Skip to content

Commit 73e76b1

Browse files
committed
Fixing some validation issues
1 parent ebece0e commit 73e76b1

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/storage/blobs/data-lake-storage-acl-azure-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Use the Azure portal to manage ACLs in Azure Data Lake Storage Gen2
33
titleSuffix: Azure Storage
4-
description: Use the Azure portal to manage access control lists (ACLs) in storage accounts that has hierarchical namespace (HNS) enabled.
4+
description: Use the Azure portal to manage access control lists (ACLs) in storage accounts that have a hierarchical namespace (HNS) enabled.
55
author: jimmart-dev
66

77
ms.subservice: data-lake-storage-gen2
@@ -27,9 +27,9 @@ To learn about how to use ACLs and Azure roles together, see [Access control mod
2727

2828
- You must have one of the following security permissions:
2929

30-
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of the either the target container, storage account, parent resource group or subscription.
30+
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of either the target container, storage account, parent resource group or subscription.
3131

32-
- You are the owning user of the target container, directory, or blob to which you plan to apply ACL settings.
32+
- You're the owning user of the target container, directory, or blob to which you plan to apply ACL settings.
3333

3434
## Manage an ACL
3535

@@ -59,7 +59,7 @@ To learn about how to use ACLs and Azure roles together, see [Access control mod
5959
> [!TIP]
6060
> A security principal is an object that represents a user, group, service principal, or managed identity that is defined in Azure Active Directory (AD).
6161
62-
Find the security principal by using the search box, and then click the **Select** button.
62+
Find the security principal by using the search box, and then select the **Select** button.
6363

6464
> [!div class="mx-imgBorder"]
6565
> ![Add a security principal to the ACL](./media/data-lake-storage-acl-azure-portal/get-security-principal.png)

articles/storage/blobs/data-lake-storage-directory-file-acl-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -278,12 +278,12 @@ The following table shows how the cmdlets used for Data Lake Storage Gen1 map to
278278
|Data Lake Storage Gen1 cmdlet| Data Lake Storage Gen2 cmdlet| Notes |
279279
|--------|---------|-----|
280280
|Get-AzDataLakeStoreChildItem|Get-AzDataLakeGen2ChildItem|By default, the Get-AzDataLakeGen2ChildItem cmdlet only lists the first level child items. The -Recurse parameter lists child items recursively. |
281-
|Get-AzDataLakeStoreItem<br>Get-AzDataLakeStoreItemAclEntry<br>Get-AzDataLakeStoreItemOwner<br>Get-AzDataLakeStoreItemPermission|Get-AzDataLakeGen2Item|The output items of the Get-AzDataLakeGen2Item cmdlet has these properties: Acl, Owner, Group, Permission.|
281+
|Get-AzDataLakeStoreItem<br>Get-AzDataLakeStoreItemAclEntry<br>Get-AzDataLakeStoreItemOwner<br>Get-AzDataLakeStoreItemPermission|Get-AzDataLakeGen2Item|The output items of the Get-AzDataLakeGen2Item cmdlet have these properties: Acl, Owner, Group, Permission.|
282282
|Get-AzDataLakeStoreItemContent|Get-AzDataLakeGen2FileContent|The Get-AzDataLakeGen2FileContent cmdlet download file content to local file.|
283283
|Move-AzDataLakeStoreItem|Move-AzDataLakeGen2Item||
284284
|New-AzDataLakeStoreItem|New-AzDataLakeGen2Item|This cmdlet uploads the new file content from a local file.|
285285
|Remove-AzDataLakeStoreItem|Remove-AzDataLakeGen2Item||
286-
|Set-AzDataLakeStoreItemOwner<br>Set-AzDataLakeStoreItemPermission<br>Set-AzDataLakeStoreItemAcl|Update-AzDataLakeGen2Item|The Update-AzDataLakeGen2Item cmdlet updates a single item only, and not recursively. If want to update recursively, list items by using the Get-AzDataLakeStoreChildItem cmdlet, then pipeline to the Update-AzDataLakeGen2Item cmdlet.|
286+
|Set-AzDataLakeStoreItemOwner<br>Set-AzDataLakeStoreItemPermission<br>Set-AzDataLakeStoreItemAcl|Update-AzDataLakeGen2Item|The Update-AzDataLakeGen2Item cmdlet updates a single item only, and not recursively. If you want to update recursively, list items by using the Get-AzDataLakeStoreChildItem cmdlet, then pipeline to the Update-AzDataLakeGen2Item cmdlet.|
287287
|Test-AzDataLakeStoreItem|Get-AzDataLakeGen2Item|The Get-AzDataLakeGen2Item cmdlet reports an error if the item doesn't exist.|
288288

289289
## See also

articles/storage/blobs/data-lake-storage-explorer-acl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This article shows you how to modify the ACL of file or directory and how to app
2929

3030
- You must have one of the following security permissions:
3131

32-
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of the either the target container, storage account, parent resource group or subscription.
32+
- Your user identity has been assigned the [Storage Blob Data Owner](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner) role in the scope of either the target container, storage account, parent resource group or subscription.
3333

3434
- You're the owning user of the target container, directory, or blob to which you plan to apply ACL settings.
3535

0 commit comments

Comments
 (0)