Hybrid AADJ Windows 11 clients not obtaining Entra Kerberos ticket for Azure Files (cifs/<storage>.file.core.windows.net)

Eric Cote - adm 0 Reputation points
2025-12-05T18:28:18.9333333+00:00

We are deploying Azure Files with Microsoft Entra Kerberos authentication in a hybrid environment. Our Windows 11 Pro 25H2 hybrid-joined device meets all prerequisites:

DSREGCMD /STATUS

AzureAdJoined = YES

DomainJoined = YES

AzureAdPrt = YES

CloudTgt = YES

NgcSet = YES (WHfB provisioned successfully)

  • Executing Account Name = domain.local\username, ******@domain.com

Device is Intune-enrolled

Zscaler Private Access forwarding SMB/445 to the private endpoint

DNS resolution correctly returns privatelink IP

Storage account uses Standard tier, identity enabled

Azure Files Entra Kerberos enabled

Required RBAC roles assigned (user + storage MI)

However:

  • Connecting to: \\storage-account-name.file.core.windows.net\<share> always prompts for credentials.
  • klist never shows a cloud Kerberos ticket for: cifs/storage-account-name.file.core.windows.net
  • Authentication falls back to NTLM and fails.
  • All local device prerequisites appear healthy.
  • This persists even after WHfB provisioning and CloudKerberos-enabled registry configuration.

Does someone know why we can't get Entra Kerberos Ticket? Whatever we log in with domain\username or ******@domain.com or PIN (WHfB), kerberos request are ALWAYS answered by local AD.

We've even created a reg key on a test device to make sure kerberos request to domain.com are sent to Entra and not local AD but it still fails.

Azure Files
Azure Files
An Azure service that offers file shares in the cloud.
{count} votes

1 answer

Sort by: Most helpful
  1. Ganesh Patapati 10,615 Reputation points Microsoft External Staff Moderator
    2025-12-10T10:23:48.03+00:00

    Hi @ Eric Cote - adm,

    From the backend, it appears the storage account was deleted. Can you confirm this or let me know if a new account was set up with the same settings?

    However, when discovered that when a computer is in hybrid mode, even if an Azure storage account is configured to use Entra Kerboros as authentication, ADDS will ALWAYS have precedence to Entra Kerberos.

    So, even if you can log on your pc with your Entra credentials (not your local AD credentials), the authentication toket will still be provied by local AD and not Entra Kerberos.

    In other words, what I was trying to achieve would never work.

    I'll need to set my storage account to use ADDS until all my computers are only Entra joined.


    Hope this clarifies!

    If above is unclear and/or you are unsure about something add a comment below.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.