You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/blobs/data-lake-storage-acl-azure-portal.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Use the Azure portal to manage ACLs in Azure Data Lake Storage Gen2
3
3
titleSuffix: Azure Storage
4
-
description: Use the Azure portal to manage access control lists (ACLs) in storage accounts that has hierarchical namespace (HNS) enabled.
4
+
description: Use the Azure portal to manage access control lists (ACLs) in storage accounts that have a hierarchical namespace (HNS) enabled.
5
5
author: jimmart-dev
6
6
7
7
ms.subservice: data-lake-storage-gen2
@@ -27,9 +27,9 @@ To learn about how to use ACLs and Azure roles together, see [Access control mod
27
27
28
28
- You must have one of the following security permissions:
29
29
30
-
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of the either the target container, storage account, parent resource group or subscription.
30
+
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of either the target container, storage account, parent resource group or subscription.
31
31
32
-
- You are the owning user of the target container, directory, or blob to which you plan to apply ACL settings.
32
+
- You're the owning user of the target container, directory, or blob to which you plan to apply ACL settings.
33
33
34
34
## Manage an ACL
35
35
@@ -59,7 +59,7 @@ To learn about how to use ACLs and Azure roles together, see [Access control mod
59
59
> [!TIP]
60
60
> A security principal is an object that represents a user, group, service principal, or managed identity that is defined in Azure Active Directory (AD).
61
61
62
-
Find the security principal by using the search box, and then click the **Select** button.
62
+
Find the security principal by using the search box, and then select the **Select** button.
63
63
64
64
> [!div class="mx-imgBorder"]
65
65
> 
Copy file name to clipboardExpand all lines: articles/storage/blobs/data-lake-storage-directory-file-acl-powershell.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -278,12 +278,12 @@ The following table shows how the cmdlets used for Data Lake Storage Gen1 map to
278
278
|Data Lake Storage Gen1 cmdlet| Data Lake Storage Gen2 cmdlet| Notes |
279
279
|--------|---------|-----|
280
280
|Get-AzDataLakeStoreChildItem|Get-AzDataLakeGen2ChildItem|By default, the Get-AzDataLakeGen2ChildItem cmdlet only lists the first level child items. The -Recurse parameter lists child items recursively. |
281
-
|Get-AzDataLakeStoreItem<br>Get-AzDataLakeStoreItemAclEntry<br>Get-AzDataLakeStoreItemOwner<br>Get-AzDataLakeStoreItemPermission|Get-AzDataLakeGen2Item|The output items of the Get-AzDataLakeGen2Item cmdlet has these properties: Acl, Owner, Group, Permission.|
281
+
|Get-AzDataLakeStoreItem<br>Get-AzDataLakeStoreItemAclEntry<br>Get-AzDataLakeStoreItemOwner<br>Get-AzDataLakeStoreItemPermission|Get-AzDataLakeGen2Item|The output items of the Get-AzDataLakeGen2Item cmdlet have these properties: Acl, Owner, Group, Permission.|
282
282
|Get-AzDataLakeStoreItemContent|Get-AzDataLakeGen2FileContent|The Get-AzDataLakeGen2FileContent cmdlet download file content to local file.|
|Set-AzDataLakeStoreItemOwner<br>Set-AzDataLakeStoreItemPermission<br>Set-AzDataLakeStoreItemAcl|Update-AzDataLakeGen2Item|The Update-AzDataLakeGen2Item cmdlet updates a single item only, and not recursively. If want to update recursively, list items by using the Get-AzDataLakeStoreChildItem cmdlet, then pipeline to the Update-AzDataLakeGen2Item cmdlet.|
286
+
|Set-AzDataLakeStoreItemOwner<br>Set-AzDataLakeStoreItemPermission<br>Set-AzDataLakeStoreItemAcl|Update-AzDataLakeGen2Item|The Update-AzDataLakeGen2Item cmdlet updates a single item only, and not recursively. If you want to update recursively, list items by using the Get-AzDataLakeStoreChildItem cmdlet, then pipeline to the Update-AzDataLakeGen2Item cmdlet.|
287
287
|Test-AzDataLakeStoreItem|Get-AzDataLakeGen2Item|The Get-AzDataLakeGen2Item cmdlet reports an error if the item doesn't exist.|
Copy file name to clipboardExpand all lines: articles/storage/blobs/data-lake-storage-explorer-acl.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ This article shows you how to modify the ACL of file or directory and how to app
29
29
30
30
- You must have one of the following security permissions:
31
31
32
-
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of the either the target container, storage account, parent resource group or subscription.
32
+
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of either the target container, storage account, parent resource group or subscription.
33
33
34
34
- You're the owning user of the target container, directory, or blob to which you plan to apply ACL settings.
0 commit comments