Skip to content

Commit 4ce8555

Browse files
authored
Merge pull request #312433 from khdownie/kendownie022726-2
Files Authorize Access Learn Authoring Assistant check
2 parents 2ea6e5c + 8fc6f3b commit 4ce8555

1 file changed

Lines changed: 28 additions & 40 deletions

File tree

articles/storage/files/authorize-data-operations-portal.md

Lines changed: 28 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,117 +1,105 @@
11
---
2-
title: Authorize access to Azure file share data in the Azure portal
2+
title: Authorize Access to Azure File Share Data in the Azure portal
33
description: When you access file data using the Azure portal, the portal makes requests to Azure Files behind the scenes. These requests can be authenticated and authorized using either your Microsoft Entra account or the storage account access key.
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 06/17/2025
7+
ms.date: 02/27/2026
88
ms.author: kendownie
9-
# Customer intent: "As a cloud administrator, I want to configure authorization access for Azure file shares, so that I can securely manage user permissions and control data access through the Azure portal."
9+
# Customer intent: "As a cloud administrator, I want to configure authorization access for Azure file share data so that I can securely manage user permissions and control data access through the Azure portal."
1010
---
1111

1212
# Choose how to authorize access to file data in the Azure portal
1313

14-
When you access file data using the [Azure portal](https://portal.azure.com?azure-portal=true), the portal makes requests to Azure Files behind the scenes. These requests can be authorized using either your Microsoft Entra account or the storage account access key. The portal indicates which method you're using, and enables you to switch between the two if you have the appropriate permissions.
14+
**Applies to:** :heavy_check_mark: SMB Azure file shares
15+
16+
When you access file data by using the [Azure portal](https://portal.azure.com?azure-portal=true), the portal makes requests to Azure Files behind the scenes. You can authorize these requests by using either your Microsoft Entra account or the storage account access key. The portal shows which method you're using and enables you to switch between the two methods if you have the appropriate permissions.
1517

1618
> [!IMPORTANT]
17-
> Accessing a file share using storage account keys carries inherent security risks, so always authenticate with Microsoft Entra when possible. For information on how to protect and manage your keys, see [Manage storage account access keys](../common/storage-account-keys-manage.md).
18-
19-
You can also specify how to authorize an individual file share operation in the Azure portal. By default, the portal uses whichever method you're already using to authorize all file shares, but you have the option to change this setting for individual file shares.
20-
21-
## Applies to
22-
| Management model | Billing model | Media tier | Redundancy | SMB | NFS |
23-
|-|-|-|-|:-:|:-:|
24-
| Microsoft.Storage | Provisioned v2 | HDD (standard) | Local (LRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
25-
| Microsoft.Storage | Provisioned v2 | HDD (standard) | Zone (ZRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
26-
| Microsoft.Storage | Provisioned v2 | HDD (standard) | Geo (GRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
27-
| Microsoft.Storage | Provisioned v2 | HDD (standard) | GeoZone (GZRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
28-
| Microsoft.Storage | Provisioned v1 | SSD (premium) | Local (LRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
29-
| Microsoft.Storage | Provisioned v1 | SSD (premium) | Zone (ZRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png)|
30-
| Microsoft.Storage | Pay-as-you-go | HDD (standard) | Local (LRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
31-
| Microsoft.Storage | Pay-as-you-go | HDD (standard) | Zone (ZRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
32-
| Microsoft.Storage | Pay-as-you-go | HDD (standard) | Geo (GRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
33-
| Microsoft.Storage | Pay-as-you-go | HDD (standard) | GeoZone (GZRS) | ![Yes](../media/icons/yes-icon.png) | ![No](../media/icons/no-icon.png) |
19+
> Accessing a file share by using storage account keys has inherent security risks. Always authenticate by using Entra when possible. For information on how to protect and manage your keys, see [Manage storage account access keys](../common/storage-account-keys-manage.md).
20+
21+
You can also specify how to authorize an individual file share operation in the Azure portal. By default, the portal uses whichever method you're already using to authorize all file shares, but you can change this setting for individual file shares.
3422

3523
## Permissions needed to access file data
3624

37-
Depending on how you want to authorize access to file data in the Azure portal, you'll need specific permissions. In most cases, these permissions are provided via [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md).
25+
Depending on how you want to authorize access to file data in the Azure portal, you need specific permissions. In most cases, you get these permissions through [Azure role-based access control (Azure RBAC)](../../role-based-access-control/overview.md).
3826

3927
<a name='use-your-azure-ad-account'></a>
4028

4129
### Use your Microsoft Entra account (recommended)
4230

43-
To access file data from the Azure portal using your Microsoft Entra account, both of the following statements must be true:
31+
To access file data from the Azure portal by using your Entra account, both of the following statements must be true:
4432

4533
- You're assigned either a built-in or custom role that provides access to file data.
4634
- You're assigned the Azure Resource Manager [Reader](../../role-based-access-control/built-in-roles.md#reader) role, at a minimum, scoped to the level of the storage account or higher. The **Reader** role grants the most restricted permissions, but another Azure Resource Manager role that grants access to storage account management resources is also acceptable.
4735

