
In the Select Users, Contacts, Computers, Service Accounts, or Groups dialog click Object Types… and select Computers.In the properties screen select the Members tab.Right click on the new group and select Properties.In the New Object – Group enter group name and select:.Note: it is not mandatory to create a new group, an existing group can be used. Under the domain node right click and select New, and then Group.Open the Active Directory Users and Computers utility.Remote into the VM or physical machine joined to AD DS.This group will be used in later steps to grant share level and (files share) permissions. Grant NTFS permissions on the file share to the AD DS group Assign the AD DS group that has been synched to Azure AD, the Storage File Data SMB Share Contributor role assignment on the storage accountĩ. Create file share under the storage accountħ. Add the computer accounts for all session hosts as members of the groupĥ. WVD host pool in which all session hosts have been domain joinedĢ.VM or physical machine joined to AD DS, and permissions to access it.Storage account or enough permissions to create one.

This article is focused on authenticating withĪD DS, as described here. This combined with my work on MSIX app attach (which also uses Azure Files) has prompted the creation of this post.Īzure Files supports multiple authentication mechanisms. The main question has been “Can computer accounts have access Azure Files?”. In the last 3 weeks, I have been getting a lot of questions around Azure Files. Step by step guide on computer account auth for Azure Files
