Share via

Access denied to azure SMB file share over public network

Admin D. Horton 0 Reputation points
2026-03-03T15:55:31.7566667+00:00

I have an azure file share that I cannot map to as I am getting access denied.

  1. I have the public IP of our firewall in the network settings to allow access.
  2. I am using AD/Entra user access control
  3. I am using the maximum SMB security setting
  4. All our computers are windows 11 and are using SMB 3.1.1 to all our local shares
  5. I have the share domain joined
  6. I have role-based access setup
  7. I have storage blob data owner and storage file data smb admin roles.
  8. I have users with storage file data smb share reader role
  9. The connect script shows a successful test connection, but authentication keeps failing with access denied regardless of the role assigned, and I am the owner.
  10. I can browse the file share via the portal, but that is all.

What am I missing

Azure Storage
Azure Storage

Globally unique resources that provide access to data management services and serve as the parent namespace for the services.

{count} votes

Answer accepted by question author
  1. Venkatesan S 4,315 Reputation points Microsoft External Staff Moderator
    2026-03-03T17:02:28.3433333+00:00

    Hi Admin D. Horton,

    Thanks for reaching out in Microsoft Q&A forum,

    When you are able to browse the Azure file share in the portal, and Test-NetConnection succeeds, but mapping the drive returns “Access Denied”, this typically indicates that networking is functioning correctly and the issue lies with authentication or authorization.

    Based on your description, the storage account is reachable, the firewall is correctly configured, and SMB 3.1.1 is in use. The failure is occurring during identity validation or permission enforcement.

    Azure Files with AD DS or Microsoft Entra authentication requires two permission layers:

    1. Share-level (Azure RBAC)

    Assign roles like Storage File Data SMB Share Reader, Contributor, Elevated Contributor, or Administrator.

    These roles control access at the Azure level (control plane).

    2. NTFS permissions (inside the file share)

    • You must configure NTFS ACLs on the root folder of the share.
    • RBAC alone is not enough without NTFS permissions, users will get **“**Access Denied”, even if authentication succeeds or they are subscription owners.

    To confirm whether the issue is identity-related, temporarily map the drive using the storage account key:

    net use Z: \\<storageaccount>.file.core.windows.net\<sharename> /user:Azure\<storageaccount> <storagekey>
    

    If this works, the issue is definitively related to AD/Entra authentication or NTFS permissions.

    User's image

    You need to enable NTLM v2 authentication mechanism.

    Reference:

    Kindly let us know if the above helps or you need further assistance on this issue.

    Please do not forget to 210246-screenshot-2021-12-10-121802.pngand “up-vote” wherever the information provided helps you, this can be beneficial to other community members.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.