4836
The Azure Resource Manager **Reader** role permits users to view storage account resources, but not modify them. It doesn't provide read permissions to data in Azure Storage, but only to account management resources. The **Reader** role is necessary so that users can navigate to file shares in the Azure portal.
4937

50-
There are two new built-in roles that have the required permissions to access file data with OAuth:
38+
Two built-in roles have the required permissions to access file data by using OAuth:
5139
- [Storage File Data Privileged Reader](../../role-based-access-control/built-in-roles.md#storage-file-data-privileged-reader)
5240
- [Storage File Data Privileged Contributor](../../role-based-access-control/built-in-roles.md#storage-file-data-privileged-contributor)
5341

5442
For information about the built-in roles that support access to file data, see [Access Azure file shares using Microsoft Entra ID with Azure Files OAuth over REST](authorize-oauth-rest.md).
5543

5644
> [!NOTE]
57-
> The **Storage File Data Privileged Contributor** role has permissions to read, write, delete, and modify ACLs/NTFS permissions on files/directories in Azure file shares. Modifying ACLs/NTFS permissions isn't supported via the Azure portal.
45+
> The **Storage File Data Privileged Contributor** role has permissions to read, write, delete, and modify ACLs/NTFS permissions on files and directories in Azure file shares. Modifying ACLs/NTFS permissions isn't supported via the Azure portal.
5846
5947
Custom roles can support different combinations of the same permissions provided by the built-in roles. For more information about creating Azure custom roles, see [Azure custom roles](../../role-based-access-control/custom-roles.md) and [Understand role definitions for Azure resources](../../role-based-access-control/role-definitions.md).
6048

6149
### Use the storage account access key (not recommended)
6250

63-
To access file data with the storage account access key, you must have an Azure role assigned to you that includes the Azure RBAC action **Microsoft.Storage/storageAccounts/listkeys/action**. This Azure role may be a built-in role or a custom role. Built-in roles that support **Microsoft.Storage/storageAccounts/listkeys/action** include the following, listed in order from least to greatest permissions:
51+
To access file data by using the storage account access key, you must have an Azure role assigned to you that includes the Azure RBAC action **Microsoft.Storage/storageAccounts/listkeys/action**. This Azure role can be a built-in role or a custom role. Built-in roles that support **Microsoft.Storage/storageAccounts/listkeys/action** include the following, listed in order from least to greatest permissions:
6452

6553
- The [Reader and Data Access](../../role-based-access-control/built-in-roles.md#reader-and-data-access) role
6654
- The [Storage Account Contributor role](../../role-based-access-control/built-in-roles.md#storage-account-contributor)
6755
- The Azure Resource Manager [Contributor role](../../role-based-access-control/built-in-roles.md#contributor)
6856
- The Azure Resource Manager [Owner role](../../role-based-access-control/built-in-roles.md#owner)
6957

70-
When you attempt to access file data in the Azure portal, the portal first checks whether you've been assigned a role with **Microsoft.Storage/storageAccounts/listkeys/action**. If you've been assigned a role with this action, then the portal uses the storage account key for accessing file data. If you haven't been assigned a role with this action, then the portal attempts to access data using your Microsoft Entra account.
58+
When you attempt to access file data in the Azure portal, the portal first checks whether you have a role with **Microsoft.Storage/storageAccounts/listkeys/action**. If you have a role with this action, the portal uses the storage account key for accessing file data. If you don't have a role with this action, the portal attempts to access data by using your Entra account.
7159

7260
> [!IMPORTANT]
73-
> When a storage account is locked with an Azure Resource Manager **ReadOnly** lock, the [List Keys](/rest/api/storagerp/storageaccounts/listkeys) operation isn't permitted for that storage account. **List Keys** is a POST operation, and all POST operations are prevented when a **ReadOnly** lock is configured for the account. For this reason, when the account is locked with a **ReadOnly** lock, users must use Microsoft Entra credentials to access file data in the portal. For information about accessing file data in the Azure portal with Microsoft Entra ID, see [Use your Microsoft Entra account](#use-your-azure-ad-account).
61+
> When you lock a storage account by using a Resource Manager **ReadOnly** lock, you can't perform the [List Keys](/rest/api/storagerp/storageaccounts/listkeys) operation for that storage account. **List Keys** is a POST operation, and all POST operations are prevented when a **ReadOnly** lock is configured for the account. For this reason, when you lock the account by using a **ReadOnly** lock, you must use Entra credentials to access file data in the portal. For information about accessing file data in the Azure portal by using Microsoft Entra ID, see [Use your Microsoft Entra account](#use-your-azure-ad-account).
7462
7563
> [!NOTE]
76-
> The classic subscription administrator roles **Service Administrator** and **Co-Administrator** include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action**, so a user with one of these administrative roles can also access file data with the storage account key. For more information, see [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
64+
> The classic subscription administrator roles **Service Administrator** and **Co-Administrator** include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action** action, so a user with one of these administrative roles can also access file data by using the storage account key. For more information, see [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
7765
7866
## Specify how to authorize operations on a specific file share
7967

