Azure Files Entra Auth only

Cloud-Native Identity with Azure Files: A Game Changer for AVD & FSLogix

Cloud-Native Identity with Azure Files: A Game Changer for AVD & FSLogix

Microsoft has released one of the most significant updates to Azure Virtual Desktop architecture in years: Azure Files now supports Entra ID–only authentication for SMB access (preview).

This means FSLogix profiles hosted in Azure Files no longer require:

  • Active Directory Domain Controllers
  • Azure AD Domain Services
  • Hybrid identity
  • NTLM/Kerberos authentication paths

This update unlocks true cloud-native AVD with zero Windows Servers.


Why This Matters

Historically, FSLogix demanded a domain-joined identity backend for SMB access. Even in cloud-first AVD deployments, organizations were forced to maintain either Active Directory Domain Services or rely on Storage Account Keys as a workaround. The root causes were straightforward:

  • SMB authentication depended on Kerberos or NTLM
  • Azure Files SMB only supported AD-backed identities
  • Session hosts required domain credentials to authenticate

With this update, Azure Files can now authenticate SMB clients directly using Entra ID OAuth tokens—completely eliminating the need for legacy directory services.

For AVD architects, this changes everything.


What’s New

Azure Files now supports:

  • Entra ID–based OAuth tokens for SMB
  • RBAC-based permissioning
  • No reliance on Kerberos or NTLM
  • Entra ID Joined VM support for FSLogix
  • Token-based access that aligns with Zero Trust principles
  • Directory and file-level permissions configurable via the Azure Portal (no more icacls from domain-joined machines!)

This is the first time Microsoft officially supports FSLogix profiles on Azure Files without any AD.


Architecture: Before vs After

🏢 Before: FSLogix on Azure Files (Traditional Model)

Traditional AVD Architecture with Active Directory
Traditional architecture requiring domain controllers, Azure AD DS, or hybrid identity for FSLogix profile access.

☁️ After: Cloud-Native FSLogix Using Entra ID Only (Preview)

Modern Cloud only AVD Architecture with Entra ID
Simplified cloud-native architecture: Entra joined session hosts authenticate directly to Azure Files via OAuth tokens.

Before You Begin: Prerequisites

For Cloud-Only Identities (Preview):

  • Windows 11 Enterprise/Pro (single or multi-session)
  • Windows Server 2025 with latest cumulative updates
  • Clients must be Microsoft Entra joined (not hybrid joined or AD-only)

For Hybrid Identities:

  • Windows 11 Enterprise/Pro (single or multi-session)
  • Windows 10 Enterprise/Pro, version 2004 or later with KB5007253
  • Windows Server 2022/2025 with latest cumulative updates
  • AD DS with Microsoft Entra Connect or Entra Connect cloud sync

Important Considerations:

  • You can only use one identity source per storage account
  • MFA must be disabled for the storage account’s service principal
  • The WinHTTP Web Proxy Auto-Discovery Service must be running
  • The IP Helper service (iphlpsvc) must be running

Configuration Guide

For the full step-by-step instructions, see the official Microsoft documentation:


🔍 Why This Is a Breakthrough for AVD

1. Removes AD Dependency

No more deploying and maintaining domain controllers or Azure AD Domain Services just for FSLogix. Your identity layer is fully managed by Microsoft Entra ID.

2. Enables Serverless AVD

Build complete AVD environments with zero Windows Server infrastructure. Session hosts, storage, and identity—all cloud-native PaaS/SaaS.

3. Simplifies Networking

Eliminate the need for site-to-site VPNs or ExpressRoute connections to on-premises AD. No more firewall rules for Kerberos/LDAP traffic.

4. Reduces Cost

  • No domain controller VMs to run 24/7
  • No Azure AD DS monthly fees (~$109+/month)
  • Reduced networking costs
  • Less operational overhead

5. Future Aligned (Zero Trust)

Token-based authentication with RBAC aligns perfectly with Zero Trust principles. No legacy protocols, no persistent credentials on the wire.


🌍 Regional Availability

Hybrid Identities: Available in Azure Public, Azure US Gov, and Azure China 21Vianet clouds.

Cloud-Only Identities (Preview): Currently available only in Azure Public cloud, limited to default share-level permissions for all authenticated identities.


📌 Preview Limitations

Before diving in, be aware of these current limitations:

LimitationDetails
Windows Build RequirementsCloud-only requires Windows 11 or Server 2025; hybrid needs Win10 2004+ or Server 2022+ with specific KBs
Single Identity SourceYou can’t mix Entra Kerberos with AD DS or Entra Domain Services on the same storage account
MFA Exclusion RequiredThe storage account service principal must be excluded from MFA policies
Cloud-Only RBACCloud-only identities can only use default share-level permissions (no per-user/group RBAC yet)
File Explorer PermissionsConfiguring ACLs via Windows File Explorer isn’t supported for cloud-only identities
External Identity LimitsFSLogix on AVD is supported for external B2B users, but cross-cloud guests are not
Not Yet GAThis is still in preview—expect changes before general availability

🧭 What This Means for FSLogix

This update fundamentally changes how you can architect FSLogix profile storage:

Old RequirementNew Reality
AD DS domain controllers❌ Not required
Azure AD Domain Services❌ Not required
Hybrid domain join❌ Not required
On-premises network connectivity❌ Not required
Kerberos/NTLM protocols❌ Not required

What Works Today:

  • ✅ FSLogix profile containers on Azure Files
  • ✅ MSIX App Attach from Azure Files
  • ✅ Entra ID joined session hosts
  • ✅ Cloud-only user accounts
  • ✅ Azure Portal-based ACL management

Cross-Platform VDI Impact: While this announcement is most impactful for AVD, the underlying Azure Files capability benefits any VDI platform that supports Entra ID joined session hosts, including:

  • Citrix DaaS (with Entra joined VDAs)
  • VMware Horizon (with Entra joined desktops)
  • Third-party VDI solutions

🔧 Troubleshooting

If you encounter issues, Microsoft provides a debugging cmdlet:

# Install the AzFilesHybrid module (v0.3.0+)
Install-Module -Name AzFilesHybrid
diagnosticsDebug-AzStorageAccountAuth -StorageAccountName "yourstorageaccount" -ResourceGroupName "yourRG"

This cmdlet performs basic checks on your Entra ID configuration and helps identify common misconfigurations.

Common Issues:

  • Service principal password expired (for manual preview setups)
  • MFA not properly excluded
  • Missing admin consent on API permissions
  • Client not configured for cloud Kerberos ticket retrieval

📣 Final Thoughts

This is the biggest identity improvement for AVD since Azure AD Join. For the first time, you can build a 100% cloud-native AVD environment without any Active Directory dependency.

The ability to configure directory and file-level permissions directly in the Azure Portal is a massive quality-of-life improvement—no more spinning up domain-joined jump boxes just to run icacls commands.

If you’re planning a greenfield AVD deployment or looking to modernize an existing environment, this preview is worth evaluating today.

More insights

Get started on the right path to cloud success today. Our Crew are standing by to answer your questions and get you up and running.