Looking into it. Thanks.
We have shipped a public preview of integration with AAD DS: https://azure.microsoft.com/blog/azure-active-directory-integration-for-smb-access-now-in-public-preview/
What we have in preview is a first step along a much larger roadmap for integration with AAD/AD for authentication and authorization. As the blog post says, this initial preview is really about Windows cloud VM access to the Azure file share with an AAD identity. Future refreshes to this feature will add non-Windows (Linux, macOS, etc) support, and the ability to mount the Azure file shares on-premises with your AAD identity. You can learn more about this in our Ignite session as well (at around 22:00): https://www.youtube.com/watch?v=GMzh2M66E9o
We’ll keep you updated on our progress. In the meantime, don’t hesitate to continue posting feedback on this feature below.
Program Manager, Azure Files
Likewise the Microsoft Monitoring Agent is supporting a Proxy Server
Please enhance Azure VM Agent accordingly!
there is a workaround to achieve this from Azure AD:
1 configure your company IP as trusted IP in Azure AD.
2 restrict access to Azure AD application 'Visual Studio Online' by setting location based access rules to block access when not at work
same here. need to re-deploy the template after the extension is finished in order te update the time-out error to the appropriate succes status