+- To assign share-level RBAC permissions to specific users or groups, on-premises AD DS identities must be synced to Microsoft Entra ID using Entra Connect Sync. If identities aren't synced, you must [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities), which applies to all authenticated users. For example, a group created only in Microsoft Entra ID won't work if RBAC permissions are configured at the share level. However, if the group contains user accounts synced from on-premises, then you can use those identities. Password hash synchronization isn't required.
0 commit comments