Hello Der_Andreas,
Thank you for posting your query here!
Microsoft Entra ID can be used to authenticate hybrid user identities, which are on-premises AD DS identities that are synced to Microsoft Entra ID. This configuration allows hybrid users to access Azure file shares using Kerberos authentication. However, configuring Windows access control lists (ACLs)/directory and file-level permissions for a user or group requires unimpeded network connectivity to the on-premises domain controller.
Please note that it is not possible to join a Mac device to Azure AD. But it is possible is to enroll your device using Intune. To enroll a personal device in Intune: https://learn.microsoft.com/en-us/mem/intune/user-help/enroll-your-device-in-intune-macos-cp
Similar post: https://serverfault.com/questions/1079628/register-mac-to-azure-ad-without-enrolling-in-intune
Enrolling your Mac with Intune can help manage your device and apply certain policies.
However, accessing an SMB share on Azure Files with NTFS permissions via Microsoft Entra Kerberos authentication for hybrid identities may still present challenges. This is due to the complexities of the SMB protocol and NTFS permissions, which are features of the Windows operating system and Azure Files.
While macOS does support the SMB protocol, it may not fully support all features of SMB 3.0 or later, such as Microsoft Entra Kerberos authentication.
I hope this helps! Please let me know if you have any other questions or need further clarification.