-
Notifications
You must be signed in to change notification settings - Fork 289
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sharing drives does not work for Azure AD user accounts #132
Comments
When the popup appears, what is the value prefilled for user name ? |
I've downloaded the beta version and it's a bit different - there is a prefilled user name, but when I put my password in, the popup disappears and the C drive checkbox goes back to being unchecked. I'm just checking the log... |
Ok, we might have to setup a lab to further test AzureAD related scenarios. |
the problem with using a local account to share the drive is that you hit the problem mentioned in the troubleshooting - you can't be logged in as your AzureAD account and run docker commands, as that's not the same user account as you used to share the C drive... |
Here's the diagnostic ID running this on the beta version: B84C9FF9-58D6-4C1D-8BBA-D94E145DE072/2016-10-06_12-23-37 |
In the log, got the error |
With the beta you should be able to:
What you can't do is switch from different user account sessions and run docker commands (all docker commands must be done from the same session, but the account used for drive sharing can be different) |
Thanks! Two queries though - the popup credentials won't let me change the username to use the local admin account, it just says it's an invalid login/password when I submit it. Secondly, I don't know what you mean about the correct ntfs rights for the local account, could you explain? Thanks again. |
as a username just put your username without the AzureAD prefix (and make sure the account password is not expired) The thing about NTFS rights is that you have to make sure the local user has the rights to read and/or write in the folder you want to mount as a volume in a container |
OK, that works! Great, thanks for the support. I'll look out for updates where it stops being necessary to use a local admin account |
Sadly, I spoke too soon. Whilst I can run a command like I verified I can't access other account folders in |
Try to add read access directly to your local user on the folder you want to mount. I think that for security reasons, rights on the administrators group are ignored if you are not in an elevated context (which is not possible remotely) |
Closing this issue due to inactivity. Please re-open if the suggested solution does not work or if there is another update. |
Sorry, yes I can confirm adding admin rights to the folder you want to mount, and authenticating as the admin user account in Docker works. Thanks! |
This issue is back again - docker for windows version up to date. Diagnostic ID: 06C36E21-8FEF-43AA-86E2-79C81B2558BE/2017-07-05_14-42-09 After clicking on C drive it asks for credential but nothing happens. Check box gets unchecked automatically. |
I'm experiencing the same issue as @uday31in . My log id is E87073EA-E0FA-422F-8846-291E2006D435/2017-07-24_15-59-00 I can share the drive with a non-AzureAD admin account on my pc, but then I am unable to do work with Docker running as my AzureAD account. |
I can confirm I am seeing the same behavior with my AzureAD account. |
I can confirm the issue on Docker for Windows 17.09.0-ce, build afdb6d4 |
any update on this? |
I had a similar experience with Docker for Windows 17.09.0-ce-win33 (13620) Stable - 8c56a3b. My local admin account is using the format of DOMAIN\username, but the machine is not traditionally domain joined, that account is reflected in Azure AD. The Shared Drive checkbox just clears after entering the credentials. I switched to using a non-admin account that is also on my computer, which happens to be a MSA account (in email format) and that worked fine. |
Have the same issue. Using a company laptop that is being authenticated by AzureAD. |
17.09.1-ce-win42 (14687) same issue |
This is still an issue, and should certainly be re-opened - rather, it should never have been closed in the first place, as only a workaround was identified and the root cause (Docker's inability to handle AzureAD permissions) was never addressed. |
Why is this issue closed? |
Reopen this. Even the proposed work around does not work. |
This needs to be reopened. Creating another non AzureAD user on every one of my developers machines and going through the hoops to create the right file shares is not a solution. |
I posted what I found to be the simplest workaround on the other issue that is still open for anyone that can't wait for this to be fixed. |
I've read suggestions above that the local user should have the same name as the AzureAD account. While this initially worked for me, I ran into problems later on: At this point, you are supposed to grant the local user access to this directory, but the Security Properties UI was not able to grant different permissions to users with the same name even though they belong to different domains. Here's what worked for me:
