Skip to content

Commit db35acb

Browse files
Merge pull request #297057 from khdownie/kendownie032625
clarify fileshares vs shares for data plane
2 parents 1a3b56d + 3752899 commit db35acb

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/storage/files/authorize-oauth-rest.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Authorize admin-level read and write access to Azure file shares an
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: conceptual
7-
ms.date: 03/25/2025
7+
ms.date: 03/26/2025
88
ms.author: kendownie
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -93,6 +93,10 @@ With the new roles and data actions, this feature will provide storage account-w
9393

9494
There are many [built-in roles](../../role-based-access-control/built-in-roles.md) that provide access to management services. You can also [create custom roles](../../role-based-access-control/custom-roles.md) with the appropriate permissions. To learn more about role-based access control, see [Azure RBAC](../../role-based-access-control/overview.md). For more information about how built-in roles are defined, see [Understand role definitions](../../role-based-access-control/role-definitions.md).
9595

96+
Keep in mind that for the file share resource type, the corresponding RBAC scope uses `shares` in the control plane (management operations), but uses `fileshares` in the data plane (data operations). If you try to use a file share resource ID that contains `shares` in RBAC scope or data action strings, it won't work. You must use `fileshares` in the scope of RBAC assignments, for example:
97+
98+
- `/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/fileServices/default/fileshares/<share-name>`
99+
96100
> [!IMPORTANT]
97101
> Any wildcard use cases defined for the path `Microsoft.Storage/storageAccounts/fileServices/*` or higher scope will automatically inherit the additional access and permissions granted through this new data action. To prevent unintended or over-privileged access to Azure Files, we've implemented additional checks that require users and applications to explicitly indicate their intent to use the additional privilege. Furthermore, we strongly recommend that customers review their user RBAC role assignments and replace any wildcard usage with explicit permissions to ensure proper data access management.
98102
@@ -164,7 +168,7 @@ namespace FilesOAuthSample
164168

165169
## Authorize access using FileREST data plane API
166170

167-
You can also authorize access to file data using the Azure portal or Azure PowerShell.
171+
You can also authorize access to file data using the Azure portal, Azure PowerShell, or Azure CLI.
168172

169173
# [Azure portal](#tab/portal)
170174

0 commit comments

Comments
 (0)