@Michaël Gagnon Welcome to Microsoft Q&A Forum, Thank you for posting your query here!
For better understating the issue: Are you able to access azure Blob Storage container?(In same storage account)
Check your networking configuration (proxy configuration, IP rules, Azure network settings for storage, etc) in your organization to ensure Azure services can be fully accessed.
The error message "This machine doesn't seem to have access" can occur when the machine is unable to access the Azure file share. There could be several reasons for this error. One possible reason is that the machine is not joined to the same domain as the Azure file share Another possible reason is that the machine's IP address is not allowed to access the Azure file share due to firewall rules. You can check if the machine's IP address is allowed by temporarily changing the firewall rules to allow access from all networks<sup>.</sup>
Note: By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. For this reason, if you set Public network access to Disabled after previously setting it to Enabled from selected virtual networks and IP addresses, any resource instances and exceptions you had previously configured, including Allow Azure services on the trusted services list to access this storage account, will remain in effect. As a result, those resources and services may still have access to the storage account after setting Public network access to Disabled.
In case that does not work, I suggest changing the IP address with **10.4.*.4 or you can remove all the entries containing <acc>.file.core.windows.net.
Troubleshooting Storage Firewall Issues: https://techcommunity.microsoft.com/t5/azure-paas-blog/troubleshooting-storage-firewall-issues/ba-p/1944730
Troubleshooting Storage Firewall Issues
To assign an Azure role to an Azure AD identity, using the Azure portal, follow these steps:
- In the Azure portal, go to your file share, or create a file share.
- Select Access Control (IAM).
- Select Add a role assignment
- In the Add role assignment blade, select the appropriate built-in role from the Role list.
- Storage File Data SMB Share Reader
- Storage File Data SMB Share Contributor
- Storage File Data SMB Share Elevated Contributor
- Leave Assign access to at the default setting: Azure AD user, group, or service principal. Select the target Azure AD identity by name or email address. The selected Azure AD identity must be a hybrid identity and cannot be a cloud only identity. This means that the same identity is also represented in AD DS.
- Select Save to complete the role assignment operation.
If the issue still persist, Please let me know I would like to work closer on this issue
Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.