Mount cloud storage as local drive CloudMounter is of great help to the owners of laptops with low-capacity SSDs. You can outsource your files and documents to most popular cloud services and mount cloud drive accounts to your PC without having to save cloud files on your computer.
- Mount Cloud Storage As Local Drive Free
- Mount Cloud Storage As Local Drive
- Mount Cloud Storage As Local Drive Mac
- Mount Cloud Storage
- CloudMounter for Linux allows managing cloud storages on Linux computer. This cloud manager for Linux allows getting access to all your online files. If you are searching for Dropbox client for Linux, Google Drive app for Linux or OneDrive client for Linux it is the best choice.
- Finally, click on ‘Mount’ to mount the cloud storage drive as a mapped drive. Step 12: To add a new cloud storage drive, simply click on ‘ Add new connection ’ and repeat the same steps all over again. Step 13: You can always change the drive letter or unmount the drive by clicking on ‘Unmount’.
Azure Files supports identity-based authentication over Server Message Block (SMB) through two types of Domain Services: on-premises Active Directory Domain Services (AD DS) and Azure Active Directory Domain Services (Azure AD DS).We strongly recommend you to review the How it works section to select the right domain service for authentication. The setup is different depends on the domain service you choose. This article focuses on enabling and configuring Azure AD DS for authentication with Azure file shares.
If you are new to Azure file shares, we recommend reading our planning guide before reading the following series of articles. Disk graph 2 1 15 mm.
Note
Azure Files supports Kerberos authentication with Azure AD DS with RC4-HMAC encryption. AES Kerberos encryption is not yet supported.Azure Files supports authentication for Azure AD DS with full synchronization with Azure AD. If you have enabled scoped synchronization in Azure AD DS which only sync a limited set of identities from Azure AD, authentication and authorization is not supported.
Prerequisites
Before you enable Azure AD over SMB for Azure file shares, make sure you have completed the following prerequisites:
- Select or create an Azure AD tenant.You can use a new or existing tenant for Azure AD authentication over SMB. The tenant and the file share that you want to access must be associated with the same subscription.To create a new Azure AD tenant, you can Add an Azure AD tenant and an Azure AD subscription. If you have an existing Azure AD tenant but want to create a new tenant for use with Azure file shares, see Create an Azure Active Directory tenant.
- Enable Azure AD Domain Services on the Azure AD tenant.To support authentication with Azure AD credentials, you must enable Azure AD Domain Services for your Azure AD tenant. If you aren't the administrator of the Azure AD tenant, contact the administrator and follow the step-by-step guidance to Enable Azure Active Directory Domain Services using the Azure portal.It typically takes about 15 minutes for an Azure AD DS deployment to complete. Verify that the health status of Azure AD DS shows Running, with password hash synchronization enabled, before proceeding to the next step.
- Domain-join an Azure VM with Azure AD DS.To access a file share by using Azure AD credentials from a VM, your VM must be domain-joined to Azure AD DS. For more information about how to domain-join a VM, see Join a Windows Server virtual machine to a managed domain.NoteAzure AD DS authentication over SMB with Azure file shares is supported only on Azure VMs running on OS versions above Windows 7 or Windows Server 2008 R2.
- Select or create an Azure file share.Select a new or existing file share that's associated with the same subscription as your Azure AD tenant. For information about creating a new file share, see Create a file share in Azure Files.For optimal performance, we recommend that your file share be in the same region as the VM from which you plan to access the share.
- Verify Azure Files connectivity by mounting Azure file shares using your storage account key.To verify that your VM and file share are properly configured, try mounting the file share using your storage account key. For more information, see Mount an Azure file share and access the share in Windows.
Regional availability
Azure Files authentication with Azure AD DS is available in all Azure Public and Gov regions.
Overview of the workflow
Before you enable Azure AD DS Authentication over SMB for Azure file shares, verify that your Azure AD and Azure Storage environments are properly configured. We recommend that you walk through the prerequisites to make sure you've completed all the required steps.
Next, do the following things to grant access to Azure Files resources with Azure AD credentials:
- Enable Azure AD DS authentication over SMB for your storage account to register the storage account with the associated Azure AD DS deployment.
- Assign access permissions for a share to an Azure AD identity (a user, group, or service principal).
- Configure NTFS permissions over SMB for directories and files.
- Mount an Azure file share from a domain-joined VM.
The following diagram illustrates the end-to-end workflow for enabling Azure AD DS authentication over SMB for Azure Files.
