Skip to content

Commit cbf4820

Browse files
committed
AD DS docs reorg
1 parent 212c67b commit cbf4820

6 files changed

+29
-41
lines changed

articles/storage/files/storage-files-identity-ad-ds-assign-permissions.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
title: Control access to Azure file shares - on-premises AD DS authentication
3-
description: Learn how to assign permissions to an Active Directory Domain Services identity that represents your Azure storage account. This allows you to control access with identity-based authentication.
3+
description: Learn how to assign permissions to an Active Directory Domain Services identity that represents your Azure storage account. This allows you to control user access with identity-based authentication.
44
author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 11/03/2022
8+
ms.date: 11/09/2022
99
ms.author: kendownie
10-
ms.custom: devx-track-azurepowershell, subject-rbac-steps, devx-track-azurecli
10+
ms.custom: devx-track-azurepowershell, subject-rbac-steps, devx-track-azurecli, engagement-fy23
1111
ms.devlang: azurecli
1212
---
1313

14-
# Part two: assign share-level permissions to an identity
14+
# Assign share-level permissions to an identity
1515

1616
Once you've enabled an Active Directory (AD) source for your storage account, you must configure share-level permissions in order to get access to your file share. There are two ways you can assign share-level permissions. You can assign them to [specific Azure AD users/groups](#share-level-permissions-for-specific-azure-ad-users-or-groups), and you can assign them to all authenticated identities as a [default share-level permission](#share-level-permissions-for-all-authenticated-identities).
1717

@@ -67,7 +67,7 @@ Share-level permissions must be assigned to the Azure AD identity representing t
6767
> [!TIP]
6868
> Optional: Customers who want to migrate SMB server share-level permissions to RBAC permissions can use the `Move-OnPremSharePermissionsToAzureFileShare` PowerShell cmdlet to migrate directory and file-level permissions from on-premises to Azure. This cmdlet evaluates the groups of a particular on-premises file share, then writes the appropriate users and groups to the Azure file share using the three RBAC roles. You provide the information for the on-premises share and the Azure file share when invoking the cmdlet.
6969
70-
You can use the Azure portal, Azure PowerShell module, or Azure CLI to assign the built-in roles to the Azure AD identity of a user for granting share-level permissions.
70+
You can use the Azure portal, Azure PowerShell, or Azure CLI to assign the built-in roles to the Azure AD identity of a user for granting share-level permissions.
7171

7272
> [!IMPORTANT]
7373
> The share-level permissions will take up to three hours to take effect once completed. Please wait for the permissions to sync before connecting to your file share using your credentials.
@@ -168,6 +168,4 @@ You could also assign permissions to all authenticated Azure AD users and specif
168168

169169
## Next steps
170170

171-
Now that you've assigned share-level permissions, you must configure directory and file-level permissions. Continue to the next article.
172-
173-
[Part three: configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md)
171+
Now that you've assigned share-level permissions, you must [configure directory and file-level permissions](storage-files-identity-ad-ds-configure-permissions.md).

articles/storage/files/storage-files-identity-ad-ds-configure-permissions.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,22 @@
11
---
22
title: Control what a user can do at the directory and file level - Azure Files
3-
description: Learn how to configure Windows ACLs for directory and file level permissions for AD DS authentication to Azure file shares, allowing you to take advantage of granular access control.
3+
description: Learn how to configure Windows ACLs for directory and file level permissions for Active Directory authentication to Azure file shares, allowing you to take advantage of granular access control.
44
author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 11/08/2022
8+
ms.date: 11/09/2022
99
ms.author: kendownie
10+
ms.custom: engagement-fy23
1011
---
1112

12-
# Part three: configure directory and file level permissions over SMB
13+
# Configure directory and file-level permissions over SMB
1314

