Skip to content

Commit 868b947

Browse files
authored
Update storage-files-aad-permissions-and-mounting.md
1 parent 1e78ca2 commit 868b947

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@
1010
ms.custom: include file
1111
---
1212

13-
## Assign access permissions to an identity
13+
## 2. Assign access permissions to an identity
1414

15-
To access Azure Files resources with identity based authentication, an identity (a user, group, or service principal) must have the necessary permissions at the share level. This process is similar to specifying Windows share permissions, where you specify the type of access that a particular user has to a file share. The guidance in this section demonstrates how to assign read, write, or delete permissions for a file share to an identity.
15+
To access Azure Files resources with identity based authentication, an identity (a user, group, or service principal) must have the necessary permissions at the share level. This process is similar to specifying Windows share permissions, where you specify the type of access that a particular user has to a file share. The general recommendation is to use share level permission for high level access management to a team or group, then leverage NTFS permissions for granular access control on directory/file level. The guidance in this section demonstrates how to assign read, write, or delete permissions for a file share to an identity.
1616

1717
We have introduced three Azure built-in roles for granting share-level permissions to users:
1818

@@ -63,7 +63,7 @@ Before you run the following sample script, remember to replace placeholder valu
6363
az role assignment create --role "<role-name>" --assignee <user-principal-name> --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.Storage/storageAccounts/<storage-account>/fileServices/default/fileshares/<share-name>"
6464
```
6565

66-
## Configure NTFS permissions over SMB
66+
## 3. Configure NTFS permissions over SMB
6767
After you assign share-level permissions with RBAC, you must assign proper NTFS permissions at the root, directory, or file level. Think of share-level permissions as the high-level gatekeeper that determines whether a user can access the share. Whereas NTFS permissions act at a more granular level to determine what operations the user can do at the directory or file level.
6868

6969
Azure Files supports the full set of NTFS basic and advanced permissions. You can view and configure NTFS permissions on directories and files in an Azure file share by mounting the share and then using Windows File Explorer or running the Windows [icacls](https://docs.microsoft.com/windows-server/administration/windows-commands/icacls) or [Set-ACL](https://docs.microsoft.com/powershell/module/microsoft.powershell.security/get-acl) command.
@@ -108,9 +108,9 @@ Use Windows File Explorer to grant full permission to all directories and files
108108
8. In the Security tab, select all permissions you want to grant to the newly add user
109109
9. Click on **Apply**
110110

111-
## Mount a file share from a domain-joined VM
111+
## 4. Mount a file share from a domain-joined VM
112112

113-
The following process verifies that your file share and access permissions were set up correctly and that you can access an Azure File share from a domain-joined VM:
113+
The following process verifies that your file share and access permissions were set up correctly and that you can access an Azure File share from a domain-joined VM. Be aware that the share level RBAC role assignment can take some time to be in effect.
114114

115115
Sign in to the VM by using the Azure AD identity to which you have granted permissions, as shown in the following image. If you have enabled AD authentication for Azure Files, use the AD credential. For Azure AD DS authentication, log in with Azure AD credential.
116116

0 commit comments

Comments
 (0)