You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/authorize-data-operations-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,9 +81,9 @@ You can change the authentication method for individual file shares. By default,
81
81
82
82
1. Select **Browse**.
83
83
84
-
1.The **Authentication method** shows whether you're currently using the storage account access key or your Entra account to authenticate and authorize file share operations.
84
+
1.**Authentication method** shows whether you're currently using the storage account access key or your Entra account to authenticate and authorize file share operations.
85
85
86
-
If you're currently authenticating by using the storage account access key, **Access Key** is specified as the authentication method, as shown in the following image. If you're authenticating by using your Entra account, **Microsoft Entra user account** is specified instead.
86
+
If you're currently authenticating by using the storage account access key, **Access key** is specified as the authentication method, as shown in the following image. If you're authenticating by using your Entra account, **Microsoft Entra user account** is specified instead.
87
87
88
88
:::image type="content" source="media/authorize-data-operations-portal/auth-method-access-key.png" alt-text="Screenshot that shows the authentication method set to access key.":::
Copy file name to clipboardExpand all lines: articles/storage/files/authorize-oauth-rest.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,17 +15,17 @@ ms.custom:
15
15
16
16
# Access Azure file shares by using Microsoft Entra ID with Azure Files OAuth over REST
17
17
18
-
:heavy_check_mark:**Applies to:** Classic SMB and NFS file shares created with the Microsoft.Storage resource provider
18
+
:heavy_check_mark:**Applies to:** Classic SMB and NFS file shares created with the `Microsoft.Storage` resource provider
19
19
20
-
:heavy_multiplication_x:**Doesn't apply to:** File shares created with the Microsoft.FileShares resource provider (preview)
20
+
:heavy_multiplication_x:**Doesn't apply to:** File shares created with the `Microsoft.FileShares` resource provider (preview)
21
21
22
22
By using Azure Files OAuth over REST, users and applications can get admin-level read and write access to Azure file shares through the [OAuth](https://oauth.net/) authentication protocol. This access method uses Microsoft Entra ID for REST API-based access.
23
23
24
-
Users, groups, Microsoft services such as Azure portal, and partner services and applications that use REST interfaces can now use OAuth authentication and authorization with a Microsoft Entra account to access data in Azure Files. Azure PowerShell cmdlets and Azure CLI commands that call REST APIs can also use OAuth to access Azure Files.
24
+
Users, groups, Microsoft services such as the Azure portal, and partner services and applications that use REST interfaces can now use OAuth authentication and authorization with a Microsoft Entra account to access data in Azure Files. Azure PowerShell cmdlets and Azure CLI commands that call REST APIs can also use OAuth to access Azure Files.
25
25
26
26
You must call the REST API by using an explicit header to indicate your intent to use the additional privilege. This requirement also applies to Azure PowerShell and Azure CLI access.
27
27
28
-
This article explains how to enable admin-level access to Azure file shares for specific [customer use cases](#customer-use-cases). For a more general article on identity-based authentication for end users, see [Overview of Azure Files identity-based authentication](storage-files-active-directory-overview.md).
28
+
This article explains how to enable admin-level access to Azure file shares for specific [customer use cases](#customer-use-cases). For a more general article on identity-based authentication for users, see [Overview of Azure Files identity-based authentication](storage-files-active-directory-overview.md).
29
29
30
30
## Limitations
31
31
@@ -45,7 +45,7 @@ OAuth authentication and authorization enable developers to build applications t
45
45
46
46
Customers and partners can also enable Microsoft and partner services to configure necessary access securely and transparently to a customer storage account.
47
47
48
-
DevOps tools such as the Azure portal, Azure PowerShell, the Azure CLI, AzCopy, and Storage Explorer can manage data by using the user's identity. Using this identity eliminates the need to manage or distribute storage access keys.
48
+
DevOps tools such as the Azure portal, Azure PowerShell, the Azure CLI, AzCopy, and Azure Storage Explorer can manage data by using the user's identity. Using this identity eliminates the need to manage or distribute storage access keys.
