You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/configure-access-control-lists.md
+10-5Lines changed: 10 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure access control lists (ACLs) on NFSv4.1 with
4
4
author: b-ahibbard
5
5
ms.service: azure-netapp-files
6
6
ms.topic: how-to
7
-
ms.date: 12/20/2024
7
+
ms.date: 07/10/2025
8
8
ms.author: anfdocs
9
9
# Customer intent: "As a system administrator, I want to configure access control lists on NFSv4.1 volumes in Azure NetApp Files, so that I can manage fine-grained file permissions for users and groups to enhance security and control over shared resources."
10
10
---
@@ -48,17 +48,22 @@ To learn more about ACLs in Azure NetApp Files, see [Understand NFSv4.x ACLs](nf
48
48
-`A:g:GROUP@:rwaDxtTnNcy` - group has full (RWX) access
49
49
-`A::EVERYONE@:tcy` - everyone else has no access
50
50
51
-
1. To modify an ACE for a user, use the `nfs4_setfacl` command: `nfs4_setfacl -a|x A|D::<user|group>:<permissions_alias> <file>`
51
+
1. To modify an ACE for a user, use the `nfs4_setfacl` command: `nfs4_setfacl -a|x A|D|U::<user|group>:<permissions_alias> <file>`
52
+
52
53
- Use `-a` to add permission. Use `-x` to remove permission.
53
-
-`A` creates access; `D` denies access.
54
+
-`A` creates access; `D` denies access.`U:` is used for audit ACEs to log access attempts.
54
55
- In an Active Directory-joined set up, enter an email address for the user. Otherwise, enter the numerical user ID.
55
-
- Permission aliases include read, write, append, execute, etc.
56
+
- Permission aliases include read, write, append, execute, and others. For a full list of permissions, see: [NFSv4.x permissions](nfs-access-control-lists.md#nfsv4x-permissions).
56
57
In the following Active Directory-joined example, user [email protected] is given read, write, and execute access to `/nfsldap/engineering`:
- If you're configuring an ACE for [file access logs](manage-file-access-logs.md), you must use the `U:` prefix to denote the ACE is an audit ACE. The following example configures an audit log for everyone for successful and failed access attempts:
63
+
`nfs4_setfacl -a U:fdiSF:EVERYONE@:rwaDdxtTnNcCoy /<mount_point>`
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/manage-file-access-logs.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: b-ahibbard
6
6
ms.service: azure-netapp-files
7
7
ms.topic: how-to
8
-
ms.date: 04/18/2025
8
+
ms.date: 07/10/2025
9
9
ms.author: anfdocs
10
10
ms.custom: references_regions
11
11
# Customer intent: As a storage administrator, I want to enable file access logs on Azure NetApp Files volumes so that I can monitor file access operations and troubleshoot access issues effectively.
@@ -33,7 +33,7 @@ File access logs provide file access logging for individual volumes, capturing f
33
33
* Events such as file/folder creation or deletion are key events to log.
34
34
* System access control list (SACL) settings for logging should be used sparingly. Frequent operations (for example, READ or GET) can have significant performance impact, but have limited logging value. It's recommended that SACL setting not log these frequent operations to conserve performance.
35
35
* SACL policy additions aren't currently supported with file access logs.
36
-
*When clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate.
36
+
*With clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate.
37
37
* File access logs support a [log generation rate metric](azure-netapp-files-metrics.md). The log generation rate shouldn't exceed 64 MiB/minute.
38
38
39
39
If the rate of file access event generation exceeds 64 MiB/minute, the [Activity log](monitor-azure-netapp-files.md) sends a message stating that the rate of file access log generation is exceeding the limit. If log generation exceeds the limit, logging events can be delayed or dropped. If you're approaching this limit, disable noncritical auditing ACLs to reduce the event generation rate. As a precaution, you can [create an alert](/azure/azure-monitor/alerts/alerts-create-activity-log-alert-rule) for this event.
@@ -151,7 +151,7 @@ To enable logging access on individual files and directories, complete the follo
151
151
152
152
For NFSv4.1, both discretionary and system ACEs are stored in the same ACL, not separate discretionary ACLs and SACLs. Exercise caution when adding audit ACEs to an existing ACL to avoid overwriting and losing an existing ACL. The order in which you add audit ACEs to an existing ACL doesn't matter.
153
153
154
-
**For steps**, see [Configure access control lists on NFSv4.1 volumes](configure-access-control-lists.md).
154
+
Whe configuring the Audit ACE, ensure you use the `U:` prefix to denote it's an Audit ACE. **For steps**, see [Configure access control lists on NFSv4.1 volumes](configure-access-control-lists.md).
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/nfs-access-control-lists.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: b-ahibbard
6
6
ms.service: azure-netapp-files
7
7
ms.topic: concept-article
8
-
ms.date: 02/13/2025
8
+
ms.date: 07/10/2025
9
9
ms.author: anfdocs
10
10
# Customer intent: "As a system administrator managing data access in Azure NetApp Files, I want to understand NFSv4.x ACLs and their permissions so that I can effectively control access and secure our file storage while ensuring compliance with user management policies."
11
11
---
@@ -16,7 +16,7 @@ The NFSv4.x protocol can provide access control in the form of [access control l
16
16
17
17
:::image type="content" source="./media/nfs-access-control-lists/access-control-entity-to-client-diagram.png" alt-text="Diagram of access control entity to Azure NetApp Files." lightbox="./media/nfs-access-control-lists/access-control-entity-to-client-diagram.png":::
18
18
19
-
Each NFSv4.x ACL is created with the format of `type:flags:principal:permissions`.
19
+
Each NFSv4.x ACL uses the format of `type:flags:principal:permissions`.
20
20
21
21
***Type** – the type of ACL being defined. Valid choices include Access (A), Deny (D), Audit (U), Alarm (L). Azure NetApp Files supports Access, Deny and Audit ACL types, but Audit ACLs, while being able to be set, don't currently produce audit logs.
22
22
***Flags** – adds extra context for an ACL. There are three kinds of ACE flags: group, inheritance, and administrative. For more information on flags, see [NFSv4.x ACE flags](#nfsv4x-ace-flags).
@@ -180,7 +180,7 @@ Administrative flags in NFSv4.x ACLs are special flags that are used only with A
180
180
181
181
This Audit ACL is an example of that, where `user1` is audited for failed access attempts for any permission level: `U:F:[email protected]:rwatTnNcCy`.
182
182
183
-
Azure NetApp Files only supports setting administrative flags for Audit ACEs, however the ACEs don't function. Alarm ACEs aren't supported in Azure NetApp Files.
183
+
Azure NetApp Files only supports setting administrative flags for Audit ACEs. Audit ACEs are required for [file access logs](manage-file-access-logs.md). Alarm ACEs aren't supported in Azure NetApp Files.
0 commit comments