Skip to content

Commit 0b2e08c

Browse files
Updating terminology per Acrolinx
1 parent 34a0b7b commit 0b2e08c

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/storage/files/storage-files-identity-assign-share-level-permissions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ For example, say you have a user in your AD that's [email protected] and
6161
6262
For share-level permissions to work, you must take the following actions:
6363

64-
- If your identity source is AD DS or Microsoft Entra Kerberos, sync the users **and** the groups from your local Active Directory to Entra ID by using either [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync), a lightweight agent that you can install from the Entra Admin Center.
64+
- If your identity source is AD DS or Microsoft Entra Kerberos, sync the users **and** the groups from your local Active Directory to Entra ID by using either [Microsoft Entra Connect Sync](/entra/identity/hybrid/connect/how-to-connect-sync-whatis) or [Microsoft Entra Cloud Sync](/entra/identity/hybrid/cloud-sync/what-is-cloud-sync), a lightweight agent that you can install from the Microsoft Entra admin center.
6565
- Add AD synced groups to RBAC role so they can access your storage account.
6666

6767
> [!TIP]
@@ -169,7 +169,7 @@ You can assign permissions to all authenticated Entra users and to specific Entr
169169

170170
## Understanding group-based access for non-synced users
171171

172-
Users who aren't synced to Entra ID can still access Azure file shares through group membership. If a user belongs to an on-premises AD DS group that's synced to Entra ID and has an Azure RBAC role assignment, the user gets the group's permissions, even though they don't appear as a group member in the Entra portal.
172+
Users who aren't synced to Entra ID can still access Azure file shares through group membership. If a user belongs to an on-premises AD DS group that's synced to Entra ID and has an Azure RBAC role assignment, the user gets the group's permissions, even though they don't appear as a group member in the Microsoft Entra admin center.
173173

174174
Here's how it works:
175175

@@ -178,7 +178,7 @@ Here's how it works:
178178
- Azure Files reads the group security identifiers (SIDs) from the Kerberos ticket.
179179
- If any of those groups are synced to Entra ID, Azure Files applies the matching RBAC role assignments.
180180

181-
Because of this process, authorization is based on the groups listed in the Kerberos ticket, not on what appears in the Entra portal. Non-synced users can access file shares through their synced AD DS group memberships without needing individual sync to Entra ID.
181+
Because of this process, authorization is based on the groups listed in the Kerberos ticket, not on what appears in the Microsoft Entra admin center. Non-synced users can access file shares through their synced AD DS group memberships without needing individual sync to Entra ID.
182182

183183
## Next step
184184

0 commit comments

Comments
 (0)