Skip to content

Commit 49b09ca

Browse files
committed
Light cleanup on edits
1 parent ea167b9 commit 49b09ca

1 file changed

Lines changed: 13 additions & 11 deletions

File tree

articles/storage/files/storage-files-identity-configure-file-level-permissions.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -17,18 +17,18 @@ Before you can configure directory-level and file-level permissions, you must [a
1717

1818
## Prerequisites
1919

20-
Consult the following table to determine which tool can be used for which authentication type.
20+
Consult the following table to determine which tool can be used to configure ACLs for which authentication type.
2121

2222
| Tool | AD DS (Hybrid) | Entra Domain Services (Hybrid) | Entra Kerberos (Hybrid) | Entra Kerberos (Cloud-only, preview) |
2323
|---------------------------------|:------------------------:|:------------------------------:|:------------------------:|:------------------------------------:|
24-
| Windows File Explorer | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_multiplication_x: |
25-
| icacls | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_multiplication_x: |
26-
| Azure portal | :heavy_multiplication_x: | :heavy_multiplication_x: | :heavy_check_mark: | :heavy_check_mark: |
27-
| PowerShell (RestSetAcls module) | :heavy_multiplication_x: | :heavy_multiplication_x: | :heavy_check_mark: | :heavy_check_mark: |
24+
| Windows File Explorer | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :: |
25+
| icacls | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :: |
26+
| Azure portal | :: | :: | :heavy_check_mark: | :heavy_check_mark: |
27+
| PowerShell (RestSetAcls module) | :: | :: | :heavy_check_mark: | :heavy_check_mark: |
2828

29-
To use Windows File Explorer or icacls, you need a client machine running Windows. You will also need to mount the file share with admin-level access. If the identity source for your storage account is Active Directory Domain Services (AD DS) or Microsoft Entra Kerberos, this machine must have unimpeded network connectivity to an on-premises Active Directory. If the identity source is Microsoft Entra Domain Services, the machine must have unimpeded network connectivity to the domain controllers for the domain that Microsoft Entra Domain Services manages; these domain controllers are located in Azure.
29+
To configure ACLs by using Windows File Explorer or icacls, you need a client machine running Windows. You also need to mount the file share with admin-level access. If the identity source for your storage account is Active Directory Domain Services (AD DS) or Microsoft Entra Kerberos, this machine must have unimpeded network connectivity to an on-premises Active Directory. If the identity source is Microsoft Entra Domain Services, the machine must have unimpeded network connectivity to the domain controllers for the domain that Microsoft Entra Domain Services manages; these domain controllers are located in Azure.
3030

31-
To use the Azure portal or the PowerShell RestSetAcls module, there's no dependency on domain controllers. However, the identities must be hybrid or cloud-native (preview). For RestSetAcls, you need a client machine running Windows.
31+
To use the Azure portal or the PowerShell `RestSetAcls` module, there's no dependency on domain controllers. However, the identities must be hybrid or cloud-only (preview). For `RestSetAcls`, you need a client machine running Windows.
3232

3333
## How Azure RBAC and Windows ACLs work together
3434

@@ -79,7 +79,9 @@ For more information on these permissions, see the [command-line reference for i
7979

8080
## Mount the file share with admin-level access
8181

82-
Before you configure Windows ACLs with File Explorer or icacls, mount the file share with admin-level access. If you will be configuring ACLs with Azure portal or the RestSetAcls PowerShell module, skip this section. You have two options for mounting with admin-level access.
82+
Before you configure Windows ACLs by using File Explorer or icacls, mount the file share with admin-level access. If you'll configure ACLs by using the Azure portal or the `RestSetAcls` PowerShell module, skip this section and proceed to [Configure Windows ACLs by using the Azure portal](#configure-windows-acls-by-using-the-azure-portal) or [Configure Windows ACLs for cloud-only identities by using PowerShell](#configure-windows-acls-for-cloud-only-identities-by-using-powershell).
83+
84+
You have two options for mounting the file share with admin-level access:
8385

8486
- **Use the Windows permission model for SMB admin (recommended)**: Assign the built-in RBAC role [Storage File Data SMB Admin](/azure/role-based-access-control/built-in-roles/storage#storage-file-data-smb-admin) to admin users who will configure ACLs. Then mount the file share by using [identity-based authentication](storage-files-active-directory-overview.md) and configure ACLs. If an existing ACL on a file or directory denies the admin access, the admin can use the Windows `takeown` command to take ownership of the file or directory and then modify the ACL. This approach is more secure because it doesn't require your storage account key to mount the file share.
8587

@@ -139,7 +141,7 @@ The process for configuring Windows ACLs varies depending on whether you're auth
139141
140142
- For cloud-only identities (preview), you must use the Azure portal or PowerShell. Windows File Explorer and icacls aren't currently supported for cloud-only identities.
141143
142-
- For hybrid identities, you can configure Windows ACLs by using icacls, or you can use Windows File Explorer. If your storage account is configured for Entra Kerberos authentication, you can also use the Azure portal or RestSetAcls PowerShell.
144+
- For hybrid identities, you can configure Windows ACLs by using icacls, or you can use Windows File Explorer. If the identity source for your storage account is Microsoft Entra Kerberos, you can also use the Azure portal or `RestSetAcls` PowerShell module.
143145
144146
If you have directories or files in on-premises file servers with Windows ACLs configured against the AD DS identities, you can copy them over to Azure Files while preserving the ACLs by using traditional file copy tools like Robocopy or the latest version of [Azure AzCopy](https://github.com/Azure/azure-storage-azcopy/releases). If you tier directories and files to Azure Files through Azure File Sync, your ACLs are carried over and persisted in their native format.
145147
@@ -190,7 +192,7 @@ To configure ACLs by using Windows File Explorer, follow these steps:
190192
191193
### Configure Windows ACLs by using the Azure portal
192194
193-
If you configure Entra Kerberos as your identity source, you can configure Windows ACLs for each Entra user or group by using the Azure portal. This method works for both hybrid and cloud-only identities only when Entra Kerberos is used as the identity source.
195+
If you configure Microsoft Entra Kerberos as the identity source for your storage account, you can configure Windows ACLs for each Entra user or group by using the Azure portal. This method works for both hybrid and cloud-only identities only when Microsoft Entra Kerberos is the identity source.
194196
195197
1. Sign in to the [Azure portal](https://portal.azure.com/).
196198
@@ -216,7 +218,7 @@ If you configure Entra Kerberos as your identity source, you can configure Windo
216218
217219
### Configure Windows ACLs for cloud-only identities by using PowerShell
218220
219-
If you need to assign ACLs in bulk to cloud-only users, use the [RestSetAcls PowerShell module](https://www.powershellgallery.com/packages/RestSetAcls/) to automate the process by using the Azure Files REST API. This module does not require network connectivity to Active Directory.
221+
If you need to assign ACLs in bulk to cloud-only users, use the [RestSetAcls PowerShell module](https://www.powershellgallery.com/packages/RestSetAcls/) to automate the process by using the Azure Files REST API. This module doesn't require network connectivity to Active Directory.
220222
221223
For example, if you want to set a root ACL that gives the cloud-only user `[email protected]` read access:
222224

0 commit comments

Comments
 (0)