Enable Azure AD DS authentication for your account
To enable Azure AD DS authentication over SMB for Azure Files, you can set a property on storage accounts by using the Azure portal, Azure PowerShell, or Azure CLI. Setting this property implicitly 'domain joins' the storage account with the associated Azure AD DS deployment. Azure AD DS authentication over SMB is then enabled for all new and existing file shares in the storage account.
Keep in mind that you can enable Azure AD DS authentication over SMB only after you have successfully deployed Azure AD DS to your Azure AD tenant. For more information, see the prerequisites.
To enable Azure AD DS authentication over SMB with the Azure portal, follow these steps:
- In the Azure portal, go to your existing storage account, or create a storage account.
- In the Settings section, select Configuration.
- Under Identity-based access for file shares switch the toggle for Azure Active Directory Domain Service (AAD DS) to Enabled.
- Select Save.
The following image shows how to enable Azure AD DS authentication over SMB for your storage account.
To enable Azure AD DS authentication over SMB with Azure PowerShell, install the latest Az module (2.4 or newer) or the Az.Storage module (1.5 or newer). For more information about installing PowerShell, see Install Azure PowerShell on Windows with PowerShellGet.
To create a new storage account, call New-AzStorageAccount, and then set the EnableAzureActiveDirectoryDomainServicesForFile parameter to true. In the following example, remember to replace the placeholder values with your own values. (If you were using the previous preview module, the parameter for enabling the feature is EnableAzureFilesAadIntegrationForSMB.)
To enable this feature on existing storage accounts, use the following command:
To enable Azure AD authentication over SMB with Azure CLI, install the latest CLI version (Version 2.0.70 or newer). For more information about installing Azure CLI, see Install the Azure CLI.
To create a new storage account, call az storage account create, and set the
--enable-files-aadds
property to true. In the following example, remember to replace the placeholder values with your own values. (If you were using the previous preview module, the parameter for feature enablement is file-aad.)To enable this feature on existing storage accounts, use the following command:
Assign access permissions to an identity
To access Azure Files resources with identity based authentication, an identity (a user, group, or service principal) must have the necessary permissions at the share level. This process is similar to specifying Windows share permissions, where you specify the type of access that a particular user has to a file share. The guidance in this section demonstrates how to assign read, write, or delete permissions for a file share to an identity.
We have introduced three Azure built-in roles for granting share-level permissions to users:
- Storage File Data SMB Share Reader allows read access in Azure Storage file shares over SMB.
- Storage File Data SMB Share Contributor allows read, write, and delete access in Azure Storage file shares over SMB.
- Storage File Data SMB Share Elevated Contributor allows read, write, delete and modify NTFS permissions in Azure Storage file shares over SMB.
Important
Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Administrative control is not supported with Azure AD credentials.
You can use the Azure portal, PowerShell, or Azure CLI to assign the built-in roles to the Azure AD identity of a user for granting share-level permissions. Be aware that the share level Azure role assignment can take some time to be in effect.
Note
Remember to sync your AD DS credentials to Azure AD if you plan to use your on-premises AD DS for authentication. Password hash sync from AD DS to Azure AD is optional. Share level permission will be granted to the Azure AD identity that is synced from your on-premises AD DS.
Mount Cloud Storage As Local Drive Free
The general recommendation is to use share level permission for high level access management to an AD group representing a group of users and identities, then leverage NTFS permissions for granular access control on directory/file level.
Assign an Azure role to an AD identity
To assign an Azure role to an Azure AD identity, using the Azure portal, follow these steps:
- In the Azure portal, go to your file share, or Create a file share.
- Select Access Control (IAM).
- Select Add a role assignment
- In the Add role assignment blade, select the appropriate built-in role (Storage File Data SMB Share Reader, Storage File Data SMB Share Contributor) from the Role list. Leave Assign access to at the default setting: Azure AD user, group, or service principal. Select the target Azure AD identity by name or email address.
- Select Save to complete the role assignment operation.
The following PowerShell sample shows how to assign an Azure role to an Azure AD identity, based on sign-in name. For more information about assigning Azure roles with PowerShell, see Manage access using RBAC and Azure PowerShell.
Before you run the following sample script, remember to replace placeholder values, including brackets, with your own values.
The following CLI 2.0 command shows how to assign an Azure role to an Azure AD identity, based on sign-in name. For more information about assigning Azure roles with Azure CLI, see Manage access by using RBAC and Azure CLI.
Before you run the following sample script, remember to replace placeholder values, including brackets, with your own values.