49
49
50
50
### Managed identities
51
51
@@ -80,7 +80,7 @@ These roles are similar to the [Storage File Data SMB Share Reader](../../role-b
80
80
81
81
- When the user, group, or service principal assigned the Storage File Data Privileged Reader or Storage File Data Privileged Contributor role calls the FileREST data API by using OAuth, the user, group, or the service principal has:
82
82
-**Storage File Data Privileged Reader**: Full read access on all the data in the shares for all the configured storage accounts regardless of the file-level or directory-level NTFS permissions that are set.
83
-
-**Storage File Data Privileged Contributor**: Full read, write, modifyACLs, and delete access on all the data in the shares for all the configured storage accounts regardless of the file-level or directory-level NTFS permissions that are set.
83
+
-**Storage File Data Privileged Contributor**: Full read, write, modify-ACLs, and delete access on all the data in the shares for all the configured storage accounts regardless of the file-level or directory-level NTFS permissions that are set.
84
84
85
85
- When you use these special permissions and roles, the system bypasses any file-level or directory-level permissions and grants access to file share data.
86
86
@@ -185,15 +185,15 @@ Extensions for Azure PowerShell enable you to sign in and call Azure PowerShell
185
185
186
186
You can assign permissions to file data to a Microsoft Entra security principal via Azure RBAC.
187
187
188
-
## Supported operations
188
+
###Supported operations
189
189
190
190
The extensions support only operations on file data. Which operations you can call depends on the permissions granted to the Entra security principal with which you signed in to Azure PowerShell.
191
191
192
192
The storage context with OAuth works only if you call it with the `-EnableFileBackupRequestIntent` parameter. This parameter specifies the explicit intent to use the additional permissions that this feature provides.
193
193
194
194
The storage context with OAuth works only for operations on files and directories, and `Get`/`Set` permissions on Azure file shares. For all other operations on storage account and file shares, you must use the storage account key or SAS token.
195
195
196
-
## Prerequisites
196
+
###Prerequisites
197
197
198
198
You need an Azure resource group and a storage account within that resource group. The storage account must be assigned a role that grants explicit permissions to perform data operations against file shares. Make sure that you have the required roles and permissions to access both the management services and data services. For details on the permissions required to call specific Azure Files service operations, see [Permissions for calling data operations](/rest/api/storageservices/authorize-with-azure-active-directory#permissions-for-calling-data-operations).
199
199
@@ -203,7 +203,7 @@ You also need to install the latest [Az.Storage](https://www.powershellgallery.c
203
203
Install-Module Az.Storage -Repository PsGallery
204
204
```
205
205
206
-
## Authorize access to file data
206
+
###Authorize access to file data
207
207
208
208
To authorize access to file data by using Azure PowerShell, follow these steps:
209
209
@@ -243,21 +243,21 @@ To authorize access to file data by using Azure PowerShell, follow these steps:
243
243
244
244
Core Azure CLI commands that ship as part of the CLI support the Azure Files OAuth over REST interface. You can use them to authenticate and authorize file data operations by using Entra credentials.
245
245
246
-
## Supported operations
246
+
###Supported operations
247
247
248
248
The commands support operations only on file data. Which operations you can call depends on the permissions granted to the Entra security principal that you use to sign in to the Azure CLI.
249
249
250
250
OAuth authentication and authorization work only if you call the CLI command by using the `--backup-intent` option or the `--enable-file-backup-request-intent` option. By using these options, you specify the explicit intent to use the additional permissions that this feature provides.
251
251
252
252
All commands under the `az storage file` and `az storage directory` command groups, along with the `az storage share list-handle` and `az storage share close-handle` commands, support OAuth authentication and authorization. For all other operations on storage accounts and file shares, you must use the storage account key or shared access signature (SAS) token.
253
253
254
-
## Prerequisites
254
+
###Prerequisites
255
255
256
256
You need an Azure resource group and a storage account within that resource group. The storage account must be assigned a role that grants explicit permissions to perform data operations against file shares. Make sure that you have the required roles and permissions to access both the management services and data services. For details on the permissions required to call specific Azure Files service operations, see [Permissions for calling data operations](/rest/api/storageservices/authorize-with-azure-active-directory#permissions-for-calling-data-operations).
257
257
258
258
If you haven't already done so, [install the latest version of the Azure CLI](/cli/azure/install-azure-cli).
