Skip to content

Commit 4222afa

Browse files
Merge pull request #217072 from khdownie/kendownie110322-3
RBAC configuration
2 parents 85cf834 + 57ebc19 commit 4222afa

File tree

2 files changed

+12
-14
lines changed

2 files changed

+12
-14
lines changed

articles/storage/files/storage-files-identity-ad-ds-assign-permissions.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,18 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 09/19/2022
8+
ms.date: 11/03/2022
99
ms.author: kendownie
1010
ms.custom: devx-track-azurepowershell, subject-rbac-steps, devx-track-azurecli
1111
ms.devlang: azurecli
1212
---
1313

1414
# Part two: assign share-level permissions to an identity
1515

16-
Before you begin this article, make sure you've completed the previous article, [Enable AD DS authentication for your account](storage-files-identity-ad-ds-enable.md).
17-
18-
Once you've enabled Active Directory Domain Services (AD DS) authentication on your storage account, you must configure share-level permissions in order to get access to your file shares. There are two ways you can assign share-level permissions. You can assign them to specific Azure AD users/groups, and you can assign them to all authenticated identities as a default share-level permission.
16+
Once you've enabled an Active Directory (AD) source for your storage account, you must configure share-level permissions in order to get access to your file share. There are two ways you can assign share-level permissions. You can assign them to [specific Azure AD users/groups](#share-level-permissions-for-specific-azure-ad-users-or-groups), and you can assign them to all authenticated identities as a [default share-level permission](#share-level-permissions-for-all-authenticated-identities).
1917

2018
> [!IMPORTANT]
21-
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Full administrative control isn't supported with AD DS or Azure AD authentication.
19+
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Full administrative control isn't supported with Active Directory Domain Services (AD DS) or Azure AD authentication.
2220
2321
## Applies to
2422
| File share type | SMB | NFS |
@@ -31,16 +29,16 @@ Once you've enabled Active Directory Domain Services (AD DS) authentication on y
3129

3230
Most users should assign share-level permissions to specific Azure AD users or groups, and then use Windows ACLs for granular access control at the directory and file level. This is the most stringent and secure configuration.
3331

34-
There are three scenarios where we instead recommend using default share-level permissions assigned to all authenticated identities:
32+
There are three scenarios where we instead recommend using a [default share-level permission](#share-level-permissions-for-all-authenticated-identities) assigned to all authenticated identities:
3533

3634
- If you are unable to sync your on-premises AD DS to Azure AD, you can use a default share-level permission. Assigning a default share-level permission allows you to work around the sync requirement because you don't need to specify the permission to identities in Azure AD. Then you can use Windows ACLs for granular permission enforcement on your files and directories.
37-
- Identities that are tied to an AD but aren't synching to Azure AD can also leverage the default share-level permission. This could include standalone Managed Service Accounts (sMSA), group Managed Service Accounts (gMSA), and computer accounts.
35+
- Identities that are tied to an AD but aren't synching to Azure AD can also leverage the default share-level permission. This could include standalone Managed Service Accounts (sMSA), group Managed Service Accounts (gMSA), and computer accounts.
3836
- The on-premises AD DS you're using is synched to a different Azure AD than the Azure AD the file share is deployed in.
39-
- This is typical when you're managing multi-tenant environments. Using the default share-level permission allows you to bypass the requirement for an Azure AD hybrid identity. You can still use Windows ACLs on your files and directories for granular permission enforcement.
40-
- You prefer to enforce authentication only using Windows ACLs at the file and directory level.
37+
- This is typical when you're managing multi-tenant environments. Using a default share-level permission allows you to bypass the requirement for an Azure AD hybrid identity. You can still use Windows ACLs on your files and directories for granular permission enforcement.
38+
- You prefer to enforce authentication only using Windows ACLs at the file and directory level.
4139

4240
> [!NOTE]
43-
> Because computer accounts don't have an identity in Azure AD, you can't configure Azure role-based access control (RBAC) for them. However, computer accounts can access a file share by using default share-level permissions.
41+
> Because computer accounts don't have an identity in Azure AD, you can't configure Azure role-based access control (RBAC) for them. However, computer accounts can access a file share by using a [default share-level permission](#share-level-permissions-for-all-authenticated-identities).
4442
4543
## Share-level permissions
4644

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 10/04/2022
8+
ms.date: 11/03/2022
99
ms.author: kendownie
1010
---
1111

@@ -14,7 +14,7 @@ ms.author: kendownie
1414

1515
We strongly recommend that you review the [How it works section](./storage-files-active-directory-overview.md#how-it-works) to select the right AD source for authentication. The setup is different depending on the domain service you choose. This article focuses on enabling and configuring on-premises AD DS for authentication with Azure file shares.
1616

17-
If you're new to Azure Files, we recommend reading our [planning guide](storage-files-planning.md) before reading the following series of articles.
17+
If you're new to Azure Files, we recommend reading our [planning guide](storage-files-planning.md).
1818

1919
## Applies to
2020
| File share type | SMB | NFS |
@@ -25,13 +25,13 @@ If you're new to Azure Files, we recommend reading our [planning guide](storage-
2525

2626
## Supported scenarios and restrictions
2727

28-
- AD DS identities used for Azure Files on-premises AD DS authentication must be synced to Azure AD or use a default share-level permission. Password hash synchronization is optional.
28+
- AD DS identities used for Azure Files on-premises AD DS authentication must be synced to Azure AD or [use a default share-level permission](storage-files-identity-ad-ds-assign-permissions.md#share-level-permissions-for-all-authenticated-identities). Password hash synchronization is optional.
2929
- Supports Azure file shares managed by Azure File Sync.
3030
- Supports Kerberos authentication with AD with [AES 256 encryption](./storage-troubleshoot-windows-file-connection-problems.md#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption) (recommended) and RC4-HMAC. AES 128 Kerberos encryption is not yet supported.
3131
- Supports single sign-on experience.
3232
- Only supported on clients running OS versions Windows 8/Windows Server 2012 or newer.
3333
- Only supported against the AD forest that the storage account is registered to. You can only access Azure file shares with the AD DS credentials from a single forest by default. If you need to access your Azure file share from a different forest, make sure that you have the proper forest trust configured, see the [FAQ](storage-files-faq.md#ad-ds--azure-ad-ds-authentication) for details.
34-
- Doesn't support authentication against computer accounts created in AD DS.
34+
- Doesn't support assigning share-level permissions to computer accounts (machine accounts) using Azure RBAC. You can either [use a default share-level permission](storage-files-identity-ad-ds-assign-permissions.md#share-level-permissions-for-all-authenticated-identities) to allow computer accounts to access the share, or consider using a service logon account instead.
3535
- Doesn't support authentication against Network File System (NFS) file shares.
3636
- Doesn't support using CNAME to mount file shares.
3737

0 commit comments

Comments
 (0)