Configure NTFS permissions over SMB
After you assign share-level permissions with RBAC, you must assign proper NTFS permissions at the root, directory, or file level. Think of share-level permissions as the high-level gatekeeper that determines whether a user can access the share. Whereas NTFS permissions act at a more granular level to determine what operations the user can do at the directory or file level.
Azure Files supports the full set of NTFS basic and advanced permissions. You can view and configure NTFS permissions on directories and files in an Azure file share by mounting the share and then using Windows File Explorer or running the Windows icacls or Set-ACL command.
To configure NTFS with superuser permissions, you must mount the share by using your storage account key from your domain-joined VM. Follow the instructions in the next section to mount an Azure file share from the command prompt and to configure NTFS permissions accordingly.
The following sets of permissions are supported on the root directory of a file share:
- BUILTINAdministrators:(OI)(CI)(F)
- NT AUTHORITYSYSTEM:(OI)(CI)(F)
- BUILTINUsers:(RX)
- BUILTINUsers:(OI)(CI)(IO)(GR,GE)
- NT AUTHORITYAuthenticated Users:(OI)(CI)(M)
- NT AUTHORITYSYSTEM:(F)
- CREATOR OWNER:(OI)(CI)(IO)(F)
Mount a file share from the command prompt
Use the Windows net use command to mount the Azure file share. Remember to replace the placeholder values in the following example with your own values. For more information about mounting file shares, see Use an Azure file share with Windows.
If you experience issues in connecting to Azure Files, please refer to the troubleshooting tool we published for Azure Files mounting errors on Windows. We also provide guidance to work around scenarios when port 445 is blocked.
Configure NTFS permissions with Windows File Explorer
Use Windows File Explorer to grant full permission to all directories and files under the file share, including the root directory.
- Open Windows File Explorer and right click on the file/directory and select Properties.
- Select the Security tab.
- Select Edit. to change permissions.
- You can change the permissions of existing users or select Add.. to grant permissions to new users.
- In the prompt window for adding new users, enter the target user name you want to grant permission to in the Enter the object names to select box, and select Check Names to find the full UPN name of the target user.
- Select OK.
- In the Security tab, select all permissions you want to grant your new user.
- Select Apply.
Configure NTFS permissions with icacls
Use the following Windows command to grant full permissions to all directories and files under the file share, including the root directory. Remember to replace the placeholder values in the example with your own values.
For more information on how to use icacls to set NTFS permissions and on the different types of supported permissions, see the command-line reference for icacls.
Mount a file share from a domain-joined VM
The following process verifies that your file share and access permissions were set up correctly and that you can access an Azure File share from a domain-joined VM. Be aware that the share level Azure role assignment can take some time to be in effect.
Sign in to the VM by using the Azure AD identity to which you have granted permissions, as shown in the following image. If you have enabled on-premises AD DS authentication for Azure Files, use your AD DS credentials. For Azure AD DS authentication, sign in with Azure AD credentials.
Use the following command to mount the Azure file share. Remember to replace the placeholder values with your own values. Because you've been authenticated, you don't need to provide the storage account key, the on-premises AD DS credentials, or the Azure AD DS credentials. Single sign-on experience is supported for authentication with either on-premises AD DS or Azure AD DS. If you run into issues mounting with AD DS credentials, refer to Troubleshoot Azure Files problems in Windows for guidance.
You have now successfully enabled Azure AD DS authentication over SMB and assigned a custom role that provides access to an Azure file share with an Azure AD identity. To grant additional users access to your file share, follow the instructions in the Assign access permissions to use an identity and Configure NTFS permissions over SMB sections.
Next steps
For more information about Azure Files and how to use Azure AD over SMB, see these resources:
With the price of SSD shooting up, cloud drives have emerged as soul savior. Besides saving you from the purchasing expensive hard drives for storing data, cloud storage also allows you to get rid of the hassle of juggling different hard drives. There is no need to preach it. If you work with data, a large amount of data, you must know that cloud drives are crucial these days.
However, Apple doesn’t think the same which is why Mac devices do not integrate with cloud drives as smoothly as they do for iCloud. If you too find it troublesome to visit the web app of drives like Google Drive, Dropbox, and OneDrive to upload or download a file to your MacBook, here is a tool to make your life easier.
CloudMounter, as evident from its name, mounts cloud drives on your MacBook so that you can easily drag and drop the files as you would do with the files stored on the integrated drives.