14-
Before you begin this article, make sure you've completed the previous article, [Assign share-level permissions to an identity](storage-files-identity-ad-ds-assign-permissions.md), to ensure that your share-level permissions are in place with Azure role-based access control (RBAC).
15+
Before you begin this article, make sure you've read [Assign share-level permissions to an identity](storage-files-identity-ad-ds-assign-permissions.md) to ensure that your share-level permissions are in place with Azure role-based access control (RBAC).
1516

1617
After you assign share-level permissions, you must first connect to the Azure file share using the storage account key and then configure Windows access control lists (ACLs), also known as NTFS permissions, at the root, directory, or file level. While share-level permissions act as a high-level gatekeeper that determines whether a user can access the share, Windows ACLs operate at a more granular level to control what operations the user can do at the directory or file level.
1718

18-
Both share-level and file/directory level permissions are enforced when a user attempts to access a file/directory, so if there's a difference between either of them, only the most restrictive one will be applied. For example, if a user has read/write access at the file level, but only read at a share level, then they can only read that file. The same would be true if it was reversed: if a user had read/write access at the share-level, but only read at the file-level, they can still only read the file.
19+
Both share-level and file/directory-level permissions are enforced when a user attempts to access a file/directory, so if there's a difference between either of them, only the most restrictive one will be applied. For example, if a user has read/write access at the file level, but only read at a share level, then they can only read that file. The same would be true if it was reversed: if a user had read/write access at the share-level, but only read at the file-level, they can still only read the file.
1920

2021
## Applies to
2122
| File share type | SMB | NFS |
@@ -111,6 +112,4 @@ Use Windows File Explorer to grant full permission to all directories and files
111112

112113
## Next steps
113114

114-
Now that the feature is enabled and configured, continue to the next article to learn how to mount your Azure file share from a domain-joined VM.
115-
116-
[Part four: mount a file share from a domain-joined VM](storage-files-identity-ad-ds-mount-file-share.md)
115+
Now that the feature is enabled and configured, you can [mount a file share from a domain-joined VM](storage-files-identity-ad-ds-mount-file-share.md).

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: Enable AD DS authentication to Azure file shares
2+
title: Enable AD DS authentication for Azure file shares
33
description: Learn how to enable Active Directory Domain Services authentication over SMB for Azure file shares. Your domain-joined Windows virtual machines can then access Azure file shares by using AD DS credentials.
44
author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 10/24/2022
8+
ms.date: 11/09/2022
99
ms.author: kendownie
1010
ms.custom: devx-track-azurepowershell
1111
---
1212

13-
# Part one: enable AD DS authentication for your Azure file shares
13+
# Enable AD DS authentication for Azure file shares
1414

1515
This article describes the process for enabling Active Directory Domain Services (AD DS) authentication on your storage account. After enabling the feature, you must configure your storage account and your AD DS, to use AD DS credentials for authenticating to your Azure file share.
1616

@@ -248,6 +248,4 @@ AzureStorageID:<yourStorageSIDHere>
248248

249249
## Next steps
250250

251-
You've now successfully enabled the feature on your storage account. To use the feature, you must assign share-level permissions for users and groups. Continue to the next section.
252-
253-
[Part two: assign share-level permissions to an identity](storage-files-identity-ad-ds-assign-permissions.md)
251+
You've now successfully enabled the feature on your storage account. To use the feature, you must [assign share-level permissions to an identity](storage-files-identity-ad-ds-assign-permissions.md).

articles/storage/files/storage-files-identity-ad-ds-mount-file-share.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,19 +5,18 @@ author: khdownie
55
ms.service: storage
66
ms.subservice: files
77
ms.topic: how-to
8-
ms.date: 09/27/2022
8+
ms.date: 11/09/2022
99
ms.author: kendownie
10+
ms.custom: engagement-fy23
1011
---
1112

12-
# Part four: mount a file share from a domain-joined VM
13+
# Mount a file share from a domain-joined VM
1314