259
259
260
-
## Authorize access to file data
260
+
###Authorize access to file data
261
261
262
262
Follow these steps to authorize access to file data by using the Azure CLI:
Copy file name to clipboardExpand all lines: articles/storage/files/files-managed-identities.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,7 +154,7 @@ You can use managed identities with Windows or Linux. Select your operating syst
154
154
155
155
The enablement steps described here are for Azure VMs. If you want to enable a managed identity on non-Azure Windows machines (on-premises or other cloud), you must [onboard them to Azure Arc and assign a managed identity](/azure/cloud-adoption-framework/scenarios/hybrid/arc-enabled-servers/eslz-identity-and-access-management). You can also authenticate by using an application identity instead of using a managed identity on a VM or Windows device.
156
156
157
-
### Enable managed identity on an Azure VM
157
+
### Enable a managed identity on an Azure VM
158
158
159
159
The managed identity can be either [system assigned or user assigned](/entra/identity/managed-identities-azure-resources/overview#differences-between-system-assigned-and-user-assigned-managed-identities). If the VM has both system-assigned and user-assigned managed identities, Azure defaults to system assigned. Assign only one for best results.
160
160
@@ -190,7 +190,7 @@ Follow these steps to assign the built-in Azure RBAC role [Storage File Data SMB
190
190
191
191
1. Under **Members**, select **+ Select members**.
192
192
193
-
1. For Azure VMs or Azure Arc identities, select the managed identity for your VM or Windows device. For application identities, search for and select the application identity. Click**Select**.
193
+
1. For Azure VMs or Azure Arc identities, select the managed identity for your VM or Windows device. For application identities, search for and select the application identity. Choose**Select**.
194
194
195
195
1. Verify that the managed identity or application identity is listed under **Members**. Select **Next**.
196
196
@@ -210,7 +210,7 @@ If you created a user-assigned managed identity, follow these steps to add it to
210
210
211
211
To configure a managed identity on a Linux VM running in Azure, follow these steps. Your VM must be running Azure Linux 3.0, Ubuntu 22.04, Ubuntu 24.04, RHEL 9.6+, or SLES 15 SP6+.
212
212
213
-
### Enable managed identity on an Azure VM
213
+
### Enable a managed identity on an Azure VM
214
214
215
215
The managed identity can be either [system assigned or user assigned](/entra/identity/managed-identities-azure-resources/overview#differences-between-system-assigned-and-user-assigned-managed-identities). If the VM has both system-assigned and user-assigned managed identities, Azure defaults to system assigned. Assign only one for best results.
216
216
@@ -240,7 +240,7 @@ The managed identity can be either [system assigned or user assigned](/entra/ide
240
240
241
241
1. Under **Members**, select **+ Select members**. The **Select managed identities** pane appears.
242
242
243
-
1. Under **Managed identity**, select the managed identity, and then click**Select**.
243
+
1. Under **Managed identity**, select the managed identity, and then choose**Select**.
244
244
245
245
1. Verify that the managed identity is listed under **Members**. Select **Next**.
246
246
@@ -258,7 +258,7 @@ If you created a user-assigned managed identity, follow these steps to add it to
258
258
259
259
## Prepare your client to authenticate by using a managed identity
260
260
261
-
Follow these steps to prepare your system to mount the file share by using managed identity authentication. The steps are different for Windows and Linux clients. Clients shouldn't be domain joined.
261
+
The steps for preparing your system to mount the file share by using managed identity authentication are different for Windows and Linux clients. Clients shouldn't be domain joined.
title: Overview - Azure Files Authorization and Access Control
3
-
description: Azure Files enforces authorization on user access at both the share leveland the directory/file level. You can assign share-level permissions through Azure RBAC.
3
+
description: Azure Files enforces authorization on user access at the share level, the directory level, and the file level. You can assign share-level permissions through Azure RBAC.
4
4
author: khdownie
5
5
ms.service: azure-file-storage
6
6
ms.topic: overview
7
7
ms.date: 10/16/2025
8
8
ms.author: kendownie
9
-
# Customer intent: As a cloud administrator, I want to configure authorization and access control for SMB Azure file shares, so that I can manage user permissions at both the shareand directory/file levels effectively.
9
+
# Customer intent: As a cloud administrator, I want to configure authorization and access control for SMB Azure file shares, so that I can manage user permissions at the share, directory, and file levels effectively.
