Taking ownership of folders in domain joined Azure File Share fails with access denied

Ukkaapie 31 Reputation points
2025-07-24T17:37:36.81+00:00

Hi,

I have an issue where I have joined Azure Storage Account to our domain which has been successful. I can create folders in a file share and I can set permissions on the share.

We have a hybrid environment with AD Connect for the synchronisation. My admin account has Storage File Data SMB Share Elevated Contributor role assigned.

When I try to set the ownership on a folder/file, I get access denied. Even if I have created it and try to set it to my admin account it fails.

What I have tried:

  • Mapping a network drive using my admin account
  • Mapping a network drive using the storage account key
  • Setting the share level permission on the configure AD DS of the storage account (tried all 3 roles)

This happens on brand new storage accounts with no other information. We use private endpoints with VNets linked to DNS Resolver and Private DNS.

When I run "takeown.exe /F \<storage account>.file.core.windows.net<share>\Test", I get "The current logged on user does not have the ownership privileges on the fil (or folder) \<storage account>.file.core.windows.net<share>\Test"

Any help would be greatly appreciated as we have tried everything short of logging a ticket with Microsoft

Kind regards

Azure Storage
Azure Storage
Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Suwarna S Kale 3,951 Reputation points
    2025-07-25T02:28:41.6166667+00:00

    Hello Ukkaapie,

    Thank you for posting your question in the Microsoft Q&A forum. 

    The inability to set ownership on Azure Files despite having the Storage File Data SMB Share Elevated Contributor role typically stems from Active Directory permission gaps or authentication misconfigurations. While Azure RBAC grants share-level access, actual file/folder ownership requires explicit AD permissions, including Take Ownership rights at both the domain policy and AD computer object levels.  

    Hybrid environments often face synchronization delays via Azure AD Connect, preventing permission propagation, while Kerberos ticket or SPN issues can silently block ownership changes. DNS misresolution of private endpoints may force fallback to storage key authentication, which doesn’t support ownership operations. To resolve, verify AD permissions, force a delta sync, and validate Kerberos SPNs, while ensuring private endpoint DNS records correctly resolve. Tools like icacls can manually assign ownership if policies are correctly configured. For persistent issues, temporary Domain Admin rights or Azure Files REST API scripts may serve as workarounds. Always cross-check Event Viewer and Azure Storage metrics for underlying authentication failures. 

    If the above answer helped, please do not forget to "Accept Answer" as this may help other community members to refer the info if facing a similar issue. Your contribution to the Microsoft Q&A community is highly appreciated. 


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.