|
This issue is of particular impact when the user is trying to debug an application using Visual Studio. The F5 debug experience in VS will attempt to mount various folders deep in the User/AppData folder which a local docker account will not be able to access. Or at least seems to be unable to access. The particular path that got me here was: |
@rn could you reopen this please? |
seconding @mattcowen - hitting this issue as we speak. Can we re-open? |
@rn @mattcowen Please re-open. This is blocking us completely, as domain policies do not allow the creation of local user accounts and thus making the workaround and with that docker usage absolutely impossible. |
This is not fixable with our current file sharing solution, which is built on Samba. The restriction is in Samba, not in Docker Desktop, so we (Docker) can't do anything about it. Having said that, we are looking at moving away from Samba, in which case this would no longer be an issue. |
@stephen-turner Is there any other reasonable workaround rather than creating a local user for this issue? This issue is hurting us bad! |
@stephen-turner is there an open issue to track moving away from Samba? I think this is a show stopper for a lot of people so it would be nice to have an issue to up-vote in order to prioritize it based on customer needs |
Don't worry, we are fully aware of the need. |
@stephen-turner Any update on this issue? |
In fact, yes. The replacement has already been released on the Edge channel so you can test it now. |
@stephen-turner OK Thanks for the quick response. |
I switched to the Edge channel (separate issue but I had to download Edge independently; switching to Edge from within the Docker Desktop client no longer works correctly, it just restarts in Stable), and I'm still unable to share drives with an Azure AD account. On Docker 2.1.6.1 (40900), attempting to share
|
Thanks, @out-of-band. We think we know why this is: there's a race condition at startup that means it occasionally gets into the wrong filesharing mode. There will be another Edge release next week fixing this. |
This workaround had been working for me for 104 days, just stopped working. I do not think it's a password expiry issue on my same-name non AzureAD account. I tried using Windows Properties to set full control for my UserName account and AzureAD\UserName account. The only changes I made to my config recently was to remove some old Docker images and to update docker-compose and docker-ce within my ubuntu 18 WSL Windows Subsystem for Linux (which I think uses Docker Desktop as its daemon natively over tcp://localhost:2375 per this tutorial. I am using Docker Desktop Community v 2.1.0.1 (37199) stable. I like the ability to control the containers started from within WSL running vscode remotely from within vscode in Windows, and to be able to use the networks interchangeably. I am thinking now it is a better approach to run all Docker including Hub from within the Ubuntu WSL. |
@datocrats-org Please try the new Edge release. As explained above, we are not using Samba any more. |
And @out-of-band, your bug should be fixed in the latest Edge release. |
Yep thanks @stephen-turner. I've been on the new Edge release since about 15 minutes after it was published and it's working great for me. Thank you! |
The latest Edge release also worked for me! |
Closed issues are locked after 30 days of inactivity. If you have found a problem that seems similar to this, please open a new issue. Send feedback to Docker Community Slack channels #docker-for-mac or #docker-for-windows. |
Hi,
I'm attempting to share my C: drive as per the instructions here - https://docs.docker.com/docker-for-windows/#/shared-drives.
However, it doesn't seem possible to use my login details in the Shared Drives username/password dialog - none of the usernames of the form AzureAD\username, or email@domain or AzureAD\email@domain get through the login.
I've tried setting up a local admin user, "admin", and I can successfully share the drive using that account, but according to the troubleshooting, https://docs.docker.com/docker-for-windows/troubleshoot/#verify-domain-user-has-permissions-for-shared-drives-volumes, you have to run the docker commands using the same user as you have used to share the drive.
The same troubleshooting mentions that the solution is to login with a domain user, which in my case I assume is the AzureAD user, but as I mentioned, Docker is not accepting the credentials.
Information
Diagnostic ID: B84C9FF9-58D6-4C1D-8BBA-D94E145DE072/2016-10-06_10-14-53
This is on Windows 10, version 1607, OS Build 14393.222.
Steps to reproduce the behavior
The text was updated successfully, but these errors were encountered: