount script uses:

  • Storage account name
  • Access key (as password)

Example concept:

  • net use Z: \storageaccount.file.core.windows.net\share
  • This uses root-level credentials.

With Identity-Based Auth

Mount script:

  • Uses domain credentials
  • Uses Kerberos ticket
  • No access key required

Security benefit:

  • ✔ No shared secrets ✔ Identity-bound access ✔ Better auditing

6️⃣ Access Control Layers Explained

🔹 Layer 1: Share-Level Authorization

Controlled via:

  • Azure RBAC

Determines:

  • Can user connect to share?

🔹 Layer 2: File-Level Permissions

Controlled via:

  • NTFS ACLs

Determines:

  • Can user read/write specific files?

Example:

  • User may connect to share But denied access to specific folder

7️⃣ ACL (Access Control List) Concept

An ACL defines:

  • Users
  • Groups
  • Computer accounts
  • Security principals

And their permissions:

  • Read
  • Write
  • Modify
  • Full Control

ACLs can be:

  • ✔ Backed up ✔ Restored ✔ Managed via File Explorer

8️⃣ Demonstration Summary

Steps shown:

  • Open file share
  • Click "Identity-based access"

Choose identity source:

  • AD DS
  • Entra Domain Services
  • Entra Kerberos
  • Enable configuration
  • Assign RBAC roles
  • Mount using identity instead of key

Key observation:

  • Mount script no longer requires storage account key.

9️⃣ Security Architecture Comparison

Enterprise best practice:

Disable storage key access Use Entra ID + RBAC

🔟 Hybrid Architecture Scenario

Common enterprise pattern:

  • On-Prem AD ↓ Azure AD Connect ↓ Microsoft Entra ID ↓ Azure Files (Kerberos auth)

This allows:

  • ✔ Seamless authentication ✔ Same credentials ✔ Hybrid identity

11️⃣ Important Limitations

⚠ Identity-based auth applies only to SMB (not NFS) ⚠ NFS uses network-based controls ⚠ Must configure NTFS permissions separately ⚠ Requires proper DNS resolution ⚠ Port 445 must be open

12️⃣ Common Exam Pitfalls

🚩 Identity-based auth replaces NTFS → False 🚩 Access keys are more secure → False 🚩 RBAC controls file-level ACL → False 🚩 Identity-based works for SMB → True 🚩 Custom roles allowed → True

13️⃣ Enterprise Best Practice Design

Secure Azure Files design:

✔ Identity-based authentication enabled ✔ Azure RBAC assigned at share level ✔ NTFS ACLs configured properly ✔ Storage account key access disabled ✔ Private endpoints enabled ✔ Monitoring + logging enabled

14️⃣ Deep Concept: Why This Matters

Traditional file servers:

  • Rely on Kerberos
  • Use NTFS permissions
  • Use domain groups

Azure Files identity-based auth allows:

  • Lift-and-shift without redesigning access model.

It bridges:

  • Cloud storage + legacy enterprise authentication.

15️⃣ When to Use Each Identity Type

Final Summary

Identity-based authentication for Azure Files:

  • Replaces shared secrets with user-based auth
  • Integrates with AD / Entra ID
  • Enables RBAC share-level control
  • Still requires NTFS ACL configuration
  • Improves security, auditability, and governance
  • It is the recommended enterprise-grade method for securing Azure file shares.

If you'd like next:

  • 🏗 Full hybrid AD + Azure Files architecture diagram
  • 🧠 AZ-104 scenario questions on Azure Files identity
  • 🔐 Step-by-step AD DS integration deep dive
  • 📊 Security comparison: SAS vs Identity vs Keys
  • 🛡 Zero-trust file share access design
  • Tell me your goal (exam prep, architecture mastery, or enterprise deployment).

More in Microsoft Azure