Skip to content

Commit 3b7bc65

Browse files
Merge pull request #271047 from mikewill4/patch-66
[SFTP] Explicit owning user and owning group verbiage
2 parents ca3f79a + e8b55d2 commit 3b7bc65

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/storage/blobs/secure-file-transfer-protocol-support.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -81,27 +81,27 @@ For container-level permissions, you can choose which containers you want to gra
8181
| List | l | <li>List content within container</li><li>List content within directory</li> |
8282
| Delete | d | <li>Delete file/directory</li> |
8383
| Create | c | <li>Upload file if file doesn't exist</li><li>Create directory if directory doesn't exist</li> |
84-
| Modify Ownership | o | <li>Change owner or group for file/directory</li> |
84+
| Modify Ownership | o | <li>Change the owning user or owning group for file/directory</li> |
8585
| Modify Permissions | p | <li>Change permissions for file/directory</li> |
8686

8787
When performing write operations on blobs in sub directories, Read permission is required to open the directory and access blob properties.
8888

8989
## ACLs
9090

91-
For directory or blob level permissions, you can change owner, group, and mode that are used by ADLS Gen2 ACLs. Most SFTP clients expose commands for changing these properties. The following table describes common commands in more detail.
91+
For directory or blob level permissions, you can change owning user, owning group, and mode that are used by ADLS Gen2 ACLs. Most SFTP clients expose commands for changing these properties. The following table describes common commands in more detail.
9292

9393
| Command | Required Container Permission | Description |
9494
|---|---|---|
95-
| chown | o | <li>Change owner for file/directory</li><li>Must specify numeric ID</li> |
96-
| chgrp | o | <li>Change group for file/directory</li><li>Must specify numeric ID</li> |
95+
| chown | o | <li>Change owning user for file/directory</li><li>Must specify numeric ID</li> |
96+
| chgrp | o | <li>Change owning group for file/directory</li><li>Must specify numeric ID</li> |
9797
| chmod | p | <li>Change permissions/mode for file/directory</li><li>Must specify POSIX style octal permissions</li> |
9898

99-
The IDs required for changing owner and group are part of new properties for Local Users. The following table describes each new Local User property in more detail.
99+
The IDs required for changing owning user and owning group are part of new properties for Local Users. The following table describes each new Local User property in more detail.
100100

101101
| Property | Description |
102102
|---|---|
103-
| UserId | <li>Unique identifier for the Local User within the storage account</li><li>Generated by default when the Local User is created</li><li>Used for setting owner on file/directory</li> |
104-
| GroupId | <li>Identifer for a group of Local Users</li> |
103+
| UserId | <li>Unique identifier for the Local User within the storage account</li><li>Generated by default when the Local User is created</li><li>Used for setting owning user on file/directory</li> |
104+
| GroupId | <li>Identifer for a group of Local Users</li><li>Used for setting owning group on file/directory</li> |
105105
| AllowAclAuthorization | <li>Allow authorizing this Local User's requests with ACLs</li> |
106106

107107
Once the desired ACLs have been configured and the Local User enables `AllowAclAuthorization`, they may use ACLs to authorize their requests. Similar to RBAC, container permissions can interoperate with ACLs. Only if the local user doesn't have sufficient container permissions will ACLs be evaluated. To learn more, see [Access control model in Azure Data Lake Storage Gen2](data-lake-storage-access-control-model.md).

0 commit comments

Comments
 (0)