Skip to content

Commit 659c017

Browse files
Merge pull request #221945 from khdownie/kendownie121922-2
Adding learn more link
2 parents f25d630 + 14de36a commit 659c017

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,8 @@ The following sets of permissions are supported on the root directory of a file
8484
- NT AUTHORITY\SYSTEM:(F)
8585
- CREATOR OWNER:(OI)(CI)(IO)(F)
8686

87+
For more information, see [Configure directory and file-level permissions over SMB](../articles/storage/files/storage-files-identity-ad-ds-configure-permissions.md).
88+
8789
### Mount the file share using your storage account key
8890

8991
Before you configure Windows ACLs, you must first mount the file share to your domain-joined VM by using your storage account key. To do this, log into the domain-joined VM as an Azure AD user, open a Windows command prompt, and run the following command. Remember to replace `<YourStorageAccountName>`, `<FileShareName>`, and `<YourStorageAccountKey>` with your own values. If Z: is already in use, replace it with an available drive letter. You can find your storage account key in the Azure portal by navigating to the storage account and selecting **Security + networking** > **Access keys**, or you can use the `Get-AzStorageAccountKey` PowerShell cmdlet.

0 commit comments

Comments
 (0)