14-
Before you begin this article, make sure you complete the previous article, [configure directory and file level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md).
15+
Before you begin this article, make sure you've read [configure directory and file-level permissions over SMB](storage-files-identity-ad-ds-configure-permissions.md).
1516

16-
The process described in this article verifies that your SMB file share and access permissions are set up correctly and that you can access an Azure file share from a domain-joined VM. Share-level role assignment can take some time to take effect.
17+
The process described in this article verifies that your SMB file share and access permissions are set up correctly and that you can access an Azure file share from a domain-joined VM. Remember that share-level role assignment can take some time to take effect.
1718

18-
Sign in to the client by using the credentials that you granted permissions to, as shown in the following image.
19-
20-
![Screenshot showing Azure AD sign-in screen for user authentication](media/storage-files-aad-permissions-and-mounting/azure-active-directory-authentication-dialog.png)
19+
Sign in to the client using the credentials of the identity that you granted permissions to.
2120

2221
## Applies to
2322
| File share type | SMB | NFS |
@@ -51,10 +50,6 @@ if ($connectTestResult.TcpTestSucceeded) {
5150

5251
If you run into issues mounting with AD DS credentials, refer to [Unable to mount Azure Files with AD credentials](storage-troubleshoot-windows-file-connection-problems.md#unable-to-mount-azure-files-with-ad-credentials) for guidance.
5352

54-
If mounting your file share succeeded, then you've successfully enabled and configured on-premises AD DS authentication for your Azure file share.
55-
5653
## Next steps
5754

58-
If the identity you created in AD DS to represent the storage account is in a domain or OU that enforces password rotation, continue to the next article for instructions on updating your password:
59-
60-
[Update the password of your storage account identity in AD DS](storage-files-identity-ad-ds-update-password.md)
55+
If the identity you created in AD DS to represent the storage account is in a domain or OU that enforces password rotation, you might need to [update the password of your storage account identity in AD DS](storage-files-identity-ad-ds-update-password.md).

articles/storage/files/storage-files-identity-auth-active-directory-enable.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -78,13 +78,13 @@ Enabling AD DS authentication for your Azure file shares allows you to authentic
7878

7979
Follow these steps to set up Azure Files for AD DS authentication:
8080

81-
1. [Part one: enable AD DS authentication on your storage account](storage-files-identity-ad-ds-enable.md)
81+
1. [Enable AD DS authentication on your storage account](storage-files-identity-ad-ds-enable.md)
8282

83-
1. [Part two: assign share-level permissions to the Azure AD identity (a user, group, or service principal) that is in sync with the target AD identity](storage-files-identity-ad-ds-assign-permissions.md)
83+
1. [Assign share-level permissions to the Azure AD identity (a user, group, or service principal) that is in sync with the target AD identity](storage-files-identity-ad-ds-assign-permissions.md)
8484

85-
1. [Part three: configure Windows ACLs over SMB for directories and files](storage-files-identity-ad-ds-configure-permissions.md)
85+
1. [Configure Windows ACLs over SMB for directories and files](storage-files-identity-ad-ds-configure-permissions.md)
8686

87-
1. [Part four: mount an Azure file share to a VM joined to your AD DS](storage-files-identity-ad-ds-mount-file-share.md)
87+
1. [Mount an Azure file share to a VM joined to your AD DS](storage-files-identity-ad-ds-mount-file-share.md)
8888

8989
1. [Update the password of your storage account identity in AD DS](storage-files-identity-ad-ds-update-password.md)
9090

@@ -96,6 +96,4 @@ Identities used to access Azure file shares must be synced to Azure AD to enforc
9696

9797
## Next steps
9898

99-
To enable on-premises AD DS authentication for your Azure file share, continue to the next article:
100-
101-
[Part one: enable AD DS authentication for your account](storage-files-identity-ad-ds-enable.md)
99+
To get started, you must [enable AD DS authentication for your storage account](storage-files-identity-ad-ds-enable.md).

0 commit comments

Comments
 (0)