Skip to content

Commit d84ad5f

Browse files
Merge pull request #216151 from NDVALPHA/NDVALPHA-CLARIFICATION-ONROLES
NDVALPHA-CLARIFICATION-ONROLES
2 parents f194cc6 + 865937f commit d84ad5f

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/storage/files/storage-files-identity-ad-ds-enable.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,10 @@ The AD DS account created by the cmdlet represents the storage account. If the A
4949
You must run the script below in PowerShell 5.1 on a device that's domain joined to your on-premises AD DS, using an on-premises AD DS credential that's synced to your Azure AD. To follow the [Least privilege principle](../../role-based-access-control/best-practices.md), the on-premises AD DS credential must have the following Azure roles:
5050

5151
- **Reader** on the resource group where the target storage account is located.
52-
- **Contributor** on the storage account to be joined to AD DS (**Owner** will also work).
52+
- **Contributor** on the storage account to be joined to AD DS.
53+
54+
> [!NOTE]
55+
> If the account used to join the storage account in AD DS is an **Owner** or **Contributor** in the Azure subscription where the target resources are located, then that account is already enabled to perform the join and no further assignments are required.
5356
5457
The AD DS credential must also have permissions to create a service logon account or computer account in the target AD. Replace the placeholder values with your own before executing the script.
5558

0 commit comments

Comments
 (0)