Problem Description:
We are having issues trying to resolve azure storage access for service accounts (iusr_app) on our azure ad domain service called: TESTDOMAIN
The iusr_app service account is in its own OU which is in aadds.
We have a group in Azure AD called: SETUP which contains our users, this group is linked to rbac role: Storage File Data SMB Share Contributor and syncs with TESTDOMAIN. When a user logs into TESTDOMAIN on the Azure VM and runs "net use" to map to the storage account this works without asking for any credentials.
But if we remove the user from the SETUP group in Azure or if we log into the VM using the TESTDOMAIN\iusr_app account neither can map to the storage account.
System error 5 - access denied.
We have tried setting up service principals / system managed ID and User managed ID in Azure as per the MS documentation.
But none of these seem to have any effect.
We have also tried setting up storage accounts as follow:
storage1 > config > Identity-based access for file shares Azure Active Directory Domain Services (Azure AD DS) = enabled
storage2 > config > Identity-based access for file shares Azure Active Directory Domain Services (Azure AD DS) = Disabled and firewall disabled.
Required outcome:
- Users in SETUP should be able to continue to access Azure Storage account using mapping on TESTDOMAIN as long as they are in the SETUP group in Azure AD.
and/or
- For accounts like the iusr_app which is not in 365 to be able to also access the Azure Storage and map the storage without prompting for credentials.