Skip to content

Commit a02f2b2

Browse files
committed
Update role names and orders
1 parent 203da4a commit a02f2b2

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/storage/files/storage-files-identity-auth-domain-services-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -192,11 +192,11 @@ Most users should assign share-level permissions to specific Microsoft Entra use
192192

193193
There are five Azure built-in roles for Azure Files, some of which allow granting share-level permissions to users and groups:
194194

195-
- **Storage File Data Share Reader** allows read access in Azure file shares over SMB.
195+
- **Storage File Data Privileged Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB by overriding existing Windows ACLs.
196196
- **Storage File Data Privileged Reader** allows read access in Azure file shares over SMB by overriding existing Windows ACLs.
197197
- **Storage File Data SMB Share Contributor** allows read, write, and delete access in Azure file shares over SMB.
198198
- **Storage File Data SMB Share Elevated Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB.
199-
- **Storage File Data SMB Privileged Contributor** allows read, write, delete, and modify Windows ACLs in Azure file shares over SMB by overriding existing Windows ACLs.
199+
- **Storage File Data SMB Share Reader** allows read access in Azure file shares over SMB.
200200

201201
> [!IMPORTANT]
202202
> Full administrative control of a file share, including the ability to take ownership of a file, requires using the storage account key. Administrative control isn't supported with Microsoft Entra credentials.

0 commit comments

Comments
 (0)