Skip to content

Commit 245a2c1

Browse files
authored
Merge pull request #192514 from khdownie/kendownie-fix2032222
addressing user feedback - minor edits
2 parents 8482099 + 56f0742 commit 245a2c1

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/storage/files/storage-files-identity-ad-ds-assign-permissions.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,17 +48,21 @@ The following table lists the share-level permissions and how they align with th
4848
|[Storage File Data SMB Share Contributor](../../role-based-access-control/built-in-roles.md#storage-file-data-smb-share-contributor) |Allows for read, write, and delete access on files and directories in Azure file shares. [Learn more](storage-files-identity-auth-active-directory-enable.md). |
4949
|[Storage File Data SMB Share Elevated Contributor](../../role-based-access-control/built-in-roles.md#storage-file-data-smb-share-elevated-contributor) |Allows for read, write, delete, and modify ACLs on files and directories in Azure file shares. This role is analogous to a file share ACL of change on Windows file servers. [Learn more](storage-files-identity-auth-active-directory-enable.md). |
5050

51-
5251
## Share-level permissions for specific Azure AD users or groups
5352

54-
If you intend to use a specific Azure AD user or group to access Azure file share resources, that identity must be a **hybrid identity that exists in both on-premises AD DS and Azure AD**. For example, say you have a user in your AD that is [email protected] and you have synced to Azure AD as [email protected] using Azure AD Connect sync. For this user to access Azure Files, you must assign the share-level permissions to [email protected]. The same concept applies to groups or service principals. Because of this, you must sync the users and groups from your AD to Azure AD using Azure AD Connect sync.
53+
If you intend to use a specific Azure AD user or group to access Azure file share resources, that identity must be a **hybrid identity that exists in both on-premises AD DS and Azure AD**. For example, say you have a user in your AD that is [email protected] and you have synced to Azure AD as [email protected] using Azure AD Connect sync. For this user to access Azure Files, you must assign the share-level permissions to [email protected]. The same concept applies to groups or service principals.
54+
55+
In order for share-level permissions to work, you must:
56+
57+
- Sync the users **and** the groups from your local AD to Azure AD using Azure AD Connect sync
58+
- Add AD synced groups to RBAC role so they can access your storage account
5559

5660
Share-level permissions must be assigned to the Azure AD identity representing the same user or group in your AD DS to support AD DS authentication to your Azure file share. Authentication and authorization against identities that only exist in Azure AD, such as Azure Managed Identities (MSIs), are not supported with AD DS authentication.
5761

5862
You can use the Azure portal, Azure PowerShell module, or Azure CLI to assign the built-in roles to the Azure AD identity of a user for granting share-level permissions.
5963

6064
> [!IMPORTANT]
61-
> The share level permissions will take upto 3 hours to take effect once completed. Please wait for the permissions to sync before connecting to your file share using your credentials
65+
> The share-level permissions will take up to three hours to take effect once completed. Please wait for the permissions to sync before connecting to your file share using your credentials.
6266
6367
# [Portal](#tab/azure-portal)
6468

@@ -109,7 +113,7 @@ When you set a default share-level permission, all authenticated users and group
109113

110114
# [Portal](#tab/azure-portal)
111115

112-
You cannot currently assign permissions to the storage account with the Azure portal. Use either the Azure PowerShell module or the Azure CLI, instead.
116+
You can't currently assign permissions to the storage account with the Azure portal. Use either the Azure PowerShell module or the Azure CLI, instead.
113117

114118
# [Azure PowerShell](#tab/azure-powershell)
115119

@@ -150,4 +154,4 @@ You could also assign permissions to all authenticated Azure AD users and specif
150154

151155
Now that you've assigned share-level permissions, you must configure directory and file-level permissions. Continue to the next article.
152156

153-
[Part three: configure directory and file level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md)
157+
[Part three: configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md)

0 commit comments

Comments
 (0)