Skip to content

Commit c1535c0

Browse files
authored
Merge pull request #107920 from normesta/normesta-reg-updates-5
A doc request from support
2 parents 3b3774c + 70e3aae commit c1535c0

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/storage/blobs/data-lake-storage-access-control.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: normesta
55
ms.subservice: data-lake-storage-gen2
66
ms.service: storage
77
ms.topic: conceptual
8-
ms.date: 04/23/2019
8+
ms.date: 03/16/2020
99
ms.author: normesta
1010
ms.reviewer: jamesbak
1111
---
@@ -37,18 +37,22 @@ When a security principal is granted RBAC data permissions through a [built-in r
3737

3838
Azure Data Lake Storage Gen2 supports Shared Key and SAS methods for authentication. A characteristic of these authentication methods is that no identity is associated with the caller and therefore security principal permission-based authorization cannot be performed.
3939

40-
In the case of Shared Key, the caller effectively gains super-user access, meaning full access to all operations on all resources, including setting owner and changing ACLs.
40+
In the case of Shared Key, the caller effectively gains 'super-user' access, meaning full access to all operations on all resources, including setting owner and changing ACLs.
4141

4242
SAS tokens include allowed permissions as part of the token. The permissions included in the SAS token are effectively applied to all authorization decisions, but no additional ACL checks are performed.
4343

4444
## Access control lists on files and directories
4545

4646
You can associate a security principal with an access level for files and directories. These associations are captured in an *access control list (ACL)*. Each file and directory in your storage account has an access control list.
4747

48+
> [!NOTE]
49+
> ACLs apply only to security principals in the same tenant. You can't associate a guest user with an access level.
50+
4851
If you assigned a role to a security principal at the storage account-level, you can use access control lists to grant that security principal elevated access to specific files and directories.
4952

5053
You can't use access control lists to provide a level of access that is lower than a level granted by a role assignment. For example, if you assign the [Storage Blob Data Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) role to a security principal, then you can't use access control lists to prevent that security principal from writing to a directory.
5154

55+
5256
### Set file and directory level permissions by using access control lists
5357

5458
To set file and directory level permissions, see any of the following articles:
@@ -230,7 +234,7 @@ The sticky bit isn't shown in the Azure portal.
230234

231235
When a new file or directory is created under an existing directory, the default ACL on the parent directory determines:
232236

233-
- A child directorys default ACL and access ACL.
237+
- A child directory's default ACL and access ACL.
234238
- A child file's access ACL (files do not have a default ACL).
235239

236240
#### umask
@@ -279,7 +283,7 @@ Always use Azure AD security groups as the assigned principal in ACLs. Resist th
279283

280284
### Which permissions are required to recursively delete a directory and its contents?
281285

282-
- The caller has super-user permissions,
286+
- The caller has 'super-user' permissions,
283287

284288
Or
285289

@@ -297,7 +301,7 @@ The creator of a file or directory becomes the owner. In the case of the root di
297301

298302
The owning group is copied from the owning group of the parent directory under which the new file or directory is created.
299303

300-
### I am the owning user of a file but I dont have the RWX permissions I need. What do I do?
304+
### I am the owning user of a file but I don't have the RWX permissions I need. What do I do?
301305

302306
The owning user can change the permissions of the file to give themselves any RWX permissions they need.
303307

0 commit comments

Comments
 (0)