Skip to content

Commit 203da4a

Browse files
committed
Adjust role names for SMB share-level permissions
Corrected the built-in role names for the SMB roles when assigning share-level permissions. Resolves #118907
1 parent 0b22ef3 commit 203da4a

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/storage/files/storage-files-identity-auth-domain-services-enable.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -194,9 +194,9 @@ There are five Azure built-in roles for Azure Files, some of which allow grantin
194194

195195
- **Storage File Data Share Reader** allows read access in Azure file shares over SMB.
196196
- **Storage File Data Privileged Reader** allows read access in Azure file shares over SMB by overriding existing Windows ACLs.
197-
- **Storage File Data Share Contributor** allows read, write, and delete access in Azure file shares over SMB.
198-
- **Storage File Data Share Elevated Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB.
199-
- **Storage File Data Privileged Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB by overriding existing Windows ACLs.
197+
- **Storage File Data SMB Share Contributor** allows read, write, and delete access in Azure file shares over SMB.
198+
- **Storage File Data SMB Share Elevated Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB.
199+
- **Storage File Data SMB Privileged Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB by overriding existing Windows ACLs.
200200

201201
> [!IMPORTANT]
202202
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Administrative control isn't supported with Microsoft Entra credentials.

0 commit comments

Comments
 (0)