Mount and encrypt cloud drives easily
CloudMounter is a software by Eltima that not only allows you to mount your cloud drives on your Mac but also encrypts them to add an external layer of security. CloudMounter supports the following cloud drives:
Mount Cloud Storage As Local Drive
- Dropbox
- Google Drive
- Amazon S3
- Microsoft OneDrive
- (S)FTP
- WebDAV
- Open Stack Swift Servers
- Backblaze B2
- Box cloud
Once you have installed the software in your MacOS device, you need to log into your cloud storage as you would do on the web app. Then, the cloud drives will appear as a volume with a colorful icon on your desktop. You can simply drag and drop files as you do with files stored on your internal storage.
![Local Local](https://cloudmounter.net/images/upload/cloudmounter/articles/cloudsoft/c1dropbox.jpg)
Apart from the mentioned cloud storage drives, Eltima is pushing hard to add more and more cloud services to ensure that software caters to a wide audience having accounts on different cloud storage. Moreover, you need to purchase a one-time license of the software, there is no need to worry about the updates as you are entitled to receive all the future additions if you have purchased the software.
Setting up all the accounts hardly takes a few minutes and if you have an account on Microsoft OneDrive, you will be impressed that CloudMounter uses the same interface as the web app itself. CloudMounter also supports two-factor authentication so there is no compromise on security.
After mounting the cloud drives on your Mac devices, dragging and dropping files it seamless. However, the speed with which the files are made available on your device depends entirely on the speed of your internet connection.
Eltima has worked hard to make sure that the software is user-friendly. There are different icons displayed adjacent to files to show you whether the files are uploading, downloading or the upload/download has failed.
Finder- friendly software
One of the reasons why we recommend CloudMounter software is its tight integration with the Finder. Once you have mounted the cloud drives, the drives appear in the Finder sidebar as your regular internal drives appear.
There is no need to manually add the drives as the drives are automatically mounted. This makes it easy for users to use different drives without going through the hassle of adding them to the Finder.
The Finder-friendly software is a necessity if you have accounts on multiple cloud storage drives.
Encrypt Cloud Drives For Added Security
Another striking feature of CloudMounter is its encryption capabilities. The software can encrypt all the files stored on your cloud storage account (except for the Google files as they have their own proprietary format which makes it impossible to encrypt). Once you have encrypted the files, anyone using the same copy of CloudMounter as you are using will see the encrypted versions of the files even if he/she is using a web app to sign-in into the cloud storage drives.
However, the feature comes with a caveat that you cannot encrypt individual files or folders. If you want cloud encryption, you need to encrypt whole drives and directories. To encrypt cloud drives, simply right click on any drive and select the “Encrypt” from it. Next step is to choose a password and then your files will be encrypted within a matter of a few seconds.
You will be pleased to know that CloudMounter uses 256-bit encryption mechanism which is military grade encryption used by many VPNs and other secure services. The time duration is taken to encrypt your data depends upon the volume of it. If you are planning to encrypt or decrypt a large chunk of data, it might take some minutes.
Regarding adding passwords for encryption, CloudMounter allows you to add the password to Keychain. However, you cannot use the Apple Keychain to recover password from within the CloudMounter app. You need to manually search for it in the Apple Keychain.
During the testing, it was found that CloudMounter’s decryption process is somewhat buggy and you could come across some issues while decrypting files. If your files are not getting decrypted, you can kill the software and try it again.
Pricing of CloudMounter
Although CloudMounter basic version is free to use, if you are interested in the idea of mounting multiple cloud drives on your device and further encrypt them, then the software will cost you $44.99 per license for 1 Mac, including a Lifetime Upgrades Guarantee. With that being said, there is a free trial of 14-days available if you want to try out the capabilities of the software. The free version allows you to integrate only one Google Drive, Dropbox or OneDrive account.
Pros
- Finder-friendly software
- Supports a wide range of cloud drives and FTP/SFTP clients
- Easy to set up and use
- Uses 256-bit encryption for encrypting cloud drives
- Sidebar icons for easy accessibility
Cons
- No support for SMB servers
- No support for Amazon Cloud Drive
- Multiple cloud connections are paid
Conclusion
Mount Cloud Storage As Local Drive Mac
CloudMounter is a great software for those who juggle between different cloud storage and often need to upload/download files. Its compatibility with multiple cloud storage providers is an added benefit. Moreover, the seamless and intuitive interface makes the software slick and easy to use.
Mount Cloud Storage
Encryption could be another reason why you should purchase this software. If you can look past certain bumps like connection issues and issues with decrypting files, CloudMounter is a great software at the price at which it is available