-
Notifications
You must be signed in to change notification settings - Fork 289
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Volume Mounting - Auth issue with Azure AD logins? #1352
Comments
This seems like quite an important issue, many companies use AzureAD to manage their user credentials including their developers (unfortunately). Has anyone found a workaround for this issue or diagnosed the cause of this issue? |
I have the same issue here is my diagnostic
|
Here are the workarounds I tried
|
Ok it took some trial and error here was my fix
EDIT: |
Unfortunately, creating a local user as a workaround won't work for me. It bypasses company security policy. I'll need an actual fix or a workaround which does not involve adding a local account. |
whats the best workaround for this atm? i just got the same problem in win10 after running upgrades on a machine i don't use that often. It now has the latest win 10 updates and the latest docker version (via builtin update mechanism): Version 18.06.0-ce-win72 (19098), stable channel |
Any more movement on this from anyone? Using a local user is not a solution for many corporate environments. |
Doesn't even appear to work locally for me... new user has full control over my development directories but permission is still denied. This really needs a permanent fix, guys - Docker for Windows is barely usable right now for anyone using Azure AD, and not everybody can implement the necessary workarounds. |
Related: #132 |
The instructions posted here #132 (comment) provide a decent workaround (definitely not a solution). One key piece missing from those instructions is to use the exact same username (and maybe password?) as your Azure AD account. So if your AD account is "AzureAD\UserABC" then the new local user you create should be "UserABC". When I did this I also used the same password as I have for my Azure AD account. When looking under Now when I check the box to share the C: drive in the Docker for Windows dialog it doesn't uncheck (I also wasn't prompted for a password - though I had previously tried with my AD username / password). Running |
I have been attempting to follow this aws guide for local development which uses docker. I also am using Azure AD to log in, and it is causing permissions problems. I was able to follow seangwright's instructions to allow sharing of my C drive by creating a local admin with the same name. However, this use case of docker seems to require more privileges which are not allowed with the Azure AD account. I validated this is the case by successfully running the test on another laptop which uses a local admin account. I went so far as to create a local admin on this laptop I currently am logged on with Azure AD, but was not successful in running the example. |
Creating another non AzureAD user on every one of my developers machines and going through the hoops to create the right file shares is not a solution. This needs to be addressed. |
Are there any updates about this issue? The problem is still present in the latest version in caso of AAD accounts |
Same problem here as of last week - any update? I've tried a local DockerAdmin account to use when prompted, after running the command line (--rm). Have tried different local folders to ensure the account has full permission to share that folder. |
We need a real solution for this, as domain policies forbid the creation of a local user account. |
this really sux. and it's broken a lot more than docker too. MS have also broken the ability for hyper-v |
I assume that all of these issues will be solved at once when Docker for Windows will leverage WSL2. I highly doubt they’re going to fix this for Hyper-V. So we need to be patient for a few more months for the official release.
|
The local user workaround was working for me until this morning, now that has stopped working too. Waiting a few months isn't an option - I have work to do this morning. I've been trying to get the rest of my team to adopt Docker - this is going to kill that effort. Update: Using the same username as my AzureAD account allows Docker to access the drive, but not my files - still no good |
@ariddlestone I also used the local user workaround, but while the directories are mounting, none of the files are visible. Any additional help to solve this? |
@gmattcrowley I eventually solved it by having my projects in a separate folder on the c: drive, not in my users folder, and making a local user with my name and password. |
I'm not allowed to create a local user account due to company policies. Looking for a real solution too! |
Whoa this issue has been open for over 2 years. We use AzureAD in my team and this issue seriously limits using Docker for development. It's really hard working without volume mounting. Here's a question: Would anyone from Microsoft be willing to help fix this? Here's an animated gif to visualize this: |
@mattbell87 wow, thank you so much for pointing this out! I've battled this issue for at least a year without resolution. Confirmed I am able to use a corporate Azure AD account and share local volumes with the latest edge build. Upgrading from stable (2.1.0.5 as of this writing) to edge (2.1.7.0) did the trick. Here is my version info for anyone interested:
|
Looks like this update is now available in stable (2.2.0.0), although some of us are having trouble with file changes on the host not showing up in container volumes (#5530)... |
This is fixed with the new filesharing implementation in 2.2.0.3, so closing this ticket. |
Closed issues are locked after 30 days of inactivity. If you have found a problem that seems similar to this, please open a new issue. Send feedback to Docker Community Slack channels #docker-for-mac or #docker-for-windows. |
Expected behavior
Given a user logs in using Azure Active Directory credentials to a AAD-joined Windows 10 machine
and provides those credentials to Docker for Shared Drives sharing
then containers should be able to share volumes from the host
Actual behavior
Sharing the volume fails silently in the tasktray GUI, and with 'Error response from daemon: An error occured while sharing drive' from powershell. Log files (below) seem to indicate a failure in the VM to connect.
Note that volume sharing via a local user seems to work fine.
The sequence of events in the log file appears to indicate that the share was initially created successfully:
... but apparently then there is a problem mounting the share in the VM...
...so the share is torn down, and then recreated (?!) and this time the create fails (note: the username used now seems to be missing the domain prefix):
Information
Full log attached: log.txt
Steps to reproduce the behavior
Workaround
As a number of commentators below have noted, a 'workaround' is to create a local user with the same name and password as your AAD user, and give them local admin. This works for as long as the passwords stay in-sync, and provided you don't have a restriction on doing so in the first place (which wouldn't be uncommon in an organisation using AAD, methinks). The manual overhead would also likely be seen as problematic across a large fleet.
The text was updated successfully, but these errors were encountered: