Skip to content

Commit 710b70a

Browse files
authored
Merge pull request #263334 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 36ba968 + c2b8978 commit 710b70a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/storage/files/storage-files-identity-auth-domain-services-enable.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -192,11 +192,11 @@ Most users should assign share-level permissions to specific Microsoft Entra use
192192

193193
There are five Azure built-in roles for Azure Files, some of which allow granting share-level permissions to users and groups:
194194

195-
- **Storage File Data Share Reader** allows read access in Azure file shares over SMB.
196-
- **Storage File Data Privileged Reader** allows read access in Azure file shares over SMB by overriding existing Windows ACLs.
197-
- **Storage File Data Share Contributor** allows read, write, and delete access in Azure file shares over SMB.
198-
- **Storage File Data Share Elevated Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB.
199195
- **Storage File Data Privileged Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB by overriding existing Windows ACLs.
196+
- **Storage File Data Privileged Reader** allows read access in Azure file shares over SMB by overriding existing Windows ACLs.
197+
- **Storage File Data SMB Share Contributor** allows read, write, and delete access in Azure file shares over SMB.
198+
- **Storage File Data SMB Share Elevated Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB.
199+
- **Storage File Data SMB Share Reader** allows read access in Azure file shares over SMB.
200200

201201
> [!IMPORTANT]
202202
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Administrative control isn't supported with Microsoft Entra credentials.

0 commit comments

Comments
 (0)