8068
You can change the authentication method for individual file shares. By default, the portal uses the current authentication method. To determine the current authentication method, follow these steps.
8169

82-
1. Navigate to your storage account in the Azure portal.
70+
1. Go to your storage account in the Azure portal.
8371
1. In the service menu, under **Data storage**, select **File shares**.
8472
1. Select a file share.
8573
1. Select **Browse**.
86-
1. The **Authentication method** indicates whether you're currently using the storage account access key or your Microsoft Entra account to authenticate and authorize file share operations. If you're currently authenticating using the storage account access key, you'll see **Access Key** specified as the authentication method, as in the following image. If you're authenticating using your Microsoft Entra account, you'll see **Microsoft Entra user account** specified instead.
74+
1. The **Authentication method** shows whether you're currently using the storage account access key or your Entra account to authenticate and authorize file share operations. If you're currently authenticating by using the storage account access key, you see **Access Key** specified as the authentication method, as in the following image. If you're authenticating by using your Entra account, you see **Microsoft Entra user account** specified instead.
8775

8876
:::image type="content" source="media/authorize-data-operations-portal/auth-method-access-key.png" alt-text="Screenshot showing the authentication method set to access key.":::
8977

9078
<a name='authenticate-with-your-azure-ad-account'></a>
9179

92-
### Authenticate with your Microsoft Entra account (recommended)
80+
### Authenticate by using your Microsoft Entra account (recommended)
9381

94-
To switch to using your Microsoft Entra account, select the link highlighted in the image that says **Switch to Microsoft Entra user account**. If you have the appropriate permissions via the Azure roles that are assigned to you, you'll be able to proceed. However, if you lack the necessary permissions, you'll see an error message that you don't have permissions to list the data using your user account with Microsoft Entra ID.
82+
To switch to using your Entra account, select the link highlighted in the image that says **Switch to Microsoft Entra user account**. If you have the appropriate permissions through the Azure roles that are assigned to you, you can proceed. However, if you lack the necessary permissions, you see an error message that you don't have permissions to list the data by using your user account with Entra ID.
9583

96-
Two additional RBAC permissions are required to use your Microsoft Entra account:
84+
Two additional RBAC permissions are required to use your Entra account:
9785
- `Microsoft.Storage/storageAccounts/fileServices/readFileBackupSemantics/action`
9886
- `Microsoft.Storage/storageAccounts/fileServices/writeFileBackupSemantics/action`
9987

100-
No file shares will appear in the list if your Microsoft Entra account lacks permissions to view them.
88+
No file shares appear in the list if your Entra account lacks permissions to view them.
10189

102-
### Authenticate with the storage account access key (not recommended)
90+
### Authenticate by using the storage account access key (not recommended)
10391

104-
To switch to using the account access key, select the link that says **Switch to access key.** If you have access to the storage account key, then you'll be able to proceed. However, if you lack access to the account key, you'll see an error message that you don't have permissions to use the access key to list data.
92+
To switch to using the account access key, select the link that says **Switch to access key.** If you have access to the storage account key, you can proceed. However, if you don't have access to the account key, you see an error message that you don't have permissions to use the access key to list data.
10593

10694
No file shares appear in the list if you don't have access to the storage account access key.
10795

10896
<a name='default-to-azure-ad-authorization-in-the-azure-portal'></a>
10997

11098
## Default to Microsoft Entra authorization in the Azure portal
11199

112-
When you create a new storage account, you can specify that the Azure portal will default to authorization with Microsoft Entra ID when a user navigates to file data. You can also configure this setting for an existing storage account. This setting specifies the default authorization method only. Keep in mind that a user can override this setting and choose to authorize data access with the storage account key.
100+
When you create a new storage account, you can specify that the Azure portal defaults to authorization with Entra ID when a user navigates to file data. You can also configure this setting for an existing storage account. This setting specifies the default authorization method only. A user can override this setting and choose to authorize data access by using the storage account key.
113101

114-
To specify that the portal will use Microsoft Entra authorization by default for data access when you create a storage account, follow these steps:
102+
To specify that the portal uses Entra authorization by default for data access when you create a storage account, follow these steps:
115103

116104
1. Create a new storage account, following the instructions in [Create a storage account](../common/storage-account-create.md).
117105
1. On the **Advanced** tab, in the **Security** section, check the box next to **Default to Microsoft Entra authorization in the Azure portal**.
@@ -122,7 +110,7 @@ To specify that the portal will use Microsoft Entra authorization by default for
122110

123111
To update this setting for an existing storage account, follow these steps:
124112

125-
1. Navigate to the storage account overview in the Azure portal.
113+
1. Go to the storage account overview in the Azure portal.
126114
1. Under **Settings**, select **Configuration**.
127115
1. Set **Default to Microsoft Entra authorization in the Azure portal** to **Enabled**.
128116

0 commit comments

Comments
 (0)