10
10
---
11
11
12
12
# Overview of Azure Files authorization and access control
13
13
14
14
**Applies to:**:heavy_check_mark: SMB file shares
15
15
16
-
Regardless of which identity source you choose for [identity-based authentication](storage-files-active-directory-overview.md) on your storage account, you need to configure authorization and access control. Azure Files enforces authorization on user access at both the share leveland the directory/file level.
16
+
Regardless of which identity source you choose for [identity-based authentication](storage-files-active-directory-overview.md) on your storage account, you need to configure authorization and access control. Azure Files enforces authorization on user access at the share level, the directory level, and the file level.
17
17
18
18
You can assign share-level permissions to Microsoft Entra users or groups that are managed through [Azure RBAC](/azure/role-based-access-control/overview). With Azure RBAC, the credentials that you use for file access should be available or synced to Microsoft Entra ID. You can assign Azure built-in roles like Storage File Data SMB Share Reader to users or groups in Microsoft Entra ID to grant access to a file share.
19
19
@@ -25,26 +25,26 @@ After you enable an identity source on your storage account, you must do one of
25
25
26
26
- Set a [default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities) that applies to all authenticated users and groups.
27
27
- Assign built-in Azure RBAC roles to users and groups.
28
-
- Configure custom roles for Entra identities and assign access rights to file shares in your storage account.
28
+
- Configure custom roles for Entra identities, and assign access rights to file shares in your storage account.
29
29
30
-
The assigned share-level permission grants the identity access to the share only and nothing else, not even the root directory. You still need to separately configure directory and file-level permissions.
30
+
The assigned share-level permission grants the identity access to the share only and nothing else, not even the root directory. You still need to separately configure directory-level and file-level permissions.
31
31
32
32
For more information, see [Assign share-level permissions](storage-files-identity-assign-share-level-permissions.md).
33
33
34
34
> [!NOTE]
35
35
> You can't assign share-level permissions to computer accounts (machine accounts) by using Azure RBAC, because computer accounts can't sync to an identity in Microsoft Entra ID. If you want to allow a computer account to access Azure file shares by using identity-based authentication, [use a default share-level permission](storage-files-identity-assign-share-level-permissions.md#share-level-permissions-for-all-authenticated-identities) or consider using a service logon account instead.
36
36
37
-
## Configure directory and file-level permissions
37
+
## Configure directory-level and file-level permissions
38
38
39
-
Azure Files enforces standard Windows ACLs at both the directory and file levels, including the root directory. You can configure directory or file-level permissions over both SMB and REST.
39
+
Azure Files enforces standard Windows ACLs at both the directory and file levels, including the root directory. You can configure directory-level or file-level permissions over both SMB and REST.
40
40
41
-
For more information, see [Configure directory and file-level permissions](storage-files-identity-configure-file-level-permissions.md).
41
+
For more information, see [Configure directory-level and file-level permissions](storage-files-identity-configure-file-level-permissions.md).
42
42
43
43
### Preserve directory and file ACLs when importing data to Azure Files
44
44
45
-
Azure Files supports preserving directory or file-level ACLs when you copy data to Azure file shares. You can copy ACLs on a directory or file to Azure file shares by using either Azure File Sync or common file-movement toolsets. For example, you can use [robocopy](/windows-server/administration/windows-commands/robocopy) with the `/copy:s` flag to copy data and ACLs to an Azure file share. ACLs are preserved by default, so you don't need to enable identity-based authentication on your storage account to preserve ACLs.
45
+
Azure Files supports preserving directory-level or file-level ACLs when you copy data to Azure file shares. You can copy ACLs on a directory or file to Azure file shares by using either Azure File Sync or common file-movement toolsets. For example, you can use [robocopy](/windows-server/administration/windows-commands/robocopy) with the `/copy:s` flag to copy data and ACLs to an Azure file share. ACLs are preserved by default, so you don't need to enable identity-based authentication on your storage account to preserve ACLs.
46
46
47
47
## Related content
48
48
49
49
-[Assign share-level permissions for Azure file shares](storage-files-identity-assign-share-level-permissions.md)
50
-
-[Configure directory and file-level permissions for Azure file shares](storage-files-identity-configure-file-level-permissions.md)
50
+
-[Configure directory-level and file-level permissions for Azure file shares](storage-files-identity-configure-file-level-permissions.md)
0 commit comments