You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See ["Create an Azure service principal"](https://docs.microsoft.com/en-us/cli/azure/create-an-azure-service-principal-azure-cli) and ["Assign an Azure role for access to files data"](https://docs.microsoft.com/en-us/azure/storage/common/storage-auth-aad-rbac-cli) pages for more details.
589
-
590
-
**NB** this section needs updating for Azure Files - pull requests appreciated!
591
+
See ["Create an Azure service principal"](https://docs.microsoft.com/en-us/cli/azure/create-an-azure-service-principal-azure-cli) and ["Assign an Azure role for access to blob data"](https://docs.microsoft.com/en-us/azure/storage/common/storage-auth-aad-rbac-cli) pages for more details.
591
592
592
593
It may be more convenient to put the credentials directly into the
593
594
rclone config file under the `client_id`, `tenant` and `client_secret`
@@ -601,6 +602,28 @@ Properties:
601
602
- Type: string
602
603
- Required: false
603
604
605
+
#### --azurefiles-disable-instance-discovery
606
+
607
+
Skip requesting Microsoft Entra instance metadata
608
+
609
+
This should be set true only by applications authenticating in
610
+
disconnected clouds, or private clouds such as Azure Stack.
611
+
612
+
It determines whether rclone requests Microsoft Entra instance
613
+
metadata from `https://login.microsoft.com/` before
614
+
authenticating.
615
+
616
+
Setting this to true will skip this request, making you responsible
617
+
for ensuring the configured authority is valid and trustworthy.
0 commit comments