Skip to content

Commit a8128fe

Browse files
authored
Merge pull request #197224 from khdownie/kendownie050522
Adding wildcard warning
2 parents 44ba53e + d6af7b4 commit a8128fe

File tree

2 files changed

+9
-3
lines changed

2 files changed

+9
-3
lines changed

articles/storage/files/storage-files-identity-ad-ds-assign-permissions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 03/16/2022
8+
ms.date: 05/04/2022
99
ms.author: kendownie
1010
ms.custom: devx-track-azurepowershell, subject-rbac-steps, devx-track-azurecli
1111
ms.devlang: azurecli
@@ -53,6 +53,9 @@ The following table lists the share-level permissions and how they align with th
5353

5454
If you intend to use a specific Azure AD user or group to access Azure file share resources, that identity must be a **hybrid identity that exists in both on-premises AD DS and Azure AD**. For example, say you have a user in your AD that is [email protected] and you have synced to Azure AD as [email protected] using Azure AD Connect sync. For this user to access Azure Files, you must assign the share-level permissions to [email protected]. The same concept applies to groups or service principals.
5555

56+
> [!IMPORTANT]
57+
> **Assign permissions by explicitly declaring actions and data actions as opposed to using a wildcard (\*) character.** If a custom role definition for a data action contains a wildcard character, all identities assigned to that role are granted access for all possible data actions. This means that all such identities will also be granted any new data action added to the platform. The additional access and permissions granted through new actions or data actions may be unwanted behavior for customers using wildcard. To mitigate any unintended future impact, we highly recommend declaring actions and data actions explicitly as opposed to using the wildcard.
58+
5659
In order for share-level permissions to work, you must:
5760

5861
- Sync the users **and** the groups from your local AD to Azure AD using Azure AD Connect sync

includes/storage-files-aad-permissions-and-mounting.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@
55
author: roygara
66
ms.service: storage
77
ms.topic: include
8-
ms.date: 08/26/2020
8+
ms.date: 05/06/2022
99
ms.author: rogara
1010
ms.custom: include file, devx-track-azurecli, devx-track-azurepowershell
1111
---
1212

1313
## Assign access permissions to an identity
1414

15-
To access Azure Files resources with identity based authentication, an identity (a user, group, or service principal) must have the necessary permissions at the share level. This process is similar to specifying Windows share permissions, where you specify the type of access that a particular user has to a file share. The guidance in this section demonstrates how to assign read, write, or delete permissions for a file share to an identity.
15+
To access Azure Files resources with identity based authentication, an identity (a user, group, or service principal) must have the necessary permissions at the share level. This process is similar to specifying Windows share permissions, where you specify the type of access that a particular user has to a file share. The guidance in this section demonstrates how to assign read, write, or delete permissions for a file share to an identity. **We highly recommend assigning permissions by declaring actions and data actions explicitly as opposed to using the wildcard (\*) character.**
1616

1717
We have introduced three Azure built-in roles for granting share-level permissions to users:
1818

@@ -32,6 +32,9 @@ The general recommendation is to use share level permission for high level acces
3232

3333
### Assign an Azure role to an AD identity
3434

35+
> [!IMPORTANT]
36+
> **Assign permissions by explicitly declaring actions and data actions as opposed to using a wildcard (\*) character.** If a custom role definition for a data action contains a wildcard character, all identities assigned to that role are granted access for all possible data actions. This means that all such identities will also be granted any new data action added to the platform. The additional access and permissions granted through new actions or data actions may be unwanted behavior for customers using wildcard.
37+
3538
# [Portal](#tab/azure-portal)
3639
To assign an Azure role to an Azure AD identity, using the [Azure portal](https://portal.azure.com), follow these steps:
3740

0 commit comments

Comments
 (0)