Skip to content

Commit 9b80b37

Browse files
authored
Merge pull request #101709 from jeffpatt24/patch-6
Update storage-troubleshoot-windows-file-connection-problems.md
2 parents b782d0f + 6503b49 commit 9b80b37

File tree

2 files changed

+19
-16
lines changed

2 files changed

+19
-16
lines changed

articles/storage/files/storage-troubleshoot-linux-file-connection-problems.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -124,25 +124,25 @@ The encryption feature for SMB 3.0 for Linux was introduced in the 4.11 kernel.
124124

125125
If your Linux SMB client doesn't support encryption, mount Azure Files by using SMB 2.1 from an Azure Linux VM that's in the same datacenter as the file share. Verify that the [Secure transfer required]( https://docs.microsoft.com/azure/storage/common/storage-require-secure-transfer) setting is disabled on the storage account.
126126

127-
<a id="authorizationfailureportal"></a>
128-
## Error “Authorization failure” when browsing to an Azure file share in the portal
127+
<a id="noaaccessfailureportal"></a>
128+
## Error “No access” when browsing to an Azure file share in the portal
129129

130130
When you browse to an Azure file share in the portal, you may receive the following error:
131131

132-
Authorization failure
133-
You do not have access
132+
No access
133+
Error code: 403
134134

135-
### Cause 1: Your user account does not have access to the storage account
135+
### Cause 1: Virtual network or firewall rules are enabled on the storage account
136136

137137
### Solution for cause 1
138138

139-
Browse to the storage account where the Azure file share is located, click **Access control (IAM)** and verify your user account has access to the storage account. To learn more, see [How to secure your storage account with Role-Based Access Control (RBAC)](https://docs.microsoft.com/azure/storage/blobs/security-recommendations#data-protection).
139+
Verify virtual network and firewall rules are configured properly on the storage account. To test if virtual network or firewall rules is causing the issue, temporarily change the setting on the storage account to **Allow access from all networks**. To learn more, see [Configure Azure Storage firewalls and virtual networks](https://docs.microsoft.com/azure/storage/common/storage-network-security).
140140

141-
### Cause 2: Virtual network or firewall rules are enabled on the storage account
141+
### Cause 2: Your user account does not have access to the storage account
142142

143143
### Solution for cause 2
144144

145-
Verify virtual network and firewall rules are configured properly on the storage account. To test if virtual network or firewall rules is causing the issue, temporarily change the setting on the storage account to **Allow access from all networks**. To learn more, see [Configure Azure Storage firewalls and virtual networks](https://docs.microsoft.com/azure/storage/common/storage-network-security).
145+
Browse to the storage account where the Azure file share is located, click **Access control (IAM)** and verify your user account has access to the storage account. To learn more, see [How to secure your storage account with Role-Based Access Control (RBAC)](https://docs.microsoft.com/azure/storage/blobs/security-recommendations#data-protection).
146146

147147
<a id="open-handles"></a>
148148
## Unable to delete a file or directory in an Azure file share

articles/storage/files/storage-troubleshoot-windows-file-connection-problems.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -133,28 +133,31 @@ To close open handles for a file share, directory or file, use the [Close-AzStor
133133
> [!Note]
134134
> The Get-AzStorageFileHandle and Close-AzStorageFileHandle cmdlets are included in Az PowerShell module version 2.4 or later. To install the latest Az PowerShell module, see [Install the Azure PowerShell module](https://docs.microsoft.com/powershell/azure/install-az-ps).
135135
136-
<a id="authorizationfailureportal"></a>
137-
## Error “Authorization failure” when browsing to an Azure file share in the portal
136+
<a id="noaaccessfailureportal"></a>
137+
## Error “No access” when browsing to an Azure file share in the portal
138138

139139
When you browse to an Azure file share in the portal, you may receive the following error:
140140

141-
Authorization failure
142-
You do not have access
141+
No access
142+
Error code: 403
143143

144-
### Cause 1: Your user account does not have access to the storage account
144+
### Cause 1: Virtual network or firewall rules are enabled on the storage account
145145

146146
### Solution for cause 1
147147

148-
Browse to the storage account where the Azure file share is located, click **Access control (IAM)** and verify your user account has access to the storage account. To learn more, see [How to secure your storage account with Role-Based Access Control (RBAC)](https://docs.microsoft.com/azure/storage/blobs/security-recommendations#data-protection).
148+
Verify virtual network and firewall rules are configured properly on the storage account. To test if virtual network or firewall rules is causing the issue, temporarily change the setting on the storage account to **Allow access from all networks**. To learn more, see [Configure Azure Storage firewalls and virtual networks](https://docs.microsoft.com/azure/storage/common/storage-network-security).
149149

150-
### Cause 2: Virtual network or firewall rules are enabled on the storage account
150+
### Cause 2: Your user account does not have access to the storage account
151151

152152
### Solution for cause 2
153153

154-
Verify virtual network and firewall rules are configured properly on the storage account. To test if virtual network or firewall rules is causing the issue, temporarily change the setting on the storage account to **Allow access from all networks**. To learn more, see [Configure Azure Storage firewalls and virtual networks](https://docs.microsoft.com/azure/storage/common/storage-network-security).
154+
Browse to the storage account where the Azure file share is located, click **Access control (IAM)** and verify your user account has access to the storage account. To learn more, see [How to secure your storage account with Role-Based Access Control (RBAC)](https://docs.microsoft.com/azure/storage/blobs/security-recommendations#data-protection).
155155

156156
<a id="open-handles"></a>
157157
## Unable to delete a file or directory in an Azure file share
158+
When you try to delete a file, you may receive the following error:
159+
160+
The specified resource is marked for deletion by an SMB client.
158161

159162
### Cause
160163
This issue typically occurs if the file or directory has an open handle.

0 commit comments

Comments
 (0)