Skip to content

Commit de4e4d5

Browse files
Merge pull request #286285 from normesta/normesta-reg-updates-14
Making a fix
2 parents d948d28 + 06fd185 commit de4e4d5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/storage/blobs/data-lake-storage-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: normesta
66

77
ms.service: azure-data-lake-storage
88
ms.topic: conceptual
9-
ms.date: 04/12/2024
9+
ms.date: 06/06/2024
1010
ms.author: normesta
1111
ms.reviewer: jamesbak
1212
ms.devlang: python
@@ -24,7 +24,7 @@ Azure Data Lake Storage implements an access control model that supports both Az
2424
You can associate a [security principal](../../role-based-access-control/overview.md#security-principal) with an access level for files and directories. Each association is captured as an entry in an *access control list (ACL)*. Each file and directory in your storage account has an access control list. When a security principal attempts an operation on a file or directory, an ACL check determines whether that security principal (user, group, service principal, or managed identity) has the correct permission level to perform the operation.
2525

2626
> [!NOTE]
27-
> ACLs apply only to security principals in the same tenant, and they don't apply to users who use Shared Key or shared access signature (SAS) token authentication. That's because no identity is associated with the caller and therefore security principal permission-based authorization cannot be performed.
27+
> ACLs apply only to security principals in the same tenant. ACLs don't apply to users who use Shared Key authorization because no identity is associated with the caller and therefore security principal permission-based authorization cannot be performed. The same is true for shared access signature (SAS) tokens except when a user delegated SAS token is used. In that case, Azure Storage performs a POSIX ACL check against the object ID before it authorizes the operation as long as the optional parameter suoid is used. To learn more, see [Construct a user delegation SAS](/rest/api/storageservices/create-user-delegation-sas#construct-a-user-delegation-sas).
2828
2929
<a id="set-access-control-lists"></a>
3030

0 commit comments

Comments
 (0)