Change the identity source for Azure file shares

Applies to: ✔️ SMB file shares

Azure Files supports only one identity source per storage account for identity-based authentication over SMB. If you want to switch from one identity source to another, you must first disable the current identity source and then enable the new one.

For guidance on choosing the right identity source for your environment, see Overview of Azure Files identity-based authentication for SMB access.

Important

Disabling the current identity source removes identity-based access for all file shares in the storage account immediately. Users can't access shares using identity-based authentication until you enable and configure a new identity source.

Step 1: Verify the current identity source

First, verify the identity source that's currently enabled on your storage account. Supported identity sources for SMB Azure file shares are Active Directory Domain Services (AD DS), Microsoft Entra Domain Services, and Microsoft Entra Kerberos.

  1. Sign in to the Azure portal and select the storage account.

  2. From the service menu, under Data storage, select File shares.

  3. Next to Identity-based access, check the configuration status. If it shows Configured, proceed to the next step. If it shows Not configured, then no identity source is enabled on the storage account and you can proceed to Enable a new identity source.

    Screenshot of the file shares pane in your storage account, identity-based access configuration status is highlighted.

  4. Select Configured.

  5. The portal shows the identity source that's enabled on the storage account and its configuration status. Other identity sources are grayed out. In this example, Microsoft Entra Kerberos is enabled as the identity source for the storage account.

    Screenshot showing which identity source is enabled on the storage account.

Step 2: Disable the current identity source

Disable your current identity source by using the Azure portal, Azure PowerShell, or Azure CLI.

Active Directory Domain Services (AD DS)

To disable AD DS on the storage account, follow these steps.

  1. Under Active Directory Domain Services (AD DS), select Configure.
  2. Select the Disable Active Directory for this storage account checkbox.
  3. Select Save.

Important

After disabling AD DS authentication, consider deleting the AD DS computer account or service logon account that you created to represent the storage account in your on-premises AD. If you leave the identity in AD DS, it remains as an orphaned object.

Microsoft Entra Domain Services

To disable Microsoft Entra Domain Services on the storage account, follow these steps.

  1. Under Microsoft Entra Domain Services, select Configure.
  2. Uncheck the Enable Microsoft Entra Domain Services checkbox.
  3. Select Save.

Microsoft Entra Kerberos

To disable Microsoft Entra Kerberos on the storage account, follow these steps.

  1. Under Microsoft Entra Kerberos, select Configure.
  2. Uncheck the Microsoft Entra Kerberos checkbox.
  3. Select Save.

Step 3: Enable a new identity source

After disabling the current identity source, follow the instructions for the new identity source you want to enable: