You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/blobs/data-lake-storage-access-control.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: normesta
5
5
ms.subservice: data-lake-storage-gen2
6
6
ms.service: storage
7
7
ms.topic: conceptual
8
-
ms.date: 04/23/2019
8
+
ms.date: 03/16/2020
9
9
ms.author: normesta
10
10
ms.reviewer: jamesbak
11
11
---
@@ -37,18 +37,22 @@ When a security principal is granted RBAC data permissions through a [built-in r
37
37
38
38
Azure Data Lake Storage Gen2 supports Shared Key and SAS methods for authentication. A characteristic of these authentication methods is that no identity is associated with the caller and therefore security principal permission-based authorization cannot be performed.
39
39
40
-
In the case of Shared Key, the caller effectively gains ‘super-user’ access, meaning full access to all operations on all resources, including setting owner and changing ACLs.
40
+
In the case of Shared Key, the caller effectively gains 'super-user' access, meaning full access to all operations on all resources, including setting owner and changing ACLs.
41
41
42
42
SAS tokens include allowed permissions as part of the token. The permissions included in the SAS token are effectively applied to all authorization decisions, but no additional ACL checks are performed.
43
43
44
44
## Access control lists on files and directories
45
45
46
46
You can associate a security principal with an access level for files and directories. These associations are captured in an *access control list (ACL)*. Each file and directory in your storage account has an access control list.
47
47
48
+
> [!NOTE]
49
+
> ACLs apply only to security principals in the same tenant. You can't associate a guest user with an access level.
50
+
48
51
If you assigned a role to a security principal at the storage account-level, you can use access control lists to grant that security principal elevated access to specific files and directories.
49
52
50
53
You can't use access control lists to provide a level of access that is lower than a level granted by a role assignment. For example, if you assign the [Storage Blob Data Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) role to a security principal, then you can't use access control lists to prevent that security principal from writing to a directory.
51
54
55
+
52
56
### Set file and directory level permissions by using access control lists
53
57
54
58
To set file and directory level permissions, see any of the following articles:
@@ -230,7 +234,7 @@ The sticky bit isn't shown in the Azure portal.
230
234
231
235
When a new file or directory is created under an existing directory, the default ACL on the parent directory determines:
232
236
233
-
- A child directory’s default ACL and access ACL.
237
+
- A child directory's default ACL and access ACL.
234
238
- A child file's access ACL (files do not have a default ACL).
235
239
236
240
#### umask
@@ -279,7 +283,7 @@ Always use Azure AD security groups as the assigned principal in ACLs. Resist th
279
283
280
284
### Which permissions are required to recursively delete a directory and its contents?
281
285
282
-
- The caller has ‘super-user’ permissions,
286
+
- The caller has 'super-user' permissions,
283
287
284
288
Or
285
289
@@ -297,7 +301,7 @@ The creator of a file or directory becomes the owner. In the case of the root di
297
301
298
302
The owning group is copied from the owning group of the parent directory under which the new file or directory is created.
299
303
300
-
### I am the owning user of a file but I don’t have the RWX permissions I need. What do I do?
304
+
### I am the owning user of a file but I don't have the RWX permissions I need. What do I do?
301
305
302
306
The owning user can change the permissions of the file to give themselves any RWX permissions they need.
0 commit comments