Skip to content

Commit 104f731

Browse files
committed
storage abac adls access control model update 2
1 parent 0f6cd8e commit 104f731

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/storage/blobs/data-lake-storage-access-control-model.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: jimmart-dev
77
ms.subservice: data-lake-storage-gen2
88
ms.service: storage
99
ms.topic: conceptual
10-
ms.date: 03/07/2023
10+
ms.date: 03/09/2023
1111
ms.author: jammart
1212
---
1313

@@ -81,7 +81,7 @@ The following diagram shows the permission flow for three common operations: lis
8181
> [!div class="mx-imgBorder"]
8282
> ![data lake storage permission flow example](./media/control-access-permissions-data-lake-storage/data-lake-storage-permissions-example.png)
8383
84-
## Permissions table: Combining Azure RBAC and ACL
84+
## Permissions table: Combining Azure RBAC, ABAC, and ACLs
8585

8686
The following table shows you how to combine Azure roles, conditions, and ACL entries so that a security principal can perform the operations listed in the **Operation** column. This table shows a column that represents each level of a fictitious directory hierarchy. There's a column for the root directory of the container (`/`), a subdirectory named **Oregon**, a subdirectory of the Oregon directory named **Portland**, and a text file in the Portland directory named **Data.txt**. Appearing in those columns are [short form](data-lake-storage-access-control.md#short-forms-for-permissions) representations of the ACL entry required to grant permissions. **N/A** (_Not applicable_) appears in the column if an ACL entry is not required to perform the operation.
8787

0 commit comments

